Speaking in Tech: The day Dell's server guys said 'Cloud is bulls**t'

Hunger Games meets IT: 'Not everyone is going to make it through'


Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

Live from Austin, it's an enterprise and consumer tech cast with some of the biggest brains in the cloudy business. Weirding you out today are humble hosts Ed Saipetch and Sarah Vela. This week, Ed and Sarah take over the podcast live at Dell World 2012 while Greg Knieriemen takes a week off. Our special guests this week are Stephen Foskett of Tech Field Day, Stephen Spector, Cloud Evangelist at Dell and Justin Warren, Managing Director at PivotNine.

This week we discuss...

  • Dell World wrap up
  • Bolt-on acquisitions
  • The evolution of Dell
  • The language of tech
  • The new role of the CIO
  • IT vs Public cloud
  • Buzz word bingo
  • OpenStack vs OpenStack

Listen with the Reg player below, or download here.

Download Podcast

Podcast Subscriber Links

Subscribe through iTunes
Subscribe through Google
Subscribe through Stitcher


Other stories you might like

  • Oracle shrinks on-prem cloud offering in both size and cost
    Now we can squeeze required boxes into a smaller datacenter footprint, says Big Red

    Oracle has slimmed down its on-prem fully managed cloud offer to a smaller datacenter footprint for a sixth of the budget.

    Snappily dubbed OCI Dedicated Region Cloud@Customer, the service was launched in 2020 and promised to run a private cloud inside a customer's datacenter, or one run by a third party. Paid for "as-a-service," the concept promised customers the flexibility of moving workloads seamlessly between the on-prem system and Oracle's public cloud for a $6 million annual fee and a minimum commitment of three years.

    Big Red has now slashed the fee for a scaled-down version of its on-prem cloud to $1 million a year for a minimum period of four years.

    Continue reading
  • Mega's unbreakable encryption proves to be anything but
    Boffins devise five attacks to expose private files

    Mega, the New Zealand-based file-sharing biz co-founded a decade ago by Kim Dotcom, promotes its "privacy by design" and user-controlled encryption keys to claim that data stored on Mega's servers can only be accessed by customers, even if its main system is taken over by law enforcement or others.

    The design of the service, however, falls short of that promise thanks to poorly implemented encryption. Cryptography experts at ETH Zurich in Switzerland on Tuesday published a paper describing five possible attacks that can compromise the confidentiality of users' files.

    The paper [PDF], titled "Mega: Malleable Encryption Goes Awry," by ETH cryptography researchers Matilda Backendal and Miro Haller, and computer science professor Kenneth Paterson, identifies "significant shortcomings in Mega’s cryptographic architecture" that allow Mega, or those able to mount a TLS MITM attack on Mega's client software, to access user files.

    Continue reading
  • HashiCorp tool sniffs out configuration drift
    OK, which of those engineers tweaked the settings? When infrastructure shifts away from state defined by original code

    HashiConf HashiCorp has kicked off its Amsterdam conference with a raft of product announcements, including a worthwhile look into infrastructure drift and a private beta for HCP Waypoint.

    The first, currently in public beta, is called Drift Detection for Terraform Cloud, and is designed to keep an eye on the state of an organization's infrastructure and notify when changes occur.

    Drift Detection is a useful thing, although an organization would be forgiven for thinking that buying into the infrastructure-as-code world of Terraform should mean everything should remain in the state it was when defined.

    Continue reading

Biting the hand that feeds IT © 1998–2022