Amazon Zocalo: What to Do When You Have More Disk Than God

July 15, 2014
By
CloudComputing

Cloud behemoth Amazon has found a new outlet for its NSA-scale™ disk farms in its new enterprise file sync and store service, Zocalo. After years of offering dumb cloud object storage with its Amazon S3 simple storage service, Amazon is climbing up the storage value stack with an enterprise cloud file store that will put…

Read more »

Disaster Recovery Communication

July 14, 2014
By
VirtualizationBackup

During a recent Twitter conversation about disaster recovery and business continuity testing, I began to consider how we communicate during a disaster. We do so not with normal communication methods, but more often than not with an interrupting form of communication—one in which constant requests for updates, criticisms, and outright demands for attention are directed…

Read more »

Windows 8: A Worthy Successor to Bob

July 11, 2014
By
DesktopVirtualization

If Microsoft acts as expected and launches Threshold as Windows 9, this will very likely result in the adoption of Windows 8’s failing to surpass Vista’s sorry 18.8%, firmly positioning Windows 8 as Microsoft’s biggest failure since Bob.

Read more »

Security Wrapped Data

July 10, 2014
By
VirtualizationSecurity

On the July third Virtualization Security Podcast, we discussed mobile security with Harry Labana, CPO of CloudVolumes, and Ben Goodman of VMware. Actually, it was not necessarily about mobile security as much as it was about security in accessing corporate data from mobile devices, regardless of device and location of data. What came out of…

Read more »

Windows 8 DaaS? I Think Not.

July 9, 2014
By
DesktopVirtualization

An advertisement from MyCloudIT claiming to offer a Windows 8 DaaS caught my eye this morning. Interesting stuff. Well, maybe not. Poke a little deeper, and MyCloudIT clarifies that what you are getting is not Windows 8.1, but a “Windows 8.1 Experience.” That is to say, not Windows 8.1, and not even a desktop OS.…

Read more »

A Timely Remider: Passwords and Pin Codes Are Important

July 8, 2014
By
VirtualizationSecurity

On June 24, 2014, a former editor of a now-defunct British tabloid newspaper (some will disagree with the use of the prefix “news”) was found guilty of phone hacking. Phone hacking is the practice of intercepting and listening to a phone’s voicemail messages without the owner’s knowledge or permission.

Read more »