Haiti EarthQuake Relief Live Breaking News From Major News Wires

Haiti EarthQuake

Subscribe to Haiti EarthQuake: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Haiti EarthQuake: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

It’s conference season and, as you might expect, Jason and I have been on the road covering a bunch of them. It’s always great to see what the disruptive players in the market are doing — and this year did not disappoint. But there is one thing that repeatedly happens that just gets under my skin: transformation-washing. As Jason explained in a Forbes article over a year ago, ‘washing’ is when a vendor (or pundit) applies a buzzword loosely in an overt attempt to attach themselves to its buzz. And transformation-washing is rampant. At virtually every event vendors bombarded the attendees with all the reasons that this tool or that solution was the driving force behind digital transformation. Unquestionably, many of these tools are innovative and represent genuine breakthroughs. But no tool, in and of itself, can lay claim to being digital transformation-in-a-bottle.... (more)

Apple’s Magical Lie

By: Ian Gillespie Warning: I am not an Information Security expert – I am the Lead Designer at Hurricane Labs. I do not know the detailed best practices of securing a network or how to set up a SIEM such as Splunk. You may be asking yourself, “Why the heck is this guy even writing an article on a blog about Information Security?!” Hold on a second – what I propose is an outsider’s perspective on the idea of information security as a whole. My perspective may not be the same as that of an information security specialist, but that’s the point. The purpose of this article is to hopefully be entertaining, but to also allow me to rant, or vent my frustrations with things having to do with security – whether it be company practices, or even just the way we share our information on social networks. I hope to write a few blog posts in the coming weeks. Hopefully you will g... (more)

Top Cloud Security Threats

To say that cloud security for cloud computing is gaining traction would be the understatement of our era.  Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud.  Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base.  What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing? But, there are dangers in the cloud computing jungle and cloud security measures must be put in place to eliminate and resolve them.  According to the Cloud Security Alliance, three types of threats have worsened between 2010 and today. Data Breaches Data Loss Account or Service Traffic Hijacking Let’s explore how proper ... (more)

Tweeps Are People Too! By @Kevin_Jackson | @CloudExpo [#Cloud]

I woke up this morning to the devastating news about the earthquake in Nepal. Sitting here in California that destruction is literally on the other side of the world but my mind immediately went to thinking about my good friend Jeremy Geelan. See Jeremy and his family have been living in Kathmandu for a while now. His wife, in fact, is the Danish Ambassador to Nepal! Being a social media kind of guy, I immediately went online to see if Jeremy was active, but then the other shoe dropped. I realized that I was selfishly neglecting my global online readership! A quick look at TweepsMap confirmed that I had at least 10 tweeps in Kathmandu and another in Itahari, Sunsari, in the eastern part of the country!! After sending out a few queries on Twitter and Facebook I soon received word that Jeremy and family were OK. I also had exchanges with a few other readers, the first... (more)

Citizen Journalism and Tweets Bring Haiti’s Horror to the World

CNN has people on the ground in Port Au Prince. They use high performance satellite phones and transmission equipment to bring a few shots from Anderson Cooper and Sanjay Gupta to world viewers. That is what we expect from CNN. Then CNN begins the roll call of tweets from people within Haiti bringing real time news. Continuing with interviews using Skype with video direct from Haiti. And the innovative ideas on how to get the word out continue. Fox news, MSNBC, all the major US news sources quote the information they are getting from the ground, or show videos received via Titter and other social media tools. Most of the news we are getting via twitter and social media is raw, simply passing on a snapshot in time. Then the news casters, with their back office of analysts and experts, are able to translate the news into a consumable item for American and internation... (more)

Life Without Internet in Ethiopia

For the first time in over ten years, I spent the night without Internet access. Ten years of working in remote parts of Mongolia, Vietnam, Palestine, Indonesia, and other small and developing countries, and in March 2010 I finally hit the access wall. My hotel in Addis Ababa does not have Internet access. And not a single WiFi or wireless connection available nearby. Maybe it is just not realistic to believe that in the year 2010 travelers or residents of a major city like Addis Ababa would enjoy the same sense of Internet entitlement we enjoy in other parts of the world.  It is probably more realistic to think fresh water is a higher priority than Facebook.  Probably a higher priority to think that basic nutrition is a higher priority to some people in the world than Twitter. Having been plucked up from the opulence of Burbank, California, where Friday afternoon b... (more)

L’Europe face aux défis des infrastructures Cloud Computing

Cloud Expo Europe La décennie 2010 - 2020 sera celle du Cloud Computing ; c’est un message que je répète sur ce blog depuis longtemps et il est maintenant bien accepté par tous les fournisseurs, y compris les «historiques», par la grande majorité des responsables informatiques. Les deux composantes techniques majeures de cette révolution Cloud Computing sont les infrastructures et les usages, en mode SaaS, Software as a Service. Pour ces deux composantes, les conditions de la réussite sont très différentes. Je suis extrêmement pessimiste sur la capacité de l’Europe à réussir dans les infrastructures Cloud, et ... raisonnablement optimiste dans les usages. Je vais me concentrer, dans ce texte, sur les infrastructures, les fondations du Tsunami Cloud Computing. Infrastructures Cloud : les conditions de la réussite Amazon et Google ont montré la voie ; d’autres acteurs, c... (more)

Creating a Hybrid ADN Architecture with Both Virtual and Physical ADCs

The virtualization of network and application network infrastructure is the second wave of the virtualization tsunami to hit the shores of the data center. Unlike server virtualization, because of its unique role in the data center, Application Delivery Controller (ADC) virtualization brings with it architectural implications that make a simple virtual-for-physical replacement strategy unacceptable. But there are appropriate places across the data center and organization where virtualized ADCs can be leveraged as stand-alone solutions, as well as in conjunction with its physical predecessor, to enable a more dynamic data center without compromising reliability, scalability, and performance. You can download the full white paper from f5.com here: hybrid-adn-architecture.pdf Download now or listen on posterous AudioWP_-_Creating_a_Hybrid_ADN_Architecture_with_both_Vir... (more)

The Devops Butterfly Effect

A single configuration error can have far flung impact across IT and the business Chaos theory claims a butterfly flapping its wings in one area of the world can result in a hurricane elsewhere. The impact of devops – or the lack thereof – may not be as devastating, but it does have an impact in terms of time, money and risk. ... (more)

Take Social Media Privacy Into Your Own Hands

By Steve McMaster - I’ve gotten in a lot of arguments lately about one of the latest “hot topics” in the end-user side of technology – privacy. With some of the biggest names in Social Media doing a really bad job of it (and I’m not even just talking about leaked passwords), it’s something that’s throwing itself in the face of many average, day-to-day computer users. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer. But here’s my gripe for you. Facebook has, as of April 2012, 901 million active members (according to Wikipedia). If Facebook were a country, it would be ranked 3rd in the world by population. And it seems every week, they’re in the news again, someone ranting about their privacy on Facebook. My fav... (more)

Training Center – Grand Opening Open House

Hurricane Labs and Information Security Summit are pleased to announce the Grand Opening of their new Corporate Training Center located at 4401 Rockside Road in Independence, Ohio. Featuring state of the art classroom technology, a large classroom for up to 30 students, 2 breakout rooms and a recording studio ideal for podcasting, the training center will be used by several hundred professionals from around the country. We offer a diverse array of training programs for Chief Security Officers, Security Managers, Network and Security Architects and Engineers, and other IT Professionals. We also provide ongoing learning experiences for a full range of employees within your organization to enforce security on all levels of the spectrum. Whether you are looking into firewall management or social media policies, we’ve got you covered. Our Training Center can accommodate ... (more)