Yesterday, I blogged about the “good-enough” network. You know, it’s a network that just good enough to send out a quick email or watch a video, but not quite fast or reliable enough to do everything you need.
It may be easier to think of the good-enough network in terms of other areas of your life where good enough just doesn’t cut it.
For instance, a 19-inch tube TV is certainly good enough for watching reruns of “Magnum P.I.,” but not for watching the big game.
Or using SPF 5 sunscreen may be good enough, but SPF 30 is a way better option if you want to avoid a sunburn.
Just imagine if your customers settled for a good-enough network? It may go something like this:
What are the seven myths about the good-enough network? Read More »
Unless you have been living under a rock for the past few years – and perhaps even then – you have undoubtedly heard someone touting the merits of virtualization and cloud computing. Chief among the advantages are reduced costs and the capability to do more with fewer resources.
Although the terms are often used simultaneously, cloud and virtualization aren’t the same. Click below for a brief discussion of each.
Improve hardware use and manageability as well as reduce costs with storage virtualization.
Virtualization was initially developed for large companies to make their infrastructure, particularly servers and storage, operate more efficiently and to cut spending costs on new hardware. Like many technologies, server and storage virtualization products are now being developed for small businesses to bring the same benefits to their networks.
Many smaller companies start by creating a virtualized server environment. Using hypervisor software, you can divide a single server into multiple virtual servers, each one running its own operating system and associated workload. This lets one server run many more different applications than the one operating system, one workload model of an un-virtualized server.
Yes, the question is “Are you really secure?” Now that I’ve asked a loaded question, let me get to the point.
The term “secure” sure has a lot of different meanings depending on the context in which it is used. If we take it from a corporate security perspective, your options are somewhat limited to physical security, as in video surveillance or physical access, or logical security, as in your laptop or data access. But, when you ask a security professional if they are secure, they will most certainly take that in the context of what they can control, and will most likely answer “yes”.
Well, what about the things you cannot control? You can control which products you buy to provide security, you control how they are installed and configured, and you control the processes and procedures that identify how they are managed and updated. But, can you control how they are manufactured?