Monthly Archives: januari 2013

Een back-up is geen archief

31 januari 2013

Manager of Managed Services Outsourcing

Expert van Computable voor de topics: Outsourcing, Cloud Computing en Infrastructuur


De technologie voor storage, back-up en archivering ontwikkelt zich razendsnel. Leveranciers leveren een groot aantal verschillende hard- en software matige oplossingen met verschillende specificaties en service levels, die stevige reducties in de kosten beloven. Tegelijkertijd is er sprake van een groeiende verwarring. Hoe moet je nu omgaan met back-up? Hoe zorg je ervoor dat je voldoet aan je wettelijke verplichtingen voor archivering?

Al te vaak zie ik nog bedrijven, die de jaar-back-up beschouwen als het archief. Hier zitten een belangrijke denkfout achter.

Archiveren betekent letterlijk het geordend opslaan van gegevens. Maar waarom zou je archiveren?

  • Juridische reden: De overheid verplicht je om documenten voor een bepaalde tijd te archiveren. Denk hierbij aan personeelsdossiers of financile documenten.
  • Beleidsmatige reden: Je archief herbergt je kennis. Een deel van deze kennis zul je als instelling zeer waarschijnlijk willen gebruiken voor de dagelijkse bedrijfsvoering. Voorbeelden hiervan zijn bijvoorbeeld werkinstructies en rapporten.
  • Sociale reden: Het archief herbergt je verleden. Of je nu een commercieel bedrijf of een overheidsinstelling bent, een deel van het archief is wellicht belangrijk voor onderzoeksredenen of heeft misschien ook wel historische waarde.
  • Financile overeweging: Data die niet meer verandert wordt toch in elke full back-up meegenomen. Zo verzamel je vele kopien van n en dezelfde file. Deze data in een archief stoppen verkleint de back-up (kosten).

In deze tekst concentreer ik me voornamelijk op de juridische redenen voor archivering: bewaren en bewijzen.

Data die om juridische redenen moet worden bewaard moet aan een aantal voorwaarden voldoen:
– De data mag niet meer worden gewijzigd.
– De data moet gedurende de wettelijke bewaar termijn leesbaar zijn. Te allen tijde moet dus de technologie aanwezig zijn om de data

Bron: Computable Lees het complete artikel hier:

Three years since his Sun gobble, what hath Ellison wrought?

30 januari 2013

Analysis It is hard to believe that three whole years have passed since software giant Oracle instantly became a systems player by snapping up beleaguered Sun Microsystems for a cool $7.4bn about $5.6bn net of Sun’s cash hoard.

No one took El Reg up on our suggestion to start up a Sun clone we called Moon Macrosystems by grabbing all of the open source goodies (including chip designs) to create integrated Sparc and X86 systems running Solaris and the rest of Sun’s considerable software stack, denying Oracle the control of Java and Solaris that it sought.

That’s a damned shame, because it would have been a lot more fun.

But let’s face it, if Sun had been acquired by IBM, which was the original plan back in November 2008, it would have been a lot less fun.

Oracle cofounder and CEO Larry Ellison, as it turns out, has caught a bit of Big Blue hardware bug and actually seems to like the idea of peddling “engineered systems” to enterprise customers who know Oracle mostly for its database, middleware, and application software.

So, was Oracle’s Sun acquisition worth it, and has it created something that will live and grow? Ellison certainly wants everyone to believe that, and has told Wall Street and his investors that he believes that. And if you look at the Sun deal from a lot of different angles, it’s hard to show that it was not a good deal for Oracle or for the egos of its top brass.

To understand why, it helps to remember the context in which Sun Microsystems’ former CEO, Jonathan Schwartz, started shopping the formerly upstart Unix workstation and server maker and Java creator to IBM.

In late 2008, the Great Recession was just starting to build momentum although we may not

Bron: The Register Lees het complete artikel hier:

Cisco verkoopt Linksys aan Belkin

29 januari 2013

Leverancier van netwerkapparatuur Cisco verkoopt dochteronderneming Linksys, leverancier van consumentenapparatuur, aan concurrent Belkin. Daarmee trekt Cisco zich terug uit de consumentenmarkt, waar het in 2003 in stapte met de aankoop van Linksys.

Het voornemen van Cisco om Linksys van de hand te doen lekte in december al uit, toen bekend werd dat de netwerkleverancier de zakenbank Barclays had gevraagd een koper voor de consumententak te zoeken. Cisco-topman John Chambers besloot al eerder afscheid te nemen van consumentenproducten. Hardware en diensten voor bedrijven leveren het bedrijf een hogere marge op.

Naast de thuisrouters van Linksys nam Cisco in 2011 al afscheid van de Flip-videocameras en in 2012 van de Cius tabletcomputers. Cisco telde in 2003 vijfhonderd miljoen dollar voor Linksys neer.


Cisco brengt geen precieze cijfers over de omzet van zijn consumententak naar buiten. De inkomsten uit de thuistak worden op een hoop geveegd met die uit andere netwerk- en opkomende technologien. Die omzet daalde in het laatste kwartaal met 12 procent naar 220 miljoen dollar.

Bron: Computable Lees het complete artikel hier:

IBM fuels up more Power7+ servers for impending launch

28 januari 2013

The details are a bit sketchy, but we can smell the hydrazine and it looks like IBM is getting ready to launch the next wave of Power7+ systems.

Last week, in going over Big Blue’s fourth quarter financial results, IBM CFO Mark Loughridge said that it planned to roll out more Power Systems servers based on the eight-core Power7+ processor in the first half of the year. He was deliberately playing it vague but evidently trying to calm Wall Street as it watched Power Systems sales plummet 19 per cent in the quarter.

As you might expect given those numbers, IBM and its reseller partners in the Unix and IBM i (formerly known as OS/400) rackets are a bit eager to round out the line and get back to selling shiny new boxes or upgrades to customers. And it looks like it will be happening sooner rather than later for another chunk of the product line.

IBM has not said that there is a Power Systems announcement, but there is a “smarter computing” event that Big Blue is holding at 11am Eastern on February 5 (8.00 Pacific, 16.00 GMT) that looks like it is a Power Systems launch with some storage announcements as well. El Reg thinks this to be the case for a few reasons.

First of all, Colin Parris, who is general manager for the Power Systems business within the IBM Systems Technology Group at Big Blue, is running the event – and he is being joined by Laura Guio, who is the vice president in charge of IBM’s Storage Systems business (which is in the same group at the company). You can read about that event here and sign up for the webcast next Tuesday there as well.

Channel-tastic: It’s all about ‘Big Data’

According to IBM resellers

Bron: The Register Lees het complete artikel hier:

CloudPassage Launches Private-Public Cloud Security Solution

25 januari 2013

The security as a service (SaaS) vendor combines hosted security with cloud access to build secure environments for public and hybrid cloud users.

When it comes to the cloud, security has always been the No. 1 concern for users. After all, as data travels around the Internet, there are numerous windows of opportunity for data interception or capture. A single weak link can lead to system compromise and lost information.

Now there’s a cloud application to handle that. With a new service launch on Jan. 31, 3-year-old CloudPassage aims to solidify security in the cloud with a new offering, Halo Netsec, which features a firewall, two-factor authentication and intrusion-detection capabilities.

At this point, Halo Netsec is unique when it comes to securing cloud services, because it enables administrators to build a perimeter defense without having to worry about the physical network. Thus, it secures everything from the endpoint to the virtual server, even if that traffic is passing over a public Internet or even from private or hybrid cloud to cloud.

This can prove very important for administrators, especially when managing cloud services, because those administrators have no control or management capabilities for the public portion of cloud communications.

Small Agent Runs Communications

Halo NetSec works by running a small security daemon (in this case, just 3MB) on a virtual server, which handles communications across CloudPassage’s computing grid, through which all traffic passes on its way from the endpoint to the host, and vice versa. The small footprint of the security daemon makes it easy to set it up on a virtual server, without impacting performance–and, in most cases, associated hosting costs.

“When people look at adding security to a cloud system,

Bron: Linux and Unix Nieuws Lees het complete artikel hier:

Xerox Expands Cloud Services, Data Recovery for SMBs

25 januari 2013

The cloud backup and data recovery services are designed to provide the recovery of data, applications and operating systems.

Digital print solutions specialist Xerox released a suite of cloud services aimed at small to medium-size businesses (SMBs), including Xerox Cloud IaaS for Midrange and Intel systems and a cloud backup and data recovery service. The services will be sold through Xeroxs value-added resellers (VARs). The services also manage workload demand and are priced to serve SMBs that have annual revenue of $10 million to $250 million.

Xerox is offering secure cloud services via five global data centers that house multi-tenant technologies and virtualized LANs, with the infrastructure as as servce (IaaS) ready to use with an on-demand “click-and-pick” provisioning process. IaaS helps ensure complete tracking, auditing and reporting capabilities.

“Cloud technology is often presented as a complex, ‘big company infrastructure solution. But, in fact, managing IT operations in the ‘cloud is just as relevant and affordable for smaller companies and can be even more impactful,” said Ken Stephens, senior vice president of Xerox cloud services. “Expanding Xeroxs IaaS and Backup and Recovery services to SMBs is the next step toward offering a full suite of business cloud services that SMBs can access on a ‘pay-as-you-go model.”

The cloud backup and data recovery services are designed to provide the recovery of data, applications and operating systemsXerox said everything on the server can be restored in less than 24 hours. The offering also includes an affordable approach for enterprises and SMBs needing remote backup and disaster recovery at a monthly, utility-based price, with no long-term contracts required. The Business Cloud infrastructure used for corporate enterprises also is available for SMBs, and data backup is replicated, secured, encrypted and conducted daily.

“Xerox extending its sales efforts to SMBs through VARs is a smart move, especially in the growing

Bron: Linux and Unix Nieuws Lees het complete artikel hier:

WatchGuard Launches XTM 33 Security Appliance

25 januari 2013

Included is real-time monitoring, secure logging and more than 65 report templates that give businesses insight as to what is going in and out of their network and by whom.

WatchGuard Technologies, a provider of business security solutions, today unveiled its latest small-business firewall, the XTM 33. Ideal for midmarket businesses with five to 30 users, the XTM 33 appliance provides enhanced network protection in an all-in-one, small form factor security appliance.

Features include defense-in-depth protection, such as identity-based firewalling, plus WatchGuard s proxy technology. The XTM 33 is available now from authorized WatchGuard channel partners. List pricing for the XTM 33 begins at $890, and a wireless version is available starting at $990.

Whether it is used to create secure virtual private network (VPN) tunnels for the Apple iPad, iPhone and other iOS-based devices, or to enable secure remote connectivity for mobile employees, the XTM 33 helps simplify setting up a VPN. The appliance also features firewall functionality via Application Control. This allows businesses to utilize Web 2.0 apps while keeping employees focused on work.

“Hackers go after small businesses because they tend to have either outdated security systems or consumer-grade endpoint protection, which makes them easy targets,” said Tim Helming, director of product management at WatchGuard. “For this reason, WatchGuard developed the XTM 33 to have enterprise-class security, but in a form factor and at a price that works for any small business. It truly is a no-compromise, ultimate firewall that is optimized for today s threat landscape.”

With upgraded intrusion prevention, spam blocking and gateway antivirus capabilities, the XTM 33 is designed to keep malware, spyware, viruses, worms and hackers out of small-business networks.

Bron: Linux and Unix Nieuws Lees het complete artikel hier:

HTC Security Flaw Found on Multiple Android Phones

25 januari 2013

HTC’s Help page advised users of the issue, which can be resolved through an automatic software upgrade, though some users will have to update manually.

Smartphone manufacturer HTC admitted several of its phones running Google’s Android operating system have a security flaw that allows hackers or an application to view and access WiFi security information. The affected phones include the Desire HD, the Glacier, the Droid Incredible, the ThunderBolt, the Sensation, the Sensation 4G, the Desire S, the EVO 3D and the EVO 4G.

This week, the company posted a message on the Help page of its Website to inform affected users, although the company has known about the issue since September 2011 and was working with Chris Hessing, a senior engineer with Cloudpath Networks and Bret Jordan, a senior security architect with Open1X Group to provide a fix for the security flaw, which was labeled critical in a blog post from Jordan.

“Certain HTC builds of Android can expose the user’s 802.1X WiFi credentials to any program with basic WiFi permissions,” the post states. “When this is paired with the Internet access permissions, which most applications have, an application could easily send all stored WiFi network credentials (user names, passwords, and SSID Service Set Identifier information) to a remote server. This exploit exposes enterprise-privileged credentials in a manner that allows targeted exploitation.”

HTC s Help page advised users of the issue, which can be resolved through an automatic software upgrade, though some users will have to upgrade manually. The blog states Google has done a code scan of every application currently in the Android Market, and there are no applications currently exploiting this

Bron: Linux and Unix Nieuws Lees het complete artikel hier:

Joint Ventures: A Recipe for Failure in the Channel

25 januari 2013

Dissolution of Symantec-Huawei serves as an object lesson for the channel

Joint ventures are tricky by definition. While they tend to start off with much promise over time they almost always wither and die. The reasons for this are varied. Usually, it comes down to conflicting internal agendas. But sometimes unforeseen external forces also wind up making the joint venture untenable.

Such is the case with the sudden dissolution of Symantec-Huawei. Originally formed to combine Symantecs storage technologies with hardware manufactured by the Huawei, a multi-billion dollar Chinese conglomerate, the goal was to leverage Huaweis manufacturing muscle to bring products to market that were aggressively priced enough to gain market share. Symantec-Huawei then expanded to that mission to push into the networking market.

Now we have reports that Symantec-Huawei is no more. The reason for this is because Symantec became concerned that its ongoing relationship with Huawei would jeopardize its security business. Apparently the U.S. government has become concerned about sharing classified information with Symantec for fear that it would wind up in the hands of the Chinese government. If you havent been paying attention to security issues lately, tensions over security breaches that get traced by to attacks emanating from China are on the rise.

In this case solution providers that aligned themselves with Symantec-Huawei are finding that they have become collateral damage in a cyber-war that shows no signs of abating. The good news is that there are not that many solution providers affected. Symantec-Huawei had a compelling portfolio of appliances, but incumbents such as Cisco, EMC, Hewlett-Packard and Juniper Networks would compete aggressively on price based on the size of the deal. As most solution providers already know, competing primarily on price, no matter

Bron: Linux and Unix Nieuws Lees het complete artikel hier:

Countering the Security Menace

25 januari 2013

Open source technologies such as ownCloud present the channel with a unique opportunity to simultaneously address security and productivity issues

To say that IT managers and chief security officers are a little paranoid about anything to do with these days is more than just an understatement; it also highlights a fundamental IT inability to service a specific end user need.

Based on the millions of people using Dropbox on a regular basis, its pretty clear that IT organizations were not prepared for the need to share documents among users that more often than not dont have a common computing platform in common. As a result, many of them decided to take matters into their own hands by leveraging the file sharing services of service such as Dropbox in the cloud.

IT professionals often scoff at Dropbox because in their mind FTP servers or virtual private networks (VPNs) were designed to handle this task. But given the fact that FTP servers and VPNs are cumbersome to set up and difficult for the average person to use it is little wonder that people embraced Dropbox with or without the permission of their companies.

Now, of course, a host of cloud computing services have emerged as more secure alternatives to Dropbox, all of which come with some sort of fee attached once you exceed a certain amount of storage space. Even with the availability those services, DropBox usage continues to climb if for no other reason than market momentum.

But one alternative running under the radar of all this controversy has been a set of open source technologies called ownCloud, which allows end user to share and synchronize files without having to drop them

Bron: Linux and Unix Nieuws Lees het complete artikel hier: