Archive

Category Archives for "Networking"

Moving to the cloud? Willing to talk about it on Datanauts?

The Datanauts Podcast is looking for enterprise infrastructure folks who have worked on a project to migrate applications from in-house to the cloud. Interested in being a guest? Ping me -- [email protected] -- and let us know. You can be anonymous if you like, and you don't have to use your company name.

The post Moving to the cloud? Willing to talk about it on Datanauts? appeared first on Packet Pushers.

How will Dell justify its massive payout for EMC?

Dell's $67 billion acquisition of EMC stacks up as the largest technology deal in history. But if Michael Dell is gobbling up storage giant EMC in an attempt to stem the tide of movement from on-premise proprietary data centers to the cloud, it might be too little too late. Aside from merely bulking up, what exactly is Dell trying to do with EMC? If he hopes to leverage his new toy and its 83% stake in VMware to move deeper into the cloud, then this deal could end up justifying its enormous price tag. In a conference call about the deal, EMC CEO Joe Tucci reportedly claimed that being part of Dell as a private company would speed the development of cloud-based technologies.To read this article in full or to leave a comment, please click here

Even if you’re not in healthcare, use HIPAA to safeguard that cloud app

 If you’re thinking about migrating a highly sensitive application to the cloud, consider using HIPAA requirements as a way to vet potential providers.

Federal law requires organizations dealing with private health information to adhere to strict security guidelines defined by the Health Insurance Portability and Accountability Act (HIPAA). Given that HIPAA regulations are an excellent risk-management strategy, non-healthcare companies can use a HIPAA-compliant strategy to protect sensitive information like credit card numbers and private customer information.

HIPAA compliance requires businesses to “maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting e-PHI (Electronic Personal Health Information),” but this could apply to any dataset. At a high level, here’s what you get with HIPAA compliance:

To read this article in full or to leave a comment, please click here

VMware brings Michigan to Europe to boost virtual networking

VMware is taking Michigan to Europe as it works to make networking as secure in the hybrid cloud as it can be in a private datacenter. At its VMworld Europe conference, it unveiled new features and tools to make it easier to roll applications out to its unified hybrid cloud platform, expanding the range of management functions available on its public cloud, vCloud Air, which can be linked with private clouds using vSphere. The company also previewed a new technology, Project Michigan, that can deploy a secure enterprise gateway across vCloud Air offerings, including Disaster Recovery and Dedicated Cloud services. It will support VM migration and network and policy extension with low downtime through Hybrid Cloud Manager. It can be used to spin up thousands of virtual machines with secure connectivity on demand, it said.To read this article in full or to leave a comment, please click here

Google Graveyard: What Google has killed off in 2015

Six feet deepGoogle is truly a company that has more technology and products than it can handle sometimes, and in 2015 the company with the recent name change shed a host of tools and products to enable it to focus on more pressing needs. Here’s a look back at what Google this year has offed or announced plans to off (To go back even further, check out 2014’s Google Graveyard.)To read this article in full or to leave a comment, please click here

To scare people better, Android ransomware gets a snazzy UI

Hackers are like any other coders: they want to built better software, even if it's a program that merely aims to extract a ransom from a hapless Android user.Symantec said it has seen a new version of the Porn Droid ransomware that uses Google's custom-built design language, Material Design, to create more intimidating warnings.Discovered last year, Porn Droid purports to be an adult content viewer. If installed, it locks a device and warns that users have viewed illicit pornography and demands a ransom. The app has been seen on third-party Android application marketplaces or forums for pirated software.To read this article in full or to leave a comment, please click here

FlexVPN QoS

This post will cover several most common QoS configuration techniques for Multipoint VPNs. Focus will be on FlexVPN DMVPN, however most of the conclusions will be applicable to the traditional DMVPN as well. Assumptions Most of the FlexVPN and DMVPN deployments use Internet as a WAN transport. This creates a very unique set of requirements […]

The post FlexVPN QoS appeared first on Packet Pushers.