Can virtual marketplaces for magical D&D weapons really be used for laundering real-world cash from criminal enterprises?
Spying in virtual worlds
Posts in "BigCo"
Spying in virtual worlds
Can virtual marketplaces for magical D&D weapons really be used for laundering real-world cash from criminal enterprises?
Spying in virtual worlds
IBM developing cloud storage broker software
The software provides a single interface that administrators can use to spread data across multiple cloud vendors. Administrators can specify which cloud providers to use through a point-and-click interface. Both file and block storage is supported, though not object storage. The software contains mechanisms for encrypting data so that it remains secure as it crosses the network and resides on the external storage services.
IBM developing cloud storage broker software
IBM developing cloud storage broker software
The software provides a single interface that administrators can use to spread data across multiple cloud vendors. Administrators can specify which cloud providers to use through a point-and-click interface. Both file and block storage is supported, though not object storage. The software contains mechanisms for encrypting data so that it remains secure as it crosses the network and resides on the external storage services.
IBM developing cloud storage broker software
IBM developing cloud storage broker software
The software provides a single interface that administrators can use to spread data across multiple cloud vendors. Administrators can specify which cloud providers to use through a point-and-click interface. Both file and block storage is supported, though not object storage. The software contains mechanisms for encrypting data so that it remains secure as it crosses the network and resides on the external storage services.
IBM developing cloud storage broker software
Dell now using Puppet for it's private cloud box
This is the private cloud in a box that Dell doesn’t call a “private cloud.” It’s converged infrastructure. Adding in Puppet is great and certainly makes it feel more cloudy.
Dell has spent a long time, with several acquistions, trying to get ActiveSystems just right. As TPM sums it up:
Active System Manager is largely based on a sophisticated set of infrastructure management tools that Dell took over and rebranded after it acquired Gale Technologies in November 2012 for an undisclosed sum.
Dell now using Puppet for it's private cloud box
This is the private cloud in a box that Dell doesn’t call a “private cloud.” It’s converged infrastructure. Adding in Puppet is great and certainly makes it feel more cloudy.
Dell has spent a long time, with several acquistions, trying to get ActiveSystems just right. As TPM sums it up:
Active System Manager is largely based on a sophisticated set of infrastructure management tools that Dell took over and rebranded after it acquired Gale Technologies in November 2012 for an undisclosed sum.
Dell now using Puppet for it's private cloud box
This is the private cloud in a box that Dell doesn’t call a “private cloud.” It’s converged infrastructure. Adding in Puppet is great and certainly makes it feel more cloudy.
Dell has spent a long time, with several acquistions, trying to get ActiveSystems just right. As TPM sums it up:
Active System Manager is largely based on a sophisticated set of infrastructure management tools that Dell took over and rebranded after it acquired Gale Technologies in November 2012 for an undisclosed sum.
Maybe MDM is sort of silly
Arguably, there are still data on these devices, such as local copies of corporate email that might contain sensitive information. However, does the risk of unauthorized access to the average user’s email account and the loss of a $300 piece of hardware necessitate specialized technologies and a cadre of staff to implement and monitor them? Most security people would argue that there’s a far greater risk of an employee giving away passwords to an authoritative voice on the other end of a phone than a carefully orchestrated theft of a mobile device.
Maybe MDM is sort of silly
Arguably, there are still data on these devices, such as local copies of corporate email that might contain sensitive information. However, does the risk of unauthorized access to the average user’s email account and the loss of a $300 piece of hardware necessitate specialized technologies and a cadre of staff to implement and monitor them? Most security people would argue that there’s a far greater risk of an employee giving away passwords to an authoritative voice on the other end of a phone than a carefully orchestrated theft of a mobile device.