Many thanks to Cindy Solomon of #prodmgmttalk for letting me come on her podcast and talk to the product management community about cloud computing and futurism..
Let me start by saying that storage high availability is not a feature that every business is going to need in their computing infrastructure. Fault tolerant systems in general are arguably unimportant to businesses that can tolerate one or two days of downtime. But without fault tolerance, you better have a well-tested and documented recovery procedure. […]
I recently read this TechRepublic blog post about how GE is restructuring its IT practices to revitalize American manufacturing. GE’s new process is borrowing ideas from agile development and Gemba, among others. One way to think of this approach is to break a big project into smaller parts and deploy incremental solutions […]
It’s essential to research a new technology before implementing it. You need to read the documentation and scan the blogs and forums for gotchas. Then you need to make a plan. But ideally you would test your plan in a test lab before implementing anything in production.
I know from experience that not all organizations have […]
Microsoft has added a lot of compelling features to Hyper-V in Server 2012, which makes it very competitive with VMWare’s (industry standard) vSphere product. Ars Technica provided a good general writeup of the third generation Hyper-V here. Microsoft MVP Aidan Finn is my favorite technical authority on Hyper-V, and his comparison between 2012 […]
Internet Explorer got a black eye last week from a widely exploited zero-day vulnerability, but a recent NSS report shows that IE 9 does a better job of blocking malware than the other major browsers. It looks like the key to Microsoft’s success is their SmartScreen technology, which basically maintains a blacklist of […]
As you might have heard, Yahoo.com was recently hacked and over 450,000 passwords were exposed: http://www.infoworld.com.
Here are some steps you can take to try to protect yourself:
Who wants to be a commodity?
I have struggled with the MSP model since it came out and have considered writing about it for some time. Today, I realized why we aren’t an MSP. It’s that the MSP play turns both the client and the provider into commodities. For those who don’t know, MSP refers to […]
The explosive popularity of mobile email devices like smartphones and iPads can lead to security problems if not managed properly. In the corporate world, we want at the very least to be able to enforce passwords on devices and remotely wipe mobile devices if they are lost or stolen.
There is also the […]
I received my iPad 2 today and yes, yes, as any of the thousands of online reviews will tell you, it is thinner and lighter. The cameras are crap, the smart cover is cool and really cuts down on the bulk of the original iPad case. […]
I have been researching hardware-based SSD Full Drive Encryption (FDE) lately and here are some bullet points to consider:
- What is it? FDE is a way to protect data on laptops in case of loss or theft.
- Who cares? If you have any data on your machine that you wouldn’t gladly hand over to any stranger, […]
Given my recent concerns about security, I have pushed myself and my associates to switch to the Mac OS for our desktop systems (hey, Google did it!). Aside from the standard problems all Windows users will experience in the transition like learning new keyboard shortcuts, I have come to the surprising realization […]
Gret was finally complaining about her horrid office chair, so we went looking for a local place with used office furniture. We wanted a greener option than buying new furniture. Also, we wanted to avoid the toxic chemicals off-gassing from new furniture. Gret and I were impressed […]
We often need to help clients get rid of older computer equipment that has piled up over the years. One great solution to this is a non-profit called OTX West (see contact info below). They refurbish used computer equipment and make it available to the Oakland Unified School District and the families of students. For […]
There have been many articles over the past year about hackers using “Automated Clearing House” fraud to steal money from small and medium-sized businesses. The basic premise is that a hacker will compromise the machine that handles bank transactions for your company and steal money directly from your business account.
I would distill my advice […]
Stand up desks have been used to counteract back pain and improve productivity for years, but there might be a more important reason to consider changing the way you work. A recent study suggests that more time spent sitting increases mortality risk regardless of physical activity. So even you exercise a lot, […]
I finally (and reluctantly) upgraded my own production machines from Windows XP SP3 to Windows 7 this past month. (What with the new Android phone and the new OS, I feel like a new man!) We also recently upgraded one very […]
I finally decided to dump my trusty BlackBerry Curve, which I have had for two years, and upgrade to a Nexus One Android phone from Google. I received the phone on 2/16/10 and have been using it for 10 days at the time of this post. I […]
“We wanted to take greater accountability for the end user experience,” Ballmer said. “We want more consistency in the hardware platform and in the user experience,” he said, while nevertheless saying Microsoft wanted to leave room for hardware partners to innovate.
As of December 2009, 73% of the […]
This report from SANS was an eye-opener for me: http://www.sans.org/top-cyber-security-risks.
Priority One: Client-side software that remains unpatched.
Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to […]
Don’t ever re-use passwords between sites. Here is an article about high-profile security sites getting hacked: