by wwarren | Aug 20, 2011 | AMD, Cloud Computing, Hardware, Intel, Linux, Open Source
Vmware is really easy but it doesn’t work with machines that do not have hardware assisted RAID. Most of my clients(including myself) don’t have enough I/O demands tht a hardware accelerated card is required. This is when the beauties of Linux MD(NOT DM)...
by wwarren | Jul 16, 2011 | AMD, Cloud Computing, Hardware, Intel, Linux, Microsoft, Open Source
While “clouds” on the internet are a terrible idea they do have their place INSIDE the building. I am currently building and researching exactly this type of internal cloud. In my shop I have two servers. At idle(which is where most of them spend their...
by wwarren | Jul 16, 2011 | Cloud Computing
Not if this trend by just about every internet provider type continues….at least not in the United States. Frankly given the rash of security problems and the fact this is old technology wrapped up into a new term it really needs to be scaled back anyway....
by wwarren | Jul 13, 2011 | Cloud Computing, Microsoft, Office, Windows, Windows 8
Listen to the podcast either at the linked article or download the mp3 here. Rumor has it that Windows 8 – the first version of Windows for ARM as well as x86 and billed as Microsoft’s answer for the PC to iOS and the iPad – will actually ship early: next April....
by wwarren | Jul 12, 2011 | Hardware, Microsoft, Windows 8
The Microsoft Partner Conference is always a good source of information. This makes things intriguing for Win8. If it truly runs on vista class machines then it’ll run on my 5 year old notebook(which currently run win7) just fine. Worried that you’ll...
by wwarren | Jul 9, 2011 | Internet, Security
Unless you have a good product like Astaro protecting your edge i would highly suggest NOT running open wifi. However with the proper precautions in place it is possible to mitigate the possibility of getting tangled up in this. Under the new voluntary...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Microsoft, Security
That’s just the LEGAL way to get at it. There’s very little stopping the illegal ones as well. Thanks to the Patriot Act, US spooks no longer have to waste their time having to crack into European company servers to steal their secrets. They can...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Security
It is going to come to pass that the best place to have your data is back on your own systems where you control the security. The cloud with it’s high level of centralization is going to mean your data is just waiting to be stolen. Matt Johansen, a...
by wwarren | Jul 2, 2011 | Internet, Security, Security Alerts
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don’t have airtight...
by wwarren | Jun 30, 2011 | Internet, Security, Security Alerts
You can waste time creating a new MBR then trying to clean ALL the infected files from not just the rootkit but it’s buddies as well. Save your clients time and money and their security. Backup/format/reload. An antivirus of its own Just like Sinowal, TDL-4 is...