There seems to be a new business model appearing: Split the company. Symantec has done this, and now HP. IBM did it by selling off a great chunk of its server line to Lenovo. Cisco did it by divesting itself of ownership of VCE. What is telling is that there is a growing number of large companies splitting rather noisily, all for the same official purpose: to concentrate on core competencies in whatever areas the split resolves into. But this may be a misrepresentation. At least from the outside, it looks like it will be. Continue reading The Great Split Business Model
Ever since iOS 7 came out with its corresponding version of iTunes, I have not been able to sync my iPhone contacts and calendars directly to my MacBook any more. Since that update, you have to use iCloud (preferred by Apple), or you have to roll your own cloud that has similar functionality. This seems even more difficult than it sounds, and to this day I still don’t have everything working. But the majority is. So, do you need a Cloud of Your Own?
I have written many times about hybrid cloud security, but there’s a fundamental security requirement that happens as you access the hybrid cloud. In our previous back to basics article we wrote about the need for situational awareness. We’re going to expand on that topic some more. The real success to hybrid cloud security is understanding how the users access the hybrid cloud: where they access it from, why they access it, and what is accessed or used. From a security standpoint, it starts with one organizational item: people.
Our recent poll results are in and have been tabulated. Following a discussion with Andi Mann (@AndiMann), we agreed the results were surprising: which cloud does not matter. At the same time, some of the responses confirmed a few thoughts that we have espoused for years.
We posed one question to the readers of our site, who are from all over the world and tend to be cloud and virtualization savvy: Which Clouds Do You Use?
How do you measure your data-protection success? This is a question that has plagued many folks. Data-protection success could be measured by cost savings, peace of mind, recovery success, or the number of support tickets opened to achieve true data protection. Most likely it is a combination of all those items. Continue reading Measuring Data Protection Success
VMware recently announced an upgrade to vSphere, 5.5 Update 2d, that fixes an issue with transparent page sharing (TPS). This issue allowed an attacker to break encryption keys if VMs shared the same server even for a small amount of time. This is not a trivial problem, but it brings me to a simple point. We think encryption will solve everything related to security. But encryption is only a part of the solution, and not even the most important part. Nor the most powerful. Continue reading vCloud Air Attack: Back to Basics
Join my Circle on Google+
Plugin by Social Author Bio