Cloud computing can break hold of global 'IT cartel' on governments: Vivek Kundra

by Administrator 31. August 2011 15:51
Summary: In his first editorial after leaving office as US CIO, Vivek Kundra says cloud computing is inevitable for cash-strapped governments. Former US CIO Vivek Kundra, now a fellow at Harvard’s Berkman Center, stated his case for cloud computing in The New York Times, pointing out that the US federal government — let alone any government — can no longer afford to be held hostage by what he calls a global “IT cartel.” This “powerful group of private contractors encourages reliance on inefficient software and hardware that is expensive to acquire and to maintain,” he maintains. A “cloud-first” policy — in whi... [More]


Blog | Hosting | Virtualization

Forged security certificate targets Google users

by Administrator 31. August 2011 15:49
It has been confirmed that DigiNotar, a SSL certificate authority from the Netherlands issued an Internet security certificate to unknown attackers on July 10th. For over 2 months this certificate would have allowed them to setup fake copies of Google websites that appeared genuine to the majority of users, and collect login information for all of the company's services, including Gmail. It's still unknown how attackers managed to get the fake security certificate issued. First reports of the scam came from an Iranian web user, who posted the information in a Google help forum, sparking speculation that the Iranian government had been involved in the attack and subseque... [More]


Blog | Cyber security | System security

Dell enters public cloud space with VMware

by Administrator 30. August 2011 18:59
Summary: Dell unveils its first public and hybrid cloud solutions with the help of the VMware vCloud Datacenter Service. Following through on a $1 billion investment in cloud computing services this year, Dell hasannounced its first public cloud-based data storage offering at VMworld 2011 in Las Vegas on Monday. The aptly and simply-named Dell Cloud is based upon the VMware vCloud Datacenter Servicesarchitecture, which is designed for secure enterprise-grade public, private and hybrid clouds. Basically, Dell and VMware will provide Infrastructure-as-a-Service (IaaS) solutions for customer organizations, hosting and outsourcing firms, system integrators... [More]


Cyber security | Hosting | System security | Virtualization

Microsoft adCenter down for hours, customers tweet

by Administrator 30. August 2011 18:57
Summary: Microsoft’s adCenter online advertising platform has been experiencing service problems during the afternoon of August 29, customers are noting via Twitter. Microsoft is working to address the issue. A number of Microsoft adCenter customers are reporting problems logging into the system that have been going on for several hours. Around 6 p.m. ET on August 29, the Microsoft adCenter Twitter account acknowledged there was an issue and that it was being addressed. I’ve asked Microsoft for more information on what’s going on and will update this post with any additional details I get. Several customers took to Twitter to air their frustrations and share up... [More]


Cyber security | System security

Windows finally gets native ISO support in Windows 8

by Administrator 30. August 2011 18:54
Summary: Microsoft just let the world know that Windows 8 will come with native support for ISO and VHD files in Explorer! But there’s a catch… In a new post by Steven Sinofsky on the Building Windows 8 blog, we learn that Windows 8 will not only have native VHD, but also native ISO support in Explorer (finally!). Windows users can now rejoice at no longer having to use a third-party application to view ISOs. A video created by Rajeev Nagar, a group program manager on the Storage and File Systems team at Microsoft, explains the process and gives us another great glimpse of the new Ribbon UI in Windows 8, as well as the updated Taskbar — all this, after e... [More]


Cyber security | System security

Unsecure directory on contains Blu-ray movies, usernames and passwords, and more...

by Administrator 30. August 2011 18:45
Summary: PHP, utilized by millions of Web sites around the Web, has a not-so-hidden secret on their Web site: a directory full of pirated content, config files containing user name and password information, and more. Update: The directory has now been taken care of; however, for the time being, Google’s cache of the directory remains intact. It’s interesting what a night of advanced Google querying can yield. On the heels of running across USA Today’s prototype Windows 8 application in a designer’s profile (thanks to advanced querying), I’ve now stumbled upon a directory on PHP’s official Web site that ... [More]


Cyber security | System security

Excerpt: VoIP Experts Help Diagnose, Fix Issues Before They Hurt Service

by Administrator 30. August 2011 13:08
With Skype recently announcing its intentions to raise more than $100 million through an IPO, the company and the VoIP industry are looking at a time of growth and transition. Knowledge Network contributor InformIT recently uploaded an to help IT professionals meet the challenges of running VoIP networks head-on. This book focuses on monitoring, managing, troubleshooting and optimizing large networks. The authors discuss: VoIP deployment in enterprise and service-provider networks Performance tradeoffs and challenges associated with leading VoIP deployment models A comprehensive approach to diagnosing VoIP network problems using key performance indicators Proactively addressing is... [More]

Powerful Tool Helps Calculate Power Needs for Your Data Center

by Administrator 30. August 2011 12:56
A recent report suggests that electricity use by data centers in the United States grew 36 percent between 2005 and 2010, dramatically less than the 100 percent growth predicted just a few years ago.   Julius Neudorfer over at CTO Edge questions the finer points of the report, noting that actually building out new, more efficient data centers requires energy, too. But clearly, the energy required to operate a data center continues to be the main expense of such initiatives over the long haul, and accurately estimating these expenses is essential in budgeting this major project.   Our partners at Info~Tech Research Group have developed a Data Center Power and Cooling R... [More]

Server Log Management Is at Heart of Network Security

by Administrator 30. August 2011 12:50
There are a ton of enterprise security products, from intrusion detection to data loss prevention to zero-day attack monitoring, that are based on monitoring logs for weird behavior. In fact, any serious discussion of enterprise security always boils down to carefully monitoring your server logs. You can employ high-end applications to do this for you, but ultimately your IT team needs to know how to protect and utilize the logs that spell out virtually every aspect of your network’s health.   The National Institutes of Standards and Technology has prepared a Guide to Computer Security Log Management that covers the full gamut of issues relating to monitoring and &mdas... [More]

Protect Your Data from USB Threats

by Administrator 30. August 2011 12:48
IT departments have known about the risks posed by USB drives for years now.   But, as our Mike Vizard reports, a recent survey shows that IT still exerts very little control over removable storage, even though it poses a world of security risks. Thumb drives tend to go missing, and if they contain unencrypted data, you have a breach on your hands. And an unscanned thumb drive is a main suspect in the recent spread of malware to the Iranian nuclear facility.   Our partners at Info~Tech Research Group have developed a six-page Removable Media Acceptable Use Policy that applies to a wide range of USB-connected devices, from thumb drives to digital cameras to MP3 pl... [More]

Powered by BlogEngine.NET

Automotive Theme by Car Leasing Experts


About the author

Something about the author

Month List