article thumbnail

3 ways to advance sustainability in high performance computing

CIO Business Intelligence

Since 2001, Durham University’s tier 1 national supercomputing facility has supported scientists and researchers around the world and is using HPC to build a digital simulation of the universe, starting with the Big Bang. The result s include 18X faster data backups, 72% less power, and a reduction of 60 tons of CO 2 per year.

Dell 264
article thumbnail

The Cybersecurity Risks of Bluetooth

SecureWorld News

Bluetooth has been around since 1994 as a wireless connectivity specification, but the first mobile phones did not appear with basic Bluetooth services until 2001. It is always a good practice to review what has been migrated over since some devices may be from an old backup that were subsequently deleted.

Mobile 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The silent spreaders: How computer worms can sneak into your system undetected?

Dataconomy

CodeRed: A worm that first appeared in 2001 and infected tens of thousands of servers running Microsoft’s IIS web server software. Regularly backup important data to prevent data loss in the event of an infection. It was designed to steal sensitive data and create a massive botnet. What are 5 examples of computer worms?

System 36
article thumbnail

Like an Eagle Standing Tall and Proud, 9/11 2001 Never Forget

Storage IO Blog

On this 15th anniversary of the September 11, 2001 terror attacks on the United States, instead of a lot of words, photos, videos, links and other items, standing tall and proud, never forget, always remember that fateful day (along with December 7, 1941) among others.

Video 40
article thumbnail

The silent spreaders: How computer worms can sneak into your system undetected?

Dataconomy

CodeRed: A worm that first appeared in 2001 and infected tens of thousands of servers running Microsoft’s IIS web server software. Regularly backup important data to prevent data loss in the event of an infection. It was designed to steal sensitive data and create a massive botnet. What are 5 examples of computer worms?

System 28