The “Cloud” is a technology that provides incredible convenience and flexibility. In fact, because of the cloud, I’m able to write this from the coffee house I’m at where I sometimes go to work. However, the cloud has significant limits that may outweigh its benefits.
It seems as though my television addiction has spilled into my real life activities. I’ve been wondering if my reliance on technology has gone too far. Is this the first step on the path to becoming a Luddite?
A brief experience using the new Apple Maps.
Not an exhaustive analysis, just a brief story telling of why I’m going to keep using Google for driving directions.
Think putting your IT in the cloud means you don’t have to think about disaster recovery any more? Guess again. The world of Information Technology (IT) has continued to grow and evolve at a rapid pace. Consumerization of IT and easy access to cloud technologies has had people from every functional area of businesses subscribing […]
Ever wonder what the differences are between programming languages? Check out this humorous and handy guide.
The six stages of debugging. For all my programmer and development friends out there, this was forwarded to me earlier today. What? That can’t happen. Well that doesn’t happen on my machine. That shouldn’t happen. Why does that happen? Oh… I see. How did that ever work? Source: http://plasmasturm.org/log/6debug/
All seemed well with backup operations at my company, until I got a visit from an operations center engineer. The lock already hanging open, he was holding one of the “secure” transports that our off-site tape storage vendor uses to move backup tapes. But this time, the tapes inside were not ours—someone else’s data was in our hands. I couldn’t help but think: how many times have our tapes been sent into our competitors’ hands? Did they send them back immediately as I did—or did they land in less scrupulous places? In this article, I’m going to show you how systemic thinking helps identify security vulnerabilities like this one in your company’s data backup systems, particularly related to issues around backup tapes.
You will learn:
– Factors to consider before you move to a tapeless data backup system
– Encryption challenges and opportunities-related to keeping your off-site data secure
– Approaches for backup tape reduction and legacy storage technology elimination
Backup and documentation are together the most-often neglected facets of IT operational management. Why? Backups usually don’t contribute directly to revenue generation. But this is a fatal mistake: ignoring backup and documentation can cost a corporation millions of dollars, even in typical litigation or disaster recovery scenarios.