Once you encrypt your MacBook’s drive with FileVault 2, you’ll never even know it’s there. But if you ever lose your machine, you can rest easy knowing that your data is safe. Considering how well this solution performs and that it is included free of charge, there is no reason not to use it!
Many of you have probably heard the name of Alan Turing, but most of those probably don’t appreciate the extent of his contributions. To say that he invented the modern world is an overstatement, but he did dream up the computers we see around us today, and helped win World War II in the process. But the story of Alan Turing is as much about exclusion and defeat as it is of genius.
I’m really thrilled about the improvements Microsoft is making to the core SMB protocol in Windows Server 2012. But it won’t really matter if nobody but Microsoft supports the new protocol. So I like to call out to all the enterprise storage vendors: Let me hear your support for SMB3.0!
Encryption is an important tool for individuals regardless of what they’re storing. Given the recent security failings of Dropbox, I highly recommend using methods like this to secure your important data before using the service!
Things are getting awfully complicated, aren’t they? The custom parallel CPUs, proprietary communications networks, and encrypted data ports require extensive training, special tools, and a computerized reference library to comprehend, much less debug. And the manufacturers, who derive much of their money and differentiation from warranties and authorized repair centers, are loathe to see independent shops get a piece of the action.
Is your non-3GS iPhone locked out of your Exchange 2007 ActiveSync server after upgrading to iPhone OS 3.1? It’s a feature, not a bug! Here’s how to get older iPhones up and running with Exchange Server 2007 SP1!
One of the great ironies of storage technology is the inverse relationship between efficiency and security: Adding performance or reducing storage requirements almost always results in reducing the confidentiality, integrity, or availability of a system. Many of the advances in capacity utilization put into production over the last few years rely on deduplication of data. […]
Looks like storage security just might happen after all. Although EMC has done little to capitalize on their acquisition of RSA, I’ve been seeing a lot of interest in the security space for the last year. Take a look at NeoScale with their global key manager, and you’ll see an interesting twist on the security […]