Your address will show here +12 34 56 78
Business IT, Virtualisation / Virtualization

We still get asked this question frequently. In simple terms, virtualisation is taking your existing physical computers and making a ‘software’ copy of them. This is quite easy, because all the configured, important parts of your servers are already software anyway – the operating system itself, the programs you run, and the data you’re storing. Virtualisation platforms have a standard (identical) software version of the computer ‘hardware’ for all the virtual computers to run on top of – think of it like every computer in the world having identical hardwareSEE DETAILS

Continue Reading
Security

The vast majority of products greater than two years old don't have firmware patches available on the manufacturers' support websites. In reaching out to Gigabyte support to determine if they did, in fact, have firmware available for a particular model, we were then provided with the file. When we asked why they have firmware available that isn't being published on the product's support page, they responded with this disturbing revelation: At present, we provide bios with Intel's Spectre microcode updated for old models by customers request.

Continue Reading
Business IT, Security

Following up from our recent article on the Meltdown and Spectre vulnerabilities, we’ve had confirmation from Gigabyte that Award BIOS motherboard products cannot apply the Intel CPU microcode that patches the Spectre flaws. According to them this affects all Award BIOS products from all manufacturers. In that case, even though the CPUs may be supported by Intel, the platform itself is not, so there’s no way to apply the CPU microcode and protect that system from Spectre. There’s a possibility that Microsoft may release a future patch that includes theSEE DETAILS

Continue Reading
Business IT

This probably seems like a stupid question to ask – obviously, IT is computers, and everything to do with them. Well sure, it’s that. But it’s also data, it’s where you store that data, it’s how you access that data, it’s what you do with that data. It’s what that data’s worth to you. It’s what losing that data, or having that data stolen, is worth to you.For a long time, Information Technology has been considered an operational cost to businesses, a necessary cost that improves efficiency, increases productivity, andSEE DETAILS

Continue Reading
Business IT, Security

You’ve probably heard of Meltdown and Spectre by now – reports have been circulating across the Internet and even in mainstream news media since the beginning of January. These pose a catastrophic risk to businesses everywhere, but the cause may turn out to be more bureaucratic than technical.So just how bad is this? Surely it’s being blown out of all proportion?Unfortunately, not really. If anything there’s far less attention being paid than the issue actually warrants. Some security experts have even been downplaying the risks because these vulnerabilities don’t allow remoteSEE DETAILS ...

Continue Reading
PREVIOUS POSTSPage 2 of 3NEXT POSTS