Posts in "tech"

You are being watched over by twentysomething computer handlers who can be bought with foosball, free sodas and easily approved car loans.
You are being watched over by twentysomething computer handlers who can be bought with foosball, free sodas and easily approved car loans.

Dell now using Puppet for it's private cloud box

This is the private cloud in a box that Dell doesn’t call a “private cloud.” It’s converged infrastructure. Adding in Puppet is great and certainly makes it feel more cloudy. Dell has spent a long time, with several acquistions, trying to get ActiveSystems just right. As TPM sums it up: Active System Manager is largely based on a sophisticated set of infrastructure management tools that Dell took over and rebranded after it acquired Gale Technologies in November 2012 for an undisclosed sum.

Dell now using Puppet for it's private cloud box

This is the private cloud in a box that Dell doesn’t call a “private cloud.” It’s converged infrastructure. Adding in Puppet is great and certainly makes it feel more cloudy. Dell has spent a long time, with several acquistions, trying to get ActiveSystems just right. As TPM sums it up: Active System Manager is largely based on a sophisticated set of infrastructure management tools that Dell took over and rebranded after it acquired Gale Technologies in November 2012 for an undisclosed sum.

Dell now using Puppet for it's private cloud box

This is the private cloud in a box that Dell doesn’t call a “private cloud.” It’s converged infrastructure. Adding in Puppet is great and certainly makes it feel more cloudy. Dell has spent a long time, with several acquistions, trying to get ActiveSystems just right. As TPM sums it up: Active System Manager is largely based on a sophisticated set of infrastructure management tools that Dell took over and rebranded after it acquired Gale Technologies in November 2012 for an undisclosed sum.

Finding patterns of misbehavior

Palantir got its start building software that helps tie disparate databases together to make it easier to search and analyze information. The technology proved to be a big hit among police agencies and intelligence services that wanted to illuminate patterns of behavior among individuals and manage large volumes of data more efficiently. Wall Street firms have since emerged as Palantir’s biggest customers, using the company’s software to detect fraud and evaluate loans, among other things.

Finding patterns of misbehavior

Palantir got its start building software that helps tie disparate databases together to make it easier to search and analyze information. The technology proved to be a big hit among police agencies and intelligence services that wanted to illuminate patterns of behavior among individuals and manage large volumes of data more efficiently. Wall Street firms have since emerged as Palantir’s biggest customers, using the company’s software to detect fraud and evaluate loans, among other things.

Finding patterns of misbehavior

Palantir got its start building software that helps tie disparate databases together to make it easier to search and analyze information. The technology proved to be a big hit among police agencies and intelligence services that wanted to illuminate patterns of behavior among individuals and manage large volumes of data more efficiently. Wall Street firms have since emerged as Palantir’s biggest customers, using the company’s software to detect fraud and evaluate loans, among other things.

Maybe MDM is sort of silly

Arguably, there are still data on these devices, such as local copies of corporate email that might contain sensitive information. However, does the risk of unauthorized access to the average user’s email account and the loss of a $300 piece of hardware necessitate specialized technologies and a cadre of staff to implement and monitor them? Most security people would argue that there’s a far greater risk of an employee giving away passwords to an authoritative voice on the other end of a phone than a carefully orchestrated theft of a mobile device.

Maybe MDM is sort of silly

Arguably, there are still data on these devices, such as local copies of corporate email that might contain sensitive information. However, does the risk of unauthorized access to the average user’s email account and the loss of a $300 piece of hardware necessitate specialized technologies and a cadre of staff to implement and monitor them? Most security people would argue that there’s a far greater risk of an employee giving away passwords to an authoritative voice on the other end of a phone than a carefully orchestrated theft of a mobile device.