Customised CPUs are doing things software just can't do on commodity kit
Sysadmin blog Part one: Who are you calling an upstart?
Episode 11 Could it be a virus? Why, user, you should be head of IT. Yes, I said behead
Something for the Weekend, Sir? Let's call the whole thing off
Something for the Weekend, Sir? There is no place I can hide, there is no place I can go
Something for the Weekend, Sir? 'A virgin? In his right ear, perhaps'
- All Columns
- Alistair Dabbs
- Chris Mellor
- Dan Olds
- Dominic Connor
- Lucy Orr
- Mike Plant
- Steve Bong
- Tim Worstall
- Trevor Pott
- Verity Stob
Trevor Pott is a full-time nerd from Edmonton, Alberta, Canada. He splits his time between systems administration, technology writing, and consulting. As a consultant he helps Silicon Valley start-ups better understand systems administrators and how to sell to them.
Sysadmin blog Are startups to be avoided? You'll get different answers depending on who you talk to, but the arguments have relevance for the virtualization and storage markets as, today, most of the innovation is occurring with startups. I've been a champion of working with startups for some time now. I don't advocate engaging with …
Today, I was a user Every now and again The Register runs articles from sysadmins around the world about the horrors of working in IT. From time to time, however, it is probably worth reading something from the user's point of view. This is one such story. Today at the grocery store, I saw an advertisement for a smallish regional bank. I used to …
Sysadmin blog Buying new infrastructure does matter. Even small business need a basic set of features and equipment that meets industry standards, not just some proprietary vendor ones. But most businesses simply don't need the bleeding edge. Let's look at an upcoming switch replacement as an example. This customer is going to need to move …
Sysadmin blog Working with small businesses is a master's degree in the real lifespan of IT infrastructure. Companies with real budgets replace everything regularly; refresh cycles are two or three years apart, rarely five. The same doesn't necessarily apply to SMBs, and there are very real lessons to be learned. Perhaps the most important …
Sysadmin blog Researchers think they have figured out how Sony was hacked. Long story short: the hackers knew what they were doing and covered their tracks with some clever, but really basic, tricks. I'm not particularly surprised by this, but I am surprised that others are surprised by it. The Register commenter Yet Another Anonymous …
Sysadmin blog If you want to hack someone's network then learn your target. This starts with recon. What does your target run? What information can you find out about them? Remote scanning will tell you lots about a target system ... unless their sysadmins are good and have changed all the banners to throw you off. So you learn about the …