Scott Jackisch on Product Management Talk Podcast
Many thanks to Cindy Solomon of #prodmgmttalk for letting me come on her podcast and talk to the product management community about cloud computing and futurism..
Many thanks to Cindy Solomon of #prodmgmttalk for letting me come on her podcast and talk to the product management community about cloud computing and futurism..
Let me start by saying that storage high availability is not a feature that every business is going to need in their computing infrastructure. Fault tolerant systems in general are arguably unimportant to businesses that can tolerate one or two days of downtime. But without fault tolerance, you better have a well-tested and documented recovery procedure. […]
I recently read this TechRepublic blog post about how GE is restructuring its IT practices to revitalize American manufacturing. GE’s new process is borrowing ideas from agile development and Gemba, among others. One way to think of this approach is to break a big project into smaller parts and deploy incremental solutions […]
It’s essential to research a new technology before implementing it. You need to read the documentation and scan the blogs and forums for gotchas. Then you need to make a plan. But ideally you would test your plan in a test lab before implementing anything in production.
I know from experience that not all organizations have […]
I was pretty excited when Amazon first announced its new Glacier product. This offering allows archiving of data at $0.01 per GB per month with a 3-5 hour recovery time. Now they have added a feature to automatically archive S3 storage to Glacier based on rules set by admins. I haven’t used […]
Microsoft has added a lot of compelling features to Hyper-V in Server 2012, which makes it very competitive with VMWare’s (industry standard) vSphere product. Ars Technica provided a good general writeup of the third generation Hyper-V here. Microsoft MVP Aidan Finn is my favorite technical authority on Hyper-V, and his comparison between 2012 […]
Internet Explorer got a black eye last week from a widely exploited zero-day vulnerability, but a recent NSS report shows that IE 9 does a better job of blocking malware than the other major browsers. It looks like the key to Microsoft’s success is their SmartScreen technology, which basically maintains a blacklist of […]
As you might have heard, Yahoo.com was recently hacked and over 450,000 passwords were exposed: http://www.infoworld.com.
Here are some steps you can take to try to protect yourself:
Who wants to be a commodity?
I have struggled with the MSP model since it came out and have considered writing about it for some time. Today, I realized why we aren’t an MSP. It’s that the MSP play turns both the client and the provider into commodities. For those who don’t know, MSP refers to […]
So if you don’t know about Google Apps, you really should read up on it. For the purposes of this post, let’s just say that Google Apps gives companies or individuals the ability to use Gmail with their own domain names.
If you have […]
The explosive popularity of mobile email devices like smartphones and iPads can lead to security problems if not managed properly. In the corporate world, we want at the very least to be able to enforce passwords on devices and remotely wipe mobile devices if they are lost or stolen.
There is also the […]
I received my iPad 2 today and yes, yes, as any of the thousands of online reviews will tell you, it is thinner and lighter. The cameras are crap, the smart cover is cool and really cuts down on the bulk of the original iPad case. […]
I have been researching hardware-based SSD Full Drive Encryption (FDE) lately and here are some bullet points to consider:
Given my recent concerns about security, I have pushed myself and my associates to switch to the Mac OS for our desktop systems (hey, Google did it!). Aside from the standard problems all Windows users will experience in the transition like learning new keyboard shortcuts, I have come to the surprising realization […]
Gret was finally complaining about her horrid office chair, so we went looking for a local place with used office furniture. We wanted a greener option than buying new furniture. Also, we wanted to avoid the toxic chemicals off-gassing from new furniture. Gret and I were impressed […]
I recently read the book “Fatal System Error” which paints a pretty harrowing picture of world-wide computer security. According to a 2008 study of 20,000 machines by security firm Secunia, […]
We often need to help clients get rid of older computer equipment that has piled up over the years. One great solution to this is a non-profit called OTX West (see contact info below). They refurbish used computer equipment and make it available to the Oakland Unified School District and the families of students. For […]
There have been many articles over the past year about hackers using “Automated Clearing House” fraud to steal money from small and medium-sized businesses. The basic premise is that a hacker will compromise the machine that handles bank transactions for your company and steal money directly from your business account.
I would distill my advice […]
Google and Verizon have stirred the ire of Net Neutrality proponents by working on a deal to prioritize certain web content.
At issue for consumers is how the companies that provide the pipeline to the Internet will ultimately direct traffic on their system, and […]
Stand up desks have been used to counteract back pain and improve productivity for years, but there might be a more important reason to consider changing the way you work. A recent study suggests that more time spent sitting increases mortality risk regardless of physical activity. So even you exercise a lot, […]
I finally (and reluctantly) upgraded my own production machines from Windows XP SP3 to Windows 7 this past month. (What with the new Android phone and the new OS, I feel like a new man!) We also recently upgraded one very […]
I finally decided to dump my trusty BlackBerry Curve, which I have had for two years, and upgrade to a Nexus One Android phone from Google. I received the phone on 2/16/10 and have been using it for 10 days at the time of this post. I […]
“We wanted to take greater accountability for the end user experience,” Ballmer said. “We want more consistency in the hardware platform and in the user experience,” he said, while nevertheless saying Microsoft wanted to leave room for hardware partners to innovate.
As of December 2009, 73% of the […]
Apple iPad
Apple has announced a new device called the iPad. I understand that it will be something like an iPod touch, but with a 10″ screen. You might have heard of it. This might be Apple’s way of entering the netbook market which it […]
eEye contigent with cool t-shirt
Microsoft issues updates on the second Tuesday of each month. This month, they issued their largest update ever. Now, Adobe is following suite and will start issuing quarterly patch updates on the same […]
This report from SANS was an eye-opener for me: http://www.sans.org/top-cyber-security-risks.
Priority One: Client-side software that remains unpatched.
Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to […]
Don’t ever re-use passwords between sites. Here is an article about high-profile security sites getting hacked:
Day in and day out, I cannot imagine doing my job without the internet, and specifically Google searches, to find those obscure solutions to all manner of technical problems. Here are some links to improve your own Google searching experience: