s on the payroll than Harvard and MIT combined.
s on the payroll than Harvard and MIT combined. But one thing that struck me and several of my colleagues, based on audience reaction to the various sessions, was just how early we are yet in the lifecycle of virtualization technologies.
The only ones we ever catch and prosecute are the dumbest ones.
I demanded an explanation.
Creating open source storage software is difficult today because doing so requires access to a broad range of storage technologies, many of which are proprietary and undocumented. While there are plenty of server virtualization solutions and tools that support or are based on open source, there has been comparatively little movement on open source storage virtualization. Meanwhile, reader John R.
All Internet browsers are full of holes. And, yes, there are more.
Meanwhile, reader John R. This technology is pretty new, but there are bigger vendors working on it.
Frank gave me a very short list of what every company should be doing.
I demanded an explanation. By comparison, those same respondents felt that storage virtualization could only be achieved expensively and with difficulty, and that they expected to use a solution from a single vendor. While much of the software industry has been drifting steadily toward open source, storage remains staunchly proprietary. Incipient plans to extend future versions to director-class switches from Brocade as well as mid-tier products. The only thing worse to contemplate on this issue is how much longer it will truly take before anybody does anything about it.
By contrast, a template for an archive copy of the same database would use less-expensive SATA drives and prescribe no snapshots. Last week, a class of mine asked which vendor had the best security.
The researchers tend to be clustered in the United States or Europe, rendering them less relevant in faster-growing global markets. Incipient plans to extend future versions to director-class switches from Brocade as well as mid-tier products. I do it for a living, and rarely do I have to wait more than a few minutes for complete network access.
I demanded an explanation. Again, for me, that needs to be as deep as possible.
To put it in the context of a typical crime, a pretexter might then sell that information to people who might want to do bad things to that individual.
Solutions will drag on forever. ISS has one, called Proventa, and Symantec also has one called Critical System Protection. Our enterprise customers are more adventurous, but so far, only host intrusion is showing enough progress that we might start recommending it as early as next year for full implementations. The only ones we ever catch and prosecute are the dumbest ones.
s on the payroll than Harvard and MIT combined.

Reply via email to