<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7722884</id><updated>2024-09-09T13:03:51.556-07:00</updated><category term="center"/><category term="data"/><category term="antivirus"/><category term="data storage"/><category term="disaster recovery"/><category term="disaster-recovery"/><category term="software"/><category term="technology"/><category term="virtualization"/><category term="SMART"/><category term="akamai"/><category term="amazon"/><category term="amazon web services"/><category term="botnets"/><category term="bush"/><category term="business continuity"/><category term="change"/><category term="consolidation"/><category term="data center"/><category term="data center management"/><category term="disk storage"/><category term="drive"/><category term="ec2"/><category term="elastic compute cloud"/><category term="electricity"/><category term="google"/><category term="green data center"/><category term="hard"/><category term="ibm"/><category term="job"/><category term="katrina"/><category term="kraken"/><category term="mcafee"/><category term="mitigation plan"/><category term="network-administrator"/><category term="norton"/><category term="operations"/><category term="power"/><category term="president"/><category term="save power"/><category term="security"/><category term="server"/><category term="server consolidation"/><category term="server virtualization"/><category term="simple storage services"/><category term="storm"/><category term="sun"/><category term="terremerk"/><category term="unix"/><category term="virus"/><category term="virus-hoax"/><category term="virus-hoaxes"/><title type='text'>A business continuity,disaster recovery,disk storage,disk recovery consultant!So boring?</title><subtitle type='html'>A disaster recovery business continuity planning consultant - and claim to know all about data storage and disk recovery- but people find me boring.. so strange..</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default?alt=atom&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default?alt=atom&amp;start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>70</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7722884.post-1361761647366221615</id><published>2010-12-10T22:10:00.000-08:00</published><updated>2010-12-10T22:18:50.618-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="change"/><category scheme="http://www.blogger.com/atom/ns#" term="data center management"/><category scheme="http://www.blogger.com/atom/ns#" term="job"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Data center management - should I quit the profession?</title><content type='html'>&lt;H3&gt;Data center management is such a tireless profession- should I quit it?&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Should I quit this data center management profession and get a more &quot;normal&quot; job? This &lt;strong&gt;data center management&lt;/strong&gt; job implies waking up at odd hours to answer the cell phone and have my family curse me every day&lt;/p&gt;&lt;br /&gt;&lt;p&gt;The only thing that seems to have changed in my data center management job is the move from beepers to rickety Motorola phones to a sleek IPhone. But irrespective, there is always a crisis situation that needs resolving&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Data center management is simply not worth it&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;I started as a &lt;em&gt;data center engineer &lt;/em&gt;specializing in Unix servers, and now &lt;em&gt;head the entire data center &lt;/em&gt;but life hasnt changed much. My data center management job dominates my life and my family has been urging me to change my job for quite a while, but &quot;job inertia&quot; and the fear of going to another profession hold me back.&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Do you think a data center management guy like me has any chance in another profession&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;All I long for is a 9x5 job and no production breakdown calls at night..&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/1361761647366221615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/1361761647366221615' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/1361761647366221615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/1361761647366221615'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2010/12/data-center-management-should-i-quit.html' title='Data center management - should I quit the profession?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-5985647226996276651</id><published>2008-08-24T00:08:00.000-07:00</published><updated>2008-08-24T05:08:42.038-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data center"/><category scheme="http://www.blogger.com/atom/ns#" term="data storage"/><category scheme="http://www.blogger.com/atom/ns#" term="green data center"/><category scheme="http://www.blogger.com/atom/ns#" term="power"/><category scheme="http://www.blogger.com/atom/ns#" term="save power"/><category scheme="http://www.blogger.com/atom/ns#" term="server consolidation"/><category scheme="http://www.blogger.com/atom/ns#" term="server virtualization"/><category scheme="http://www.blogger.com/atom/ns#" term="virtualization"/><title type='text'>Data centers to turn green,3 steps to green data centers</title><content type='html'>&lt;h3&gt;Data centers should turn environmentally friendly soon&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;There is a generally global corporate awakening of corporates to ensure that data centers turn environmentally friendly and consume less power&lt;/p&gt;&lt;br /&gt;&lt;p&gt;As soon as the &lt;b&gt;green data center&lt;/b&gt; movement started, corporate boardrooms and conference rooms have been filled with corporate honchos blowing hot air and consuming endless MWs of energy and generally doing nothing about making their data centers environmentally friendly!&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Data storage virtualization holds the key to clean data centers and low power consumption&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;&lt;i&gt;Virtualization&lt;/i&gt; simply means less servers, resulting in lower power consumption at data centers. &lt;i&gt;Data centers&lt;/i&gt; can then exponentially reduce their power consumption, resulting in greener data centers&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Server consolidation is another option for greener data centers&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Server consolidation is obviously a great option for greener data centers. By using server consolidation, one need not invest in the technical expertise of implementing virtualization for the entire data center&lt;/p&gt;&lt;br /&gt;&lt;p&gt;An ideal option is to start with server consolidation, and then slowly move to virtualization, ensuring that the power consumption is minimized even when the virtualization project is underway&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Inventory of your servers at your data center with their power consumption may lead you to some interesting insights for creating a green data center&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;You may be surprised, or rather will be surprised by the good old 80/20 rule in your &lt;u&gt;data center&lt;/u&gt;- just replacing one bad server that consumes too much power or using &lt;i&gt;server consolidation&lt;/i&gt; with one of your larger servers may save you thousands of dollars worth of electricity bills&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Just  remember, a data center not only looks good on your boss&#39; s next appraisal,but is also good for the environment and also your company&#39;s bottomline&lt;/h3&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/5985647226996276651/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/5985647226996276651' title='9 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/5985647226996276651'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/5985647226996276651'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2008/08/data-centers-to-turn-green3-steps-to.html' title='Data centers to turn green,3 steps to green data centers'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>9</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-1983586456965660764</id><published>2008-04-10T06:30:00.000-07:00</published><updated>2008-04-10T07:13:10.156-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="botnets"/><category scheme="http://www.blogger.com/atom/ns#" term="kraken"/><category scheme="http://www.blogger.com/atom/ns#" term="mcafee"/><category scheme="http://www.blogger.com/atom/ns#" term="norton"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="storm"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Kraken- the mother of all botnets strikes</title><content type='html'>&lt;h3&gt;Kraken is apparently the mother of all botnets and has spawned over 300,000 bots&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Rumors in computer network security circles &amp; antivirus forums including SearchSecurity.com suggest that Kraken is probably the world&#39;s most successful botnet&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Kraken,the infamous botnet, has apparently infiltrated Fortune 100 companies across the world&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;Kraken is a botnet&lt;/b&gt; allegedly designed to evade popular antivirus programs such as Norton &amp; McAfee antivirus software. &lt;b&gt;Antivirus programs have failed&lt;/b&gt; to detect and control the &lt;i&gt;Kraken botnet&lt;/i&gt; and the malicious bots are apparently spreading in huge numbers across the corporate world&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;How Kraken,the botnet, evades common antivirus programs such as McAfee and Norton&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Kraken uses complex obfuscation techniques, by altering its binary regularly so that antivirus programs such as McAfee antivirus are unable to detect Kraken.&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;How Kraken appears to the unassuming user&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Kraken infiltrates computers in the following way : Users see an image file,which doesnt load,causing the exe to load malware into the unsuspecting user&#39;s machine. The Kraken .exe then stays on the computer as a bot, ready to infiltrate the entire LAN&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Kraken botnet has built-in redundancy features that prevent easy detection and damage control&lt;/h3&gt;&lt;br /&gt;&lt;P&gt;The Kraken botnet has a redundancy feature wherein once the command servers shut down, the child botnet communicates with a new domain name,preventing damage control by shutting down a few servers&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Kraken botnet is far worse than Storm, the original infamous botnet&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;&lt;u&gt;The Kraken botnet is apparently potentially more dangerous than the Storm botnet&lt;/u&gt; and has infiltrated more computer servers than ever thought before. The Kraken botnet may spread slowly but its redundancy and binary rebuilding features make it more difficult to detect and control Kraken&#39;s damage&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Network administrators need to wake up to the Kraken menace and put pressure on antivirus software makers for an early resolution to the danger posed by Kraken botnets&lt;/h3&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/1983586456965660764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/1983586456965660764' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/1983586456965660764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/1983586456965660764'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2008/04/kraken-mother-of-all-botnets-strikes.html' title='Kraken- the mother of all botnets strikes'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-3631178219370969611</id><published>2008-03-11T03:53:00.000-07:00</published><updated>2008-03-11T04:09:26.492-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="network-administrator"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><category scheme="http://www.blogger.com/atom/ns#" term="virus-hoax"/><category scheme="http://www.blogger.com/atom/ns#" term="virus-hoaxes"/><title type='text'>Virus hoaxes,beware of virus hoaxes</title><content type='html'>&lt;h3&gt;Virus hoaxes probably cause more damage to the antivirus software researchers than the viruses themselves&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;What are virus hoaxes?&lt;/b&gt; Virus hoaxes are messages/emails about viruses that are sent to innocent nice people who think they are doing the antivirus world a favor by forwarding the virus information to the rest of the world&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Well, it usually turns out that it is not a virus after all, and the &lt;i&gt;&quot;virus hoax&quot;&lt;/i&gt; is actually doing more damage than the real viruses by taking up the time of antivirus software researchers and network administrators and even taking up a lot of bandwidth&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Watch out for &lt;b&gt;virus hoaxes&lt;/b&gt;- its not your JOB to let the world know about viruses!&lt;/H3&gt;&lt;br /&gt;&lt;p&gt;The altruistic nature of people who fall for virus hoaxes is appreciated- but people dont realize the damage done by the &lt;b&gt;virus hoaxes&lt;/b&gt;. There are obviously more qualified people who are monitoring and  dealing with viruses on a real time basis.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;As any antivirus software maker&#39;s research department or your own friendly network administrator will testify,please do not try and be the nice guy and forward any information you hear about viruses to either the antivirus software websites or your network administrator&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;In summary, watch out for virus hoaxes and please do not forward any virus related mails&lt;/h3&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/3631178219370969611/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/3631178219370969611' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/3631178219370969611'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/3631178219370969611'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2008/03/virus-hoaxesbeware-of-virus-hoaxes.html' title='Virus hoaxes,beware of virus hoaxes'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-2733047384010942840</id><published>2008-02-09T00:55:00.000-08:00</published><updated>2008-02-09T06:54:26.565-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="akamai"/><category scheme="http://www.blogger.com/atom/ns#" term="amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="amazon web services"/><category scheme="http://www.blogger.com/atom/ns#" term="data storage"/><category scheme="http://www.blogger.com/atom/ns#" term="disk storage"/><category scheme="http://www.blogger.com/atom/ns#" term="ec2"/><category scheme="http://www.blogger.com/atom/ns#" term="elastic compute cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="ibm"/><category scheme="http://www.blogger.com/atom/ns#" term="simple storage services"/><category scheme="http://www.blogger.com/atom/ns#" term="sun"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="terremerk"/><title type='text'>Amazon Web Services&#39; Elastic Compute Cloud,ideal for startup technology companies</title><content type='html'>&lt;h3&gt;Amazon Web Services has introduced the &quot;Elastic Compute Cloud&quot; for easy access to bandwidth and data storage&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;The &quot; Elastic Compute Cloud &quot; is a new innovation from Amazon Web Services that includes inexpensive storage and bandwidth that can be used for small startups.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;The best part of &quot;Amazon Web Services is that it is pay per use- you only pay when you use the server space or bandwidth. As a startup technology company, this is fantastic as the startup companies do not have to pay for expensive fixed cost servers&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;The Elastic Compute Cloud offered by Amazon has competitors but is definitely provided the best value price proposition especially for storage services&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;For example, the Simple Storage Services as part of Amazon Web Services cost just 15 cents for a Gigabyte of data for data storage services. The data storage services offered by Amazon are inexpensively priced compared to Akamai,Terremerk,IBM and Sun Microsystems and will probably be adopted even by major corporations,apart from technology startups&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;A cool innovation from Amazon, the Elastic Compute Cloud or EC2 will revolutionize the data storage industry and wipe out a lot of small data storage companies&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;http://www.amazon.com/gp/browse.html?node=201590011&quot;&gt;Amazon&#39;s Elastic Storage Cloud or EC2&lt;/A&gt;&lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/2733047384010942840/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/2733047384010942840' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/2733047384010942840'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/2733047384010942840'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2008/02/amazon-web-services-elastic-compute.html' title='Amazon Web Services&#39; Elastic Compute Cloud,ideal for startup technology companies'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-2227092489520487732</id><published>2008-02-03T03:08:00.000-08:00</published><updated>2008-02-03T03:17:53.982-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bush"/><category scheme="http://www.blogger.com/atom/ns#" term="disaster recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="disaster-recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="katrina"/><category scheme="http://www.blogger.com/atom/ns#" term="mitigation plan"/><category scheme="http://www.blogger.com/atom/ns#" term="president"/><title type='text'>Kansas Disaster recovery</title><content type='html'>&lt;h3&gt;Kansas disaster recovery-President Bush announces  a disaster recovery package&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;In the aftermath of the Kansas disaster,  &lt;a href=&quot;http://www.fema.gov/news/newsrelease.fema?id=42447&quot;&gt;Bush has announced a disaster recovery package for Kansas &lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Interestingly, this Kansas disaster has prompted an early response from President Bush- the earlier poor response to the Katrina disaster in Florida has obviously alerted President Bush in this election year,where a poor Government response could have meant bad publicity for the Republican party&lt;/p&gt;&lt;br /&gt;&lt;h3&gt;Anyways, irrespective of the reasons, a great response from President Bush to the Kansas disaster&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Interestingly, the Kansas disaster recovery package also includes over 75% support from the Government for future disaster recovery mitigation plans for Kansas city&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/2227092489520487732/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/2227092489520487732' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/2227092489520487732'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/2227092489520487732'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2008/02/kansas-disaster-recovery.html' title='Kansas Disaster recovery'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-7081537651659281340</id><published>2007-02-26T02:20:00.000-08:00</published><updated>2007-02-26T04:59:30.018-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="center"/><category scheme="http://www.blogger.com/atom/ns#" term="consolidation"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="electricity"/><category scheme="http://www.blogger.com/atom/ns#" term="server"/><category scheme="http://www.blogger.com/atom/ns#" term="virtualization"/><title type='text'>Data centers electricity consumption-Amazing facts</title><content type='html'>&lt;h4&gt;Data centers electricity consumption-Amazing facts from AMD&lt;/h4&gt;&lt;br /&gt;&lt;p&gt; AMD has released some amazing data center facts- servers,data center infrastructure and cooling infrastructure consumed around 1.2% of the electricity consumption of the entire US market&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Alternatives to lowering electricity consumption in data centers&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Data centers need to seriously look at data center options such as server consolidation and virtualization, in the aim to use data center server CPU as a service&lt;/p&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Data center server consolidation:In a survey of data centers across the US, I can state with confidence that 80% of servers are operating at below 20% capacity. Data center server consolidation will not only save money for data centers in server cost but also help in reducing precious energy resources such as electricity consumption&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;a href=&quot;http://www.data-recovery-reviews.com/datastorage-virtualization.htm&quot;&gt;Data storage server virtualization&lt;/a&gt;:Data storage server virtualization assists data centers in optimally switching between blade servers to create a true CPU and data storage as a service data center. This server virtualization will also mean that optimal electricity consumption is taking place in the data center&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://enterprise.amd.com/Downloads/svrpwrusecompletefinal.pdf&quot;&gt;Full AMD data center electricity consumption findings&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/7081537651659281340/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/7081537651659281340' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/7081537651659281340'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/7081537651659281340'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/02/data-centers-electricity-consumption.html' title='Data centers electricity consumption-Amazing facts'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-3397694595765610413</id><published>2007-02-20T16:24:00.000-08:00</published><updated>2007-02-20T17:26:06.151-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="center"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="drive"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="hard"/><category scheme="http://www.blogger.com/atom/ns#" term="SMART"/><title type='text'>Google publishes hard drive expose!</title><content type='html'>&lt;h4&gt;Hard drive expose by Google-A hard drive white paper study from Google&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Google has published a document on hard drive failure rates based on the study of hard drives at Google&#39;s data centers&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Google&#39;s hard drive study makes for very interesting reading-and cannot be taken lightly since the sample size of Google&#39;s data centers is very huge&lt;/p&gt;&lt;br /&gt;&lt;H4&gt;Google&#39;s hard drive collapse surprise finding 1:Hard drive failure not correlated highly with temperature&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Google&#39;s hard drive failure study finds that there is no one on one correlation of temperatures with hard drive failure&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Per Google&#39;s hard drive research,new hard drives prefer higher temperatures and older hard drives prefer lower temperatures and are susceptible to reverse temperatures&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Google&#39;s hard drive research is in short suggesting that we shouldn&#39;t assume that all drives are equally susceptible to manufacturers&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Google uses cheap  and a variety hard drives from various manufacturers&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Google operates one of the largest data centers in the world, and amazingly uses cheap hard drives with a combination of  serial and parallel hard disk drives, with speeds from 5400 to 7200 rpm.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Incredible, that Google&#39;s large data centers uses hard drives that may be obsolete elsewhere&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Google&#39;s hard drive research suggests that SMART hard drive parameters are not the only symptoms that aid in preventing hard drive failures&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Firstly,Google extensive use of SMART hard drives (self-monitoring drives) is interesting&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Further,Google&#39;s conclusion about SMART hard drives is a signal to SMART drive manufacturers that the data monitored is not good enough&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Google&#39;s hard drive research summary&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Get rid of hard drives after the &lt;br /&gt;  &lt;ul&gt;&lt;li&gt;Hard drive first scan error&lt;/LI&gt;&lt;br /&gt;&lt;LI&gt;First hard drive sector reallocation error&lt;/li&gt;&lt;br /&gt;&lt;li&gt;The first hard drive probational count error&lt;/LI&gt;&lt;/UL&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/3397694595765610413/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/3397694595765610413' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/3397694595765610413'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/3397694595765610413'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/02/google-publishes-hard-drive-expose.html' title='Google publishes hard drive expose!'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-2513933369265899913</id><published>2007-02-13T19:34:00.000-08:00</published><updated>2007-02-13T19:46:23.680-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="center"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="disaster-recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="operations"/><title type='text'>Disaster recovery-Should disaster recovery centers be local or geographically dispersed?</title><content type='html'>&lt;h4&gt;Should disaster recovery center be local or geographically dispersed&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Disaster recovery centers are typically near shore-close to the geographic region  where the core operations data centers are located.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Is this near-shore disaster recovery location a good idea?&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Disaster recovery centers at near shore locations to data centers have the disadvantage of being used for actual data center operations as a supplementary data center site&lt;/p&gt;&lt;br /&gt;&lt;p&gt;The typical data center scenario: More and more normal operations data center stuff gets pushed to the disaster recovery data center and as a result, the disaster recovery data center begins to resemble a supplementary data center&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Disaster recovery disaster-This supplementary data center scenario defeats the very purpose of having a separate disaster recovery data center&lt;/h4&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/2513933369265899913/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/2513933369265899913' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/2513933369265899913'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/2513933369265899913'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/02/disaster-recovery-should-disaster.html' title='Disaster recovery-Should disaster recovery centers be local or geographically dispersed?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-336484407001659844</id><published>2007-02-12T17:59:00.000-08:00</published><updated>2007-02-12T17:54:48.472-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business continuity"/><category scheme="http://www.blogger.com/atom/ns#" term="disaster recovery"/><title type='text'>Funny disaster recovery job posting</title><content type='html'>&lt;h4&gt;Funny disaster recovery,IS security job posting&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;An unintentionally funny disaster recovery , IS security job posting,I came across today&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Great job for Manager,Disaster recovery,IS security.Great compensation.Bonuses based on number of disaster recovery systems handled through the year&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Organizations reward &quot;creating&quot; IT disaster recovery situations&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;As you can see on the disaster recovery job posting above,organizations reward people for &quot;creating&quot; IT disaster situations and handling the disaster recovery operations as a result&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Wonder why there are no IT disasters and disaster recovery situations on Fridays?&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;There are no IT disaster recovery situations on Fridays :-)&lt;/p&gt;&lt;br /&gt;&lt;p&gt;All IT disaster recovery situations tend to occur on Mondays/Tuesdays so that the disaster recovery can be completed by the end of the week. IT Security and disater recovery managers can then &quot;claim credit&quot; for resolving the IT disasters before the weekend and of course celebrate with a blast&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;No business continuity,disaster recovery situations in December&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Do you wonder why there are no IT disaster recovery situations in December and all the IT disasters converge in the second week of January? Well, its after all a question of priorities,would you rather spend time with your family or save the organization millions of dollars due to IT disater recovery,business continuity situations?&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;From a cynical business continuity, disaster recovery consultant&lt;/h4&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/336484407001659844/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/336484407001659844' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/336484407001659844'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/336484407001659844'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/02/funny-disaster-recovery-job-posting.html' title='Funny disaster recovery job posting'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-117074832418229238</id><published>2007-02-05T23:52:00.000-08:00</published><updated>2007-02-05T23:52:04.800-08:00</updated><title type='text'>Spam Thru botnet threaten data centers</title><content type='html'>&lt;h4&gt;A recent article,titled&lt;a href=&quot;http://antivirusjoe.blogspot.com/2007/02/spam-thru-botnet-biggest-threat-to.html&quot;&gt;Spam thru Botnet- Biggest threat to cyberspace security&lt;/a&gt; talks about the threat to data centers due to the Spam Thru botnets&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Botnets are now universally recognized as the biggest security threats to data centers. What is intriguing about the Spam Thru botnet is apparently Spam Thru botnet&#39;s own antivirus system. The Spam Thru botnet&#39;s antivirus system ensures that Spam Thru remains the dominant botnet on the compromised computer and is not susceptible to other botnet attacks&lt;/p&gt;&lt;br /&gt;&lt;p&gt;This Spam Thru botnet story is quite incredible and as fascinating as  science fiction&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Tackling botnets such as the Spam Thru botnets-Where are the antivirus and antispyware vendors?&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Its rather sad that the antivirus and antispyware vendors dominating the market are incapable of detecting and destroying botnets such as the Spam Thru botnet which mock the commercial antivirus vendors by having their own antivirus systems&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Data centers are now really vulnerable to cyberspace security issues due to botnets such as the Spam Thru botnet&lt;/H4&gt;&lt;br /&gt;&lt;P&gt;The only  people who will rejoice with the new botnet based internet vulnerabilities  are the internet security consultants who will make a fortune &#39;advising&#39; companies on dealing with botnets such as Spam Thru&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/117074832418229238/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/117074832418229238' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/117074832418229238'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/117074832418229238'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/02/spam-thru-botnet-threaten-data-centers.html' title='Spam Thru botnet threaten data centers'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116901616214910769</id><published>2007-01-16T22:27:00.000-08:00</published><updated>2007-01-16T22:42:42.456-08:00</updated><title type='text'>Wifi vulnerability- Watch Out-Wifi Networks are very vulnerable to security attacks.</title><content type='html'>&lt;h4&gt; WIfi network are very vulnerable to security risks&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;WiFi Networks are very vulnerable to security attacks- Recent surveys show that almost 80% of Wifi networks are not even WEP encryption enabled. &lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Wifi network security carelessness &lt;/h4&gt; &lt;p&gt; Why are people so careless when it comes to Wifi vulnerability? Its quite incredible that so-called intelligent people can be so dumb when it comes to Wifi security&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Casual survey of Wifi network security vulnerabilities&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;I did a casual survey of people in my data center department  and found that the awareness of Wifi vulnerabilities is incredibly low. In fact, 30% of my data center team did not even know what WEP encryption was. If this is the state of awareness for Wifi network vulnerabilities and security risks among so-called IT-savvy data center professionals, God forbid, the level of knowledge about Wifi security risks among non-IT guys must be incredibly bad.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Why bother locking your doors when you are going to expose your home or office Wifi network to the outside world?&lt;/h4&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116901616214910769/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116901616214910769' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116901616214910769'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116901616214910769'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/01/wifi-vulnerability-watch-out-wifi.html' title='Wifi vulnerability- Watch Out-Wifi Networks are very vulnerable to security attacks.'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116850710433424775</id><published>2007-01-11T01:05:00.000-08:00</published><updated>2007-01-11T01:18:25.883-08:00</updated><title type='text'>Will Vista destroy the antivirus software industry?</title><content type='html'>&lt;h4&gt;Will Microsoft Vista destroy the antivirus software industry?&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;A rather interesting &lt;a href=&quot;http://antivirusjoe.blogspot.com/2007/01/uninstall-your-antivirus-software-now.html&quot;&gt;antivirus software article&lt;/a&gt; suggests that antivirus software such as McAfee and Norton coule be made obsolete after Microsoft Vista&#39;s launch&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Which antivirus software is worse? &lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Will you choose bad quality antivirus software such as  McAfee or Symantec protection that is expensive or bad quality antivirus software from Microsoft Vista &lt;br /&gt;that is free?&lt;/p&gt;&lt;br /&gt;&lt;p&gt;I think its a question of which antivirus software is worse- antivirus software protection provided by software such as McAfee and Norton or Microsoft Vista. Though Microsoft does not have a great history of providing desktop security and good antivirus protection, Microsoft Vista has seen significant investments in information security and can definitely do better than Norton or McAfee antivirus software.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Entire antivirus software product industry is a racket&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;I have a poor opinion of the antivirus software industry and the quality of antivirus software products- so I would rather get free antivirus software from Microsoft of the same quality as the more expensive antivirus software products from so-called industry giants such as McAfee or Symantec antivirus&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116850710433424775/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116850710433424775' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116850710433424775'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116850710433424775'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/01/will-vista-destroy-antivirus-software.html' title='Will Vista destroy the antivirus software industry?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116832652922124231</id><published>2007-01-08T22:43:00.000-08:00</published><updated>2007-01-08T23:57:03.420-08:00</updated><title type='text'>Data storage backups - The biggest security hazard and waste of money</title><content type='html'>&lt;h4&gt;Data backups are a security hazard and redundancy causes a huge waste of money &lt;/h4&gt;&lt;br /&gt;&lt;p&gt;Sounds surprising to see a data storage guy talk bad things about data backups and their security implications,right? But its true,data storage backups are taken once,twice and many times over with no track of how many Gigabytes of data are stored in backups,how much of that data storage backup is redundant etc&lt;/p&gt;&lt;br /&gt;&lt;h4&gt;Typical corporate data storage backup scenario&lt;/h4&gt;&lt;br /&gt;&lt;ul&gt;&lt;br /&gt;&lt;li&gt;Redundancy of data storage backups- Its kinda fashionable to take data storage backups, and preferably repeated backups? Nobody takes incremental data storage backups anymore, its just fashionable to take more and more backups&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Data storage backups are so redundant that data storage backups are nowadays not even catalogued- every data storage backup is categorized by the ubiquitous file name - &#39;Backups&#39; :-) Nobody has a clue what those data storage backups are about&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Data storage backups are a huge security risk- data storage backups are not catalogued and very often, openly available and not even under lock and key.&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;In summary, data storage backups are a huge security risk and a redundant data storage through avoidable data backups are a huge waste of corporate money- imagine if corporates used the extra money to pay more to employees :-)</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116832652922124231/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116832652922124231' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116832652922124231'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116832652922124231'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/01/data-storage-backups-biggest-security.html' title='Data storage backups - The biggest security hazard and waste of money'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116780790868153301</id><published>2007-01-02T22:59:00.000-08:00</published><updated>2007-01-02T23:05:09.143-08:00</updated><title type='text'>Google Desktop - Dont download? Security Paranoia</title><content type='html'>You allow Google Desktop downloads ? Google Desktops are a huge security risk and should not be allowed in any organization. Dont you take your data center security job seriously- you actually recommend Google desktop searches?&lt;br /&gt;&lt;br /&gt;Google Desktop evokes this common response among data security experts. But I think it is simply security paranoia to not allow Google Desktop downloads. Google Desktops are not a huge security risk at all- True,Google Desktop does communicate to home base and allows for the controversial &#39;Search across Computers&#39; &lt;br /&gt;&lt;br /&gt;But,Google is a large corporate now, and any potential disclosures on misuse of Google Desktop search data by Google would harm Google&#39;s interests far more than any potential gain of using the data from Google Desktop searches.&lt;br /&gt;&lt;br /&gt;Anyways, when we allow free Kazaa downloads with the omnipresent spyware and downloads of any unauthorized downloads from the internet with no security checks, why should we get paranoid on Google Desktop? Its just security paranoia and fear of Big Brother Google.</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116780790868153301/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116780790868153301' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116780790868153301'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116780790868153301'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2007/01/google-desktop-dont-download-security.html' title='Google Desktop - Dont download? Security Paranoia'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116758833756429915</id><published>2006-12-31T09:56:00.000-08:00</published><updated>2006-12-31T10:05:38.300-08:00</updated><title type='text'>Data center crash call at 11:45 pm,New Year&#39;s eve</title><content type='html'>&lt;h3&gt;Data center crash on New Year&#39;s eve&lt;/h3&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;There was a time in the bad old days, when I used to be an on-call data center support consultant. That essentially meant that as an on-call support person,I was like a criminal on parole,who had to report back to the cops whenever they felt bored and wanted even more boring company.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Call from Burlington data center at 11:45 pm&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;I once got a call from the Burlington data center at 11:45 pm, on New Year&#39;s eve. I usually think better when ethlyl is under my belly- and I asked the data center operations guy what the problem was.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt; He said that he just wanted to make sure I was around &lt;em&gt;&lt;strong&gt;(in case)&lt;/strong&gt;&lt;/em&gt; the scripts I was responsible for failed. After all, it was New Year&#39;s eve,and it was difficult for the data center guys to find anyone and our over-zealous pal at the data center desk wanted to make sure he was covered.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;The moral of the above data center story is that you find idiots everywhere, even on New Year&#39;s eve! Happy New Year to you!&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116758833756429915/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116758833756429915' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116758833756429915'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116758833756429915'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/12/data-center-crash-call-at-1145-pmnew.html' title='Data center crash call at 11:45 pm,New Year&#39;s eve'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116654408117600859</id><published>2006-12-19T07:25:00.000-08:00</published><updated>2006-12-19T08:04:48.566-08:00</updated><title type='text'></title><content type='html'>A funny tech support video I recently came across- Well, Its Christmas time and lets be nice to everyone, even tech support people :-)&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;350&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/SKKotk4WTlA&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/SKKotk4WTlA&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;350&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116654408117600859/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116654408117600859' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116654408117600859'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116654408117600859'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/12/funny-tech-support-video-i-recently.html' title=''/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116651796833724399</id><published>2006-12-19T00:14:00.000-08:00</published><updated>2006-12-19T02:06:26.296-08:00</updated><title type='text'>Data storage virtualization requires a mindset change</title><content type='html'>&lt;strong&gt;Data storage virtualization requires a mindset change.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Before data storage virtualization come into the picture, programmers across the world have been used to abusing the hardware with direct calls to the operating system. In fact, before data storage virtualization was introduced in data centers,Unix programmers have taken the operating system abuses to a different level&lt;br /&gt;&lt;br /&gt;To be honest, I was one of those Unix programmers :-) The proudest day of my life was when I extended the kernel for the first time and later downed five beers alone in celebration.&lt;br /&gt;&lt;br /&gt;Data storage virtualization,of course, cuts short such cowboy behavior. Different applications in the organization can adopt a different operating system,running on the same hardware- a different slot on the blade servers is all thats needed</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116651796833724399/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116651796833724399' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116651796833724399'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116651796833724399'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/12/data-storage-virtualization-requires.html' title='Data storage virtualization requires a mindset change'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116609188275755787</id><published>2006-12-14T02:10:00.000-08:00</published><updated>2006-12-14T02:24:46.293-08:00</updated><title type='text'>Kaspersky&#39;s antivirus software has rootkits-Highly disappointed!</title><content type='html'>We recently reviewed Kaspersky&#39;s antivirus software engine for a potential client and were highly impressed. Kaspersky antivirus has a technologically superior antivirus engine compared to competitors such as Symantec&lt;br /&gt;&lt;br /&gt;But even before we had stopped applauding Kaspersky for their superior antivirus software, we realized that Kaspersky antivirus had a rootkit that monitored the antivirus software user&#39;s activity and reported back to home base.&lt;br /&gt;&lt;br /&gt;How utterly disappointing! How can an antivirus software major such as Kaspersky antivirus stoop to such ridiculous depths..&lt;br /&gt;&lt;br /&gt;Post note:-Not surprisingly,Symantec antivirus has also been caught including a rootkit in their antivirus software - when caught , the Symantec spokesman call the rootkit a bug in the Symantec antivirus software- Wonder which is worse, having a rootkit in your antivirus software or having buggy antivirus? :-)</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116609188275755787/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116609188275755787' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116609188275755787'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116609188275755787'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/12/kasperskys-antivirus-software-has.html' title='Kaspersky&#39;s antivirus software has rootkits-Highly disappointed!'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116583675457645726</id><published>2006-12-11T02:45:00.000-08:00</published><updated>2006-12-11T03:32:38.806-08:00</updated><title type='text'>Do antivirus software companies create viruses?</title><content type='html'>Are antivirus software companies responsible for creating and spreading computer viruses?&lt;br /&gt;I know this is a loaded controversial subject but I am sure this is perfectly true.&lt;br /&gt;&lt;br /&gt;It is common knowledge in tech circles that some antivirus software companies hire ex-hackers ostensibly for ethical hacking- to check out the potential vulnerabilities of any system in advance.&lt;br /&gt;&lt;br /&gt;But is that the only work the antivirus software companies use these hackers for? I strongly believe in the conspiracy theory that antivirus software companies are responsible for creating viruses in the first place.&lt;br /&gt;&lt;br /&gt;These antivirus software companies use  a simple marketing technique - create a fear psychosis and then make people pay for it! Anyone who has read Philip K Dick&#39;s &#39;Foster You are Dead&#39; can definitely understand what game the antivirus software companies are playing!</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116583675457645726/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116583675457645726' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116583675457645726'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116583675457645726'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/12/do-antivirus-software-companies-create.html' title='Do antivirus software companies create viruses?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116461294490791424</id><published>2006-11-26T23:15:00.000-08:00</published><updated>2006-11-27T00:51:18.790-08:00</updated><title type='text'>Should you download Windows Defender?</title><content type='html'>The verdict on Microsoft&#39;s Windows Defender is clear- you need to download Windows Defender today.&lt;br /&gt;&lt;br /&gt;Microsoft&#39;s Windows Defender is expected to address at some of the spyware and virus loopholes in the Windows operating system family. Though some (including me) would object to Microsoft releasing the Microsoft Windows Defender as a separate product, I am happy to get at least some security updates to the vulnerable Microsoft Windows operating system&lt;br /&gt;&lt;br /&gt;Benchmarking tests for Microsoft Windows Defender :&lt;br /&gt;&lt;br /&gt;I have downloaded Microsoft Windows Defender and run it on a Sony Vaio laptop running Windows XP Professional. As part of the benchmarking test with Microsoft Windows Defender,I have deliberately installed some spyware,complicated rootkits and good ol&#39; viruses on the laptop.&lt;br /&gt;&lt;br /&gt;Results of the benchmarking test for Microsoft Windows Defender: (Microsoft Windows Defender is still in Beta)&lt;br /&gt;&lt;br /&gt;The antispyware benchmarking test had Microsoft Windows Defender doing almost as good as McAfee and Norton antivirus products. However, none of the products including Microsoft Windows Defender, McAfee and Norton antivirus did a good job of identifying the rootkits on the computer. In comparison, Kaspersky antivirus seemed to do a better job at at least identifying the rootkits on the benchmarking test.&lt;br /&gt;&lt;br /&gt;A more complex benchmarking test spanning various Windows vulnerabilities will be done next week at a Fortune 50 client- I will let you know the results of the benchmarking test and how well Microsoft Windows Defender performed in comparison to the commercial Windows antispyware products&lt;br /&gt;&lt;br /&gt;Download Windows Defender at &lt;a href=&quot;http://www.microsoft.com/athome/security/spyware/software/default.mspx&quot;&gt;http://www.microsoft.com/athome/security/spyware/software/default.mspx&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116461294490791424/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116461294490791424' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116461294490791424'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116461294490791424'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/11/should-you-download-windows-defender.html' title='Should you download Windows Defender?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116419251855201399</id><published>2006-11-22T02:47:00.000-08:00</published><updated>2006-11-22T02:48:38.976-08:00</updated><title type='text'>Why does Norton antivirus make your PC a tortoise?</title><content type='html'>Norton antivirus is (in)famous for making your PC run (or rather crawl) like a tortoise. Why does Norton antivirus really consume so much disk space and memory?&lt;br /&gt;&lt;br /&gt;I really fail to understand why Norton antivirus and to some extent McAfee antivirus software are such memory hoggers. I mean the antivirus logic is entirely heuristic based and uses standard registry entries to identify antivirus threats.&lt;br /&gt;&lt;br /&gt;I can understand intention based antivirus software as being memory hoggers. But the intention based antivirus software I have reviewed consume less memory and even less disk space than commercial antivirus software such as Norton and McAfee antivirus software.</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116419251855201399/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116419251855201399' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116419251855201399'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116419251855201399'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/11/why-does-norton-antivirus-make-your-pc.html' title='Why does Norton antivirus make your PC a tortoise?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116374465547482002</id><published>2006-11-16T22:19:00.000-08:00</published><updated>2006-11-16T22:24:19.436-08:00</updated><title type='text'>Onion routers- Tor onion routers-a solution to the unsecured internet?</title><content type='html'>An article evangelising the benefits of onion routers at &lt;a href=&quot;http://www.tech2.com/india/topstuff/networking-tools-internet/anonymizing-the-net-the-onion-router/2268/0&quot;&gt;http://www.tech2.com/india/topstuff/networking-tools-internet/anonymizing-the-net-the-onion-router/2268/0&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;However, the current use of onion routers is primarily as a gateway for hackers :-) I need real commercial support, funding and more research is needed to make the equivalent of onion Tor Networks used in the right way.</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116374465547482002/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116374465547482002' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116374465547482002'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116374465547482002'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/11/onion-routers-tor-onion-routers.html' title='Onion routers- Tor onion routers-a solution to the unsecured internet?'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116374310774022430</id><published>2006-11-16T21:34:00.000-08:00</published><updated>2006-11-16T21:58:30.706-08:00</updated><title type='text'>Onion Router</title><content type='html'>Onion routers are in the news again these days. While onion routers really help in developing secure networks- they also are misused by hackers all around the world.&lt;br /&gt;&lt;br /&gt;As with any technology, if onion routers are used well, it could go a long way in developing a secure internet , but onion routers could also be an invitation for hackers to use the untraceable IP feature to hack other networks.</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116374310774022430/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116374310774022430' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116374310774022430'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116374310774022430'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/11/onion-router.html' title='Onion Router'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7722884.post-116268878447320511</id><published>2006-11-04T17:06:00.000-08:00</published><updated>2006-11-04T17:06:34.236-08:00</updated><title type='text'>EMC data storage to buy Avamar Tech</title><content type='html'>EMC is rapidly expanding its offerings beyond data storage to include information security and data backup competencies.&lt;br /&gt;Obviously, storage software, network data security and data recovery software services are growing way faster than the traditional physical data storage business of EMC and EMC, the data storage guys,want to rapidly get into this space.</content><link rel='replies' type='application/atom+xml' href='http://diskrecovery.blogspot.com/feeds/116268878447320511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7722884/116268878447320511' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116268878447320511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7722884/posts/default/116268878447320511'/><link rel='alternate' type='text/html' href='http://diskrecovery.blogspot.com/2006/11/emc-data-storage-to-buy-avamar-tech.html' title='EMC data storage to buy Avamar Tech'/><author><name>Gary- Diskman</name><uri>http://www.blogger.com/profile/12549113627307994049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>