How much change have you seen in the way in which IT departments determine the number of people needed to best serve the infrastructure, especially since the introduction of virtualization and cloud computing? I have observed that those companies that decided to make the leap all at once immediately dropped their number of hands-and-feet people …
TVP Strategy Archives
Making Do: The SMB Perspective
Small and medium business and enterprises often make do with what they can do today while dreaming about tomorrow. Most SMBs look to have communication tools in place both for communication with the outside world (email, the Web, Twitter, Facebook, Google+, etc.) and for communication between team members (email, IM, etc.). Most of this can …
Amazon Zocalo: What to Do When You Have More Disk Than God
Cloud behemoth Amazon has found a new outlet for its NSA-scale™ disk farms in its new enterprise file sync and store service, Zocalo. After years of offering dumb cloud object storage with its Amazon S3 simple storage service, Amazon is climbing up the storage value stack with an enterprise cloud file store that will put …
Continue reading “Amazon Zocalo: What to Do When You Have More Disk Than God”
Disaster Recovery Communication
During a recent Twitter conversation about disaster recovery and business continuity testing, I began to consider how we communicate during a disaster. We do so not with normal communication methods, but more often than not with an interrupting form of communication—one in which constant requests for updates, criticisms, and outright demands for attention are directed …
Windows 8: A Worthy Successor to Bob
If Microsoft acts as expected and launches Threshold as Windows 9, this will very likely result in the adoption of Windows 8’s failing to surpass Vista’s sorry 18.8%, firmly positioning Windows 8 as Microsoft’s biggest failure since Bob.
Security Wrapped Data
On the July third Virtualization Security Podcast, we discussed mobile security with Harry Labana, CPO of CloudVolumes, and Ben Goodman of VMware. Actually, it was not necessarily about mobile security as much as it was about security in accessing corporate data from mobile devices, regardless of device and location of data. What came out of …