Author: alex
- Filter byAll
- Filter byAI
- Filter byApple
- Filter byBig Data
- Filter byCisco
- Filter byComputers
- Filter byCPU
- Filter byCrypto Servers
- Filter byCybersecurity
- Filter byData
- Filter byData Center Services
- Filter byData Centers
- Filter byData Destruction
- Filter byData Privacy
- Filter byData Security
- Filter byData Storage
- Filter byData Tape Media
- Filter byEdge Computing
- Filter byEducation
- Filter byewaste
- Filter byFirewall
- Filter byGaming
- Filter byGPU
- Filter byGraphics Card
- Filter byGreen Energy
- Filter byHard Drives
- Filter byHealthcare
- Filter byInformation Technology
- Filter byIP Phones - Telecom - VOIP
- Filter byITAD
- Filter byLaptops
- Filter byLease Buyback
- Filter byLTO
- Filter byMalware
- Filter byMemory
- Filter byNetwork Routers
- Filter byNetwork Switches
- Filter byNetworking Gear
- Filter byNews
- Filter byQuantum
- Filter byRecycling
- Filter byRepurposing IT
- Filter bySale Items
- Filter byServers
- Filter bySmall Business
- Filter bySupercomputer
- Filter byTape Drives - Libraries
- Filter byTPU
- Filter byUncategorized
- Filter byVideo
-
What Are Types of Network Security Protection?
Network security is important for anyone with a computer or network connection. You need to be sure that your computer and network are protected from unauthorized access, destruction, or alteration. There are many different types of network security protection, and this article will explore the three most common types. Network…
-
Why ITAD is the Secret to Staying Ahead of Emerging Technologies
The IT world is changing and progressing every day with new products and opportunities demanding new technologies and strategies. With rapid evolution comes general excitement…
-
Guide to Sustainability in 2020
Corporate social responsibility and increasing overall sustainability continues to be a rising concern for many businesses. Yet there remains to be a vast amount of organizations that are oblivious to the impact of technology on the environment. We’ve compiled some statistics to aid your organization’s IT department in becoming more…
-
The Self Destruction of HPE SSDs
Warning: Owners of HPE Solid State Drives Need This Updated Immediately ATTENTION! Hewlett Packard Enterprise (HPE) recently announced a critical customer support bulletin regarding the expected failure of a wide range of the enterprise-class solid state drives currently being used in…
-
How Big Data Has Changed Entrepreneurship
How Big Data Has Changed Entrepreneurship The latest industry piquing the interest of entrepreneurs is Big Data. It is the vast amount of information being collected, analyzed, stored, and monetized in a progressively digital world. What has led to the emergence of Big Data, and what does it mean for…
-
Recycle IT
When thinking about recycling used materials, more often than not the three R’s will come to mind. Reduce, Reuse, and Recycle. How do they relate to items that aren’t just plastic bags, glass bottles, and aluminum cans?The concept of e-waste is relatively modern when you consider the fact that civilization…
-
Data Security in Online Banking
In today’s world of banking it seems as if everything is done online. Having digital records of all your financial assets is a great idea, if done correctly. However, one risk that online banking faces and isn’t talked about very much about –is the possibility…
-
Samsung Introduces a Fail-Proof SSD
Samsung Introduces a Fail-Proof SSD Samsung's fail-proof technology is available in its 30.72TB PCIe Gen4 SSDs. Samsung recently introduce to the market a newly engineered solid-state drive with fail-proof technology. This new fail-proof technology allows the SSDs to continue…
-
Understanding the Strengths and Weaknesses of Tape Backup
Tape as a backup storage solution has played an important role in data storage industry since the 1970s. However, modern storage technology such as cloud offers a practical alternative to tape for long-term storage.Of the multitude of tape data recovery and tape conversion cases handled each year, the question has…
-
Is ITAD a Weak Link in Data Security?
Is ITAD a Weak Link in Data Security? Let’s face it, the amount of data currently being created on a day to day basis isn’t slowing down anytime in the near future.With the increase in data comes newer, faster equipment with even more vast amounts of storage capacity.Not only does…
-
13 IT Dad Jokes
Father’s have taught us many things, but telling jokes may not be one of them. Here are a few of our favorite “IT” dad jokes to get you through the holiday…. Don’t use “beef stew” as a computer password.It’s not stroganoff.  Did you hear about the monkeys who shared an Amazon…
-
ASCDI podcast
ASCDI Podcast: Meet DTC Computer Supplies, a company dedicated to the secondary market New to the AscdiNatd, DTC Computer Supplies is a family owned company specializing in buying and selling IT equipment that offers a deep bench of experience in the industry, and especially in data storage products. In this…