About bmoran

This author has not yet filled in any details.
So far bmoran has created 403 blog entries.

Sweet Sixteen of Uplogix Custom Rules

What blog would be complete this time of year without the obligatory basketball-themed, March Madness-inspired, slam dunking post on a subject totally unrelated to hoops? That's right, today we're highlighting the Sweet Sixteen of Uplogix Custom Rules. Uplogix Local Management Software includes the ability to create custom rules and monitors. For details on how these work [...]

IoT automation requires a smarter network

An article in NetworkWorld earlier this month on three fixes needed to get the network ready for the IoT revolution missed a fourth critical component: IoT automation. Cisco says today that there might be 50 billion devices connected to the Internet by 2020, which some are beginning to say might be low, especially once you [...]

What’s it take to be a transformational CIO?

The state of technology is in flux for CIOs juggling cybersecurity threats, expanding demands from business units and the challenge of having to compete for the very customers their organization is charged with supporting. An extensive survey in CIO Magazine revealed some of the challenges facing today's heads of IT -- a role nearly 90 percent say [...]

Local Management Software v5.3 Available

The latest version of the Uplogix Local Management Software (LMS) is now available. At Uplogix we don't name our releases after candy or big cats; we just give them a nice wholesome number. Not a whole number, there are decimals, but you get the point. LMS v5.3 brings new functionality designed to improve visibility of large [...]

Encryption battle between the FBI and Apple

Encryption has been in the news for the last week following the court order requiring Apply to unlock the iPhone of San Bernardino gunman Syed Farook for the FBI. Both the Bureau and Apple are working the court of popular opinion from different angles. The FBI's argument is that they requested Apple's help unlocking one phone, [...]

Preparing staff for increased IT automation

Accenture's Technology Vision survey of corporate execs say they are making significantly more investments in IT automation with more than half planning to use machine learning and embedded artificial intelligence (AI) solutions extensively. Does this mean that IT staff is heading the way of the dodo? Advancement of AI and robotics has created a fair [...]

Pandemic year for healthcare cybersecurity

2015 was a rough year for healthcare cybersecurity. The 113 million patient records breached was more than twice as many as in the five prior years combined. To make things even more discomforting, nine of the top ten incidents and more than 98-percent of the records stolen were the result of hacking attacks. Healthcare IT [...]

Secure remote access even on snow days

If you were caught up in Winter Storm Jonas over this past weekend, you likely didn't venture beyond the driveway or sidewalk you were shoveling. With millions snow-bound on the east coast, the federal government in the nation's capital shut down from noon Friday through Tuesday. It's the kind of weather that makes a person appreciate [...]

Healthcare IT driven by patients

While every industry has a different tolerance for risk, there are also different types of risk to consider. When asked what challenges are unique to healthcare IT, Duke University Health System CISO Chuck Kessler says the biggest differentiation between a healthcare organization and a bank, for example, is that in healthcare it's ultimately about saving lives. [...]

Weak passwords defeat secure access

One benefit to all of the leaked information from site breaches is that it provides researchers with access to millions of passwords and user names. Password management company SplashData recently released their analysis of the worst passwords of 2015. Reviewing more than 2 million passwords leaked in 2015, they found that users are beginning to [...]