A Guide to Key Virtualization Terminology — Part 1

One of the most important steps in mastering a new technology is learning the associated terminology or vocabulary. In the Information Technology (IT) field, this can be a very challenging step, as much of the terminology is often used inconsistently. Here we will definite terms associated with IT virtualization. It is mainly vendor-agnostic, but it does provide some vendor-specific terms, product names, and feature names used by VMware, Citrix, and Microsoft.

Read more

Living Social was Hacked…What Should You Do?

Big news hit the online world over the weekend, over 50 million Living Social subscribers were notified of a major cyber-attack which led to the unauthorized access to data on their servers, including names, e-mail addresses, date of birth for some users, and encrypted passwords (hashed and salted).

Living Social is a major daily deal site where people can seek out discount deals on things from a day at the spa to dinner for two. Consumers see these sites as safe but all it takes is something as harmless as a password in the hands of the wrong person to lead to so much destruction

Read more

Virtualization, the Cloud, and Multi-Tenant Environments

For organizations, the cloud’s per-use approach provides tangible relief from hardware or software investments by offering a pay-for-service model. The benefits include greater resource access, dynamic scaling, and improved costs, along with the ease of automated management for resources and performance. Companies adopt cloud computing to reduce infrastructure overhead, adjust service levels to meet changing needs, and to quickly deliver applications. However, with these advantages come certain limitations, especially in relation to security.

Read more

Traditional Telephony Concepts

Cisco Voice Technologies, now typically referred to as Unified Communications Technologies, not only depend on a solid network foundation, but also use conceptual building blocks from the world of traditional telephony. The reasons for this are:

Capability to interconnect the Unified Communications Environment to the PSTN
Creating “new world” equivalent logical functions that mimic “old world” methodologies
Understanding the basic elements utilized in older telephony can help in knowing how these same functions are created in Unified Communications networks. Here we will map out the basics of an analog telephone call.

Read more