News From The World

News From The World

Dell PowerEdge VRTX

PowerEdge VRTX shared infrastructure platform check it here: http://www.dell.com/us/business/p/poweredge-vrtx/pd I usually do not make comment on HW infrastructures or platforms but I have to admit that today, after a chat with my neighbourhood, I fall in love with this one. When thinking about SMB market and IT we always face a dualism between computational and storage needs and, on the other side, strict budgets and low resources. Low resources also means space, energy, people constrains and so on. So here we are a small object, that contains all the HW needed for a SMB or a branch, flexible and easy to manage. Drive Bays Up to…

FW SPAM: Ultimo sollecito attivazione sistema Sicurezza web Postepay

For my Italian friends, Postepay Spam —–Original Message—– From: Servizi finanziari Postepay [mailto:support@update.com] Sent: Tuesday 16 July 2013 09:06 Subject: Ultimo sollecito attivazione sistema Sicurezza web Postepay   Gentile cliente,     Dal 17° luglio 2013 non potrai utilizzare la tua prepagata PostePay se non hai attivo il nuovo sistema di sicurezza web.     Il nuovo sistema di Sicurezza Web PostePay e una soluzione innovativa che garantisce maggiore sicurezza e affidabilita per le operazioni dispositive con PostePay effettuate online sui siti de Poste Italiane.     Il nuovo sistema per l`autorizzazione delle operazioni di pagamento (ricariche PostePay,ricariche telefoniche,pagamento bollettini)…

FW SPAM: My dear friend

I’m crying —–Original Message—– From: hjgrelee@daum.net [mailto:hjgrelee@daum.net] Sent: Tuesday 16 July 2013 11:27 To: mrsleejesicca@yahoo.com.au Subject: My dear friend My dear, My name is Mrs. Jesicca Lee; a dying woman who has decided to donate what I have for the good work of charity. I was diagnosed for breast cancer for about 2 years now.I have been touched by God to donate from what I have inherited from my late husband to you for the good work of God, rather than allow my husband evil relatives to use my husband hard earned funds ungodly. They don’t care about man kind,…

FW SPAM: From The Ceo.Malik Ali Deputy Director.

Here again my spam message review, please if you receive something similar be cautious! But if you get the million dollars I will appreciate a donation J, lol. From: Ceo Malik Ali [mailto:ceoali@voila.fr] Sent: Friday 19 July 2013 12:16 To: undisclosed recipients: Subject: From The Ceo.Malik Ali Deputy Director. Compliment of the Season, I Know That This Mail Will Come To You as a Surprise As We Never Meet Before Request for Urgent Transfer Of The Sum Of Nine Million Three Hundred Thousand Dollars {Us $9,300,000.00} Only, Into Your Account. I Am The Deputy Director Of Finance, Foreign Payment Approval…

Anatomy of a conference day in Rome

Let’s focus on that day 1) Wake up in the morning, raining in vistarino 2) Reached Pavia station went to the automatic ticket machine to take the train  I discover it does not work, ok no prob I queued at the ticket store 3) Took the train in perfect time, so this sis not such a bad day after all… 4) The train is arriving late, damn will I take the coincidence? Of course not! lost for 1 minute (I saw it leaving) 🙁 bye bye Italo, by by first class 5) OK nothing is lost, I look for another…

Bring Your Own Device – parte 4 (dal webminar che ho tenuto per (ISC)2)

Tutto è in evoluzione…. Visto che tanto si parla di BYOD ma il supporto numerico spesso latita vediamo cosa è successo in termini di personal computing negli ultimi 10 anni. Risulta evidente come ci si presenti una situazione in cui i paradigmi sw e hw sono profondamente cambiati in termini di uso. Guardando ai sistemi operativi, ad esempio, si vede come una volta il mercato parlasse esclusivamente microsoft e in quota minore linux, mentre gli ultimi anni hanno visto una situazione dove almeno 4 sono i sistemi operativi di riferimento: mac OX iOS Windows e Android, con una presenza marginale…

Beyond BYOD: Securing the mobile workforce

Beyond BYOD: Securing the mobile workforceSC MagazineCompanies realize bring-your-own-device (BYOD) policies create new risks with a plethora of challenges going far beyond those previously. However, most organizations are still lagging behind on making the changes necessary to adequately address these …See all stories on this topic » Related articles BYOD: Many Call It Bring Your Own Malware (BYOM) Beyond your device: control, connect, experience BYOD security and the importance of covering your backend Is Your Company Achieving the Full Value of BYOD? BYOD security and the importance of covering your backend First there was BYOD, but what about bringing your own…

Posts navigation