Webinar: Disaster Recovery for Virtual Environments, One Simple Solution for Five Common SAN Replication Challenges

This is a replay of webinar, I ran last year.. the associated Whitepaper is linked below:

Whitepaper Available here: http://wp.me/p2ZZG3-fG

A new sister webinar/whitepaper focusing on using SAN snapshots in a holistic data protection strategy to be posted shortly.

Whitepaper: Disaster Recovery for Virtual Environments, One Simple Solution for Five Common SAN Replication Challenges

Introduction It would be no overstatement of fact to say that in the last five years virtualization has radically changed the landscape of IT infrastructure for the better. Workloads encapsulated into standardized virtual machines have significantly increased our ability to optimize and use physical resources in a way that saves much time and money. In addition to these economic benefits, new avenues have opened up to tackle data protection and disaster recovery, allowing us to increase service uptime while also reducing business risk. This white paper focuses on some of the common challenges experienced while implementing and using SAN-based replication for disaster recovery and it examines an alternative approach to disaster recovery to help resolve these issues.

Background Pre-virtualization disaster recovery plans were underpinned by application-level features hooking directly into specific hardware to achieve the required business recovery goals. To ensure that disaster recovery could be achieved, network infrastructure, hardware, software […]

A Short History of Storage Devices

I can’t really ever see myself being a technology historian, but I do find the development of technology and technology advancements astonishing at times. It’s easy to forget that some years ago, I used to think that my new 20MB hard drive was the bees knees.. “It’s 20MB of Hard Disk Drive, I’ll never need to upgrade it. I could store my entire life’s work on it and still have room to back up my floppies.”. How times change. I recently found this infographic on the spamfighter blog which I think summarizes the rise of storage perfectly. Check out the difference in per GB cost between 1980-2010:

As A Service, Cloud Services Defined

I recently turned to my long suffering fiancee and requested that she deliver me BaaS (Breakfast As A Service) every morning. The request wasn’t well received, and neither was the long winded explanation about how everything else is available as a service these days, so why not breakfast. Needless to say, I have been making breakfast for weeks.

AAS (As A Service) is one of those marketing tag lines which seems to have taken hold and gained great tracking across the IT industry. Perhaps the most prominent of these is SaaS – Software As A Service. In this post, we’re going to explore where this paradigm has come from and we’ll look at some of the more visible acronyms out there.

From Product to Service

Historically, the majority of Information Technology was provided to organisations by software development companies, who would create products and then sell licenses to use […]

Cloud Computing/Virtualization vs Grid Computing Projects.

This article discusses the industry trend to move towards cloud computing services/infrastructure and the possible impact this may have (or have already had) on ongoing grid computing voluntary projects. We will first cover in brief definitions of cloud computing, virtualization and grid computing. Subsequently, we look at possible declines in grid computing processing being caused by the efficiencies of moving to cloud services.

What is Grid Computing?

Grid computing is a computer processing model which takes large computational tasks and splits them into smaller sub-tasks. These sub-tasks are then distributed across a network of computer processors, each doing a small part of the overall job. The sub-task results are then passed back to the central grid node for inclusion and correlation in the overall project results.

One of the pioneer projects in the field of grid computing was the SETI At Home project initiated a Berkeley University in 1999. […]

Whitepaper: Command Email – A New Military Message

It’s been a few months since my last blog. As always work commitments come first and it’s been a bumper couple of months. I’ve been studying the military messaging environment and how it is evolving and summarized my findings in this whitepaper. The main thrust is that organisations should be considering moving away from traditional Military Message Handling Systems (MMHS) approaches in favour of lighter, simpler, COTS based, modular and more cost-effective solutions.

“ The secret of war lies in the communications”

Napoleon Bonaparte

  The ability to communicate effectively and without ambiguity has been, and continues to be, instrumental to the success of military organisations across the world. Throughout history military organisations have pushed the boundaries of communication. Military messaging has evolved from smoke signals, to written letters, to telegraphs, to radio, to email and to unified communications today. Sending messages between organisations, units, roles and individuals is paramount to […]

Google Sniff-View Cars?

Probably one of the more interesting news stories this month is the revelation of Google admitting that it packet sniffed on unsecured public Wi-fi networks. Read news here.

It appears that Google Street View cars were driving around taking pictures of various locations, but were also kitted out with network sniffers that could connect to unsecured public wi-fi access points, monitor and record data transmissions across those networks. Naughty stuff Google. This went on for a total of 3 years and accordingly to Google the activity was a “simple mistake”. This continues to re-affirm beliefs that public Wi-fi networks are serious security risks for both individuals and companies. If one of the world’s largest IT monopolies can do this by accident, cough, what could a determined plan of attack achieve.

So how did they do it? The answer is, without rocket science. It’s easy enough to connect a laptop […]

How secure is my wireless network? Four Tips to bump up security.

Do you think your wireless network is secure?

If the answer is yes. The BackTrack (BackTrack 4 – www.backtrack-linux.org) pentration testing OS would beg to differ.

BackTrack 4 manifests itself in an entirely customised distribution of Linux. The underlying Linux distro is Ubuntu, but has been specifically enhanced, configured and packaged for the purposes of penetration testing. Within the package you receive a wide variety of wireless cracking, network scanning and password breaking tools.

There are several options you can select for running BackTrack to start your activities. You can install it as an OS on your harddrive, you can install it and run it from a USB stick and you can even run the entire OS from CD. The latter option requires no installation at all. You simply select a machine, boot from the CD and then remove the CD when finished. I chose the latter option for […]