Archive for May, 2009
When you virtualize desktops and applications so that they run in your data center, they are easier to safeguard and upgrade. And you might even avoid DLL Hell.
Avsim.com, a popular website for users of flight simulation gear has been felled by hackers who attacked the company's servers. Unfortunately, data was never stored offsite and offline, so when both servers were attacked, more than a decade of links, software modifications, and exchanges were permanently destroyed.
As I predicted in an earlier post, Larry Ellison has told Reuters, “We are definitely not going to exit the hardware business. If a company designs both hardware and software, it can build much better systems than if they only design the software. That’s why Apple’s iPhone is so much better than Microsoft phones.” I opined […]
An article in the UK’s Daily Mail said that a used hard drive recently purchased on ebay included test launch procedures for Lockheed Martin’s THAAD (Terminal High Altitude Area Defense) missile defense system used to shoot down Scud missiles in Iraq. Also on the same disk were security policies, blueprints, and employees’ personal info. Confidential corporate […]
Today the US CDC announced that it has determined that the H1N1 influenza appears to be similar with that typically caused by seasonal influenza.
If you are attending the HP Technology Forum & Expo 2009 in Las Vegas on June 15-19, I hope that you will be able to join me for these two sessions: Session 3942 on Thursday 10:30 AM in Banyan E. Will Volume-Level Encryption Keep My Data Safe? This session will help you understand what volume-level encryption can […]
Cloud Computing is what graybeards used to call Time Sharing. When computers filled rooms and cost millions of dollars, many companies had a dumb terminal like a Teletype, IBM 3270 or ADM-2, or a combination card reader/printer in their office which was connected by a point-to-point leased telephone line to a central computer somewhere. Customers were billed for […]