Destroy Your Infrastructure
The state of the industry is now and has long been driven by companies selling easy solutions to the incredibly difficult problem of meeting the conflicting goals of performance, usability, […]
The state of the industry is now and has long been driven by companies selling easy solutions to the incredibly difficult problem of meeting the conflicting goals of performance, usability, […]
It’s nice that geeks are cool now. Now there are a lot of people who say they’re hardcore. Here’s some of them: These stereotypes are not who I’m going to […]
Toorcamp was many things this year. It was fun. It was uncomfortable. Dustdevils ate things occasionally. It was turbulent due to the trouble with Levitate to get hackers to help […]
So that covers how I have made my contacts sane and available. What about calendars? I have a bit of a complicated life, so I have a few different types […]
There was recent news about how Amazon was down for two hours. Speculation runs rampant on cnet about the cause: “It doesn’t seem to be the result of a network-initiated […]
I have no sympathy for the consumers of Solid Oak as discussed, if that is the right word, in the well circulated Chloe Albanesius article dramatically entitled “Update: Symantec Screwup […]
This is a presentation that I gave earlier this week at the ITCi Conference in San Diego, California. It was requested that I speak about security and compliance metrics, and […]
This is no simple task as there is a lot of sales material that will promise anything, but from the presentation of the architecture and real-world benchmarking, a clear image may present itself.Two of the large commercial research firms authored materials were also gathered to assist in this mater, though one of them was shockingly inaccurate, unfamiliar with the history and utility of the tools in practice, and offered some very poor advice in its conclusions. Unfortunately this is all too common in my experience with commercial research, so the wise buyer of capital investment level hardware and software would be best served to spend the time evaluating each architecture, dependancies, and challenges if they are able.That being said, I will begin my presentation: A SIM implementation has the ability to solve a variety of problems at once due to its evolution from a log management platform.