OpenPaas and CloudBees: Java in the Cloud. Is vendor lockin eliminated?
Read MoreWe all know itās vitally important to protect our computers, but it can be confusing when you donāt really know what kind of protection you need.Ā Hereās a quick review of what you should know. Firewall: A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of…
Read MoreA year ago we posted a compendium of Cloud and Cloud Security resources. This posting has been consistently among the top hits to the Cloud Security Blog proving that, when it comes to Cloud the one thing we all need is clarity!
Two of the most useful resources…
Is Virtualization stupid? It forces guest VMs sharing a host to do the same things over and over, without sharing. It takes up countless hours of otherwise useful – and expensive – server time.
Read MoreBluetooth technology lets you set up a wireless network that can be used to connect any devices that are equipped with the technology. Bluetooth is used in a wide variety of devices, including home entertainment systems, phones, and computers. One of the most widely used implementations of Bluetooth is headsets for cell phones. Bluetooth can…
Read MoreIn a recent eWeek interview, Citrix CTO Simon Crosby described Conficker malware as āthe worldās largest cloud.ā Heās right. Cybercriminals use Conficker to create massive clouds of remotely-controlled PCs capable of carrying out a variety of cyber-attacks, including DDoS (Distributed Denial of Service) attacks on a scale larger than any centralized cloud provider could. We…
Read More