Business

Security and Datacenters

A Datacenter is a collection of several different elements, all working together to offer a platform to our digital needs. A datacenter is actually a mix of different elements, some logic some physical, it is just not a mere collection of elements but a complex systems with a lot of interactions. We can easily see inside the datacenter, cables, racks, servers, network equipments, storage units and so on but all are there (or should be there) for a purpose and are interconnected. A big part of a datacenter is not even visible; it is the software and data running in…

Managers and Leaders are not the same thing

Managers and Leaders are not the same thing | LinkedIn Managers and Leaders are not the same thing Oct 29 2014 120Views 18Likes 4Comments Share on LinkedIn Share on Facebook Share on Google Plus Share on Twitter There is always a lot of talk about managers and leadership, but I sometimes have the feeling there is a little confusion on the subject. I can agree that a manager needs to have leadership qualities, as some other key soft skills, but leadership, per se, is not enough. Wait, this means that a great leader can’t be also a great manager? Exactly,…

On the HP and Symantec split

HP and Symantec: You two I split in two…..   So seems a few days I wrote about gigantism in the tech industry (see my articles on Daft Blogger Magazine)and just as a quick answer we have had new split decisions coming from two big giants…HP and Symantec. Come on guys I didn’t know my opinions were so important for you…   In a period of hard recession it is quite normal to see companies that try to cut costs and staff, but HP and Symantec goes further and decided to split themselves: is this a good and sound operation?…

Wanted Dead or Alive: The Human Factor

TECHNOLOGY originally published on DaftBlogger.com Wanted Dead or Alive: The Human Factor By Antonio Ieranò on September 29, 2013 at 7:45 PM Contents [hide] 1 From where should we start? 2 I said it all but… 3 Theory? OK I confess I am quite bored to listen to all those knowledgeable IT security experts talking about what is needed to secure a system. Everyone has his own point of view; of course they’re right when they say we need end-point security, mobile protection, anti-malware, anti-hacking, dlp, advance threat defense and protection. We all know we need firewalls, IPSIDS, cypher encryption systems, SSO, 802.1x, strong authentication, anti-virus, anti-everything,…

Looking for a new career opportunity

Dear All, As you may know I’m looking for a new career opportunity. Many of you knows me because we have been working together in Europe or USA in one of my previous work experiences, including Cisco, Ironport, Symantec, BrightMail, Mondadori Informatica and so on, or met in conferences and events. With over 16 years of experience in the leadership of IT product development, project management, marketing, and representation and as a reputable and renowned contributor to the tech industry particularly within the security community, I think I have often provided outstanding results and proved my soft and technical skills, but the situation now force…

Dell PowerEdge VRTX

PowerEdge VRTX shared infrastructure platform check it here: http://www.dell.com/us/business/p/poweredge-vrtx/pd I usually do not make comment on HW infrastructures or platforms but I have to admit that today, after a chat with my neighbourhood, I fall in love with this one. When thinking about SMB market and IT we always face a dualism between computational and storage needs and, on the other side, strict budgets and low resources. Low resources also means space, energy, people constrains and so on. So here we are a small object, that contains all the HW needed for a SMB or a branch, flexible and easy to manage. Drive Bays Up to…

(ISC)2 Italy Chapter Site » Mobile Security Series – Beyond BYOD – Slides

(ISC)2 Italy Chapter Site » Mobile Security Series – Beyond BYOD – Slides Mobile Security Series – Beyond BYOD – Slides inShare1 Le slide del primo approfondimento (ISC)2 Italy Chapter sul Mobile (Beyond BYOD) sono disponibili ai soci a questo link(*): Webinar – (ISC)2 Italy – Mobile Series 1 – Beyond BYOD Ringraziamo tutti coloro che hanno seguito il seminario e ancor di piu’ chi ha dedicato del tempo per completare il sondaggio sull’iniziativa. Stay tuned: nelle prossime settimane vi informeremo sulle date del secondo e poi del terzo seminario della serie. (*) Per accedere alle slides e’ necessario essere Soci di (ISC)2 Italy Chapter; l’utenza…

FW SPAM: Inquiry

Is this spam or not? 🙂 —–Original Message—– From: Ms. Helen Papi [mailto:info@e-securetrust.com] Sent: Monday 4 March 2013 07:02 To: nomestes.ingando@gmail.com Cc: puchi.ierano@gmail.com Subject: Inquiry Hello Antonio Ieranò Greetings and sincere apologies if this letter is against your moral ethics. I know you will be surprise to read my email. I got your contact from online business directory which prompted me to contact you in confidence. Apart from being surprise, you may be skeptical to reply back to me because based on what is going on in the internet world which has made it very difficult for people to believe…

FW SPAM: How Are You!

—–Original Message—– From: Mr. Choy Meng [mailto:meng_choy11@yahoo.com] Sent: Tuesday 20 November 2012 12:20 To: antonio.ierano@ierano.it Subject: How Are You!   Dear friend, Compliment of the Season to you and your love ones. I am sorry for this interruption. I have no other way to reach you than these ways please accept my apology. I am the managing Director of a financial firm here in South East Asia. In my department i discovered an abandoned sum which belongs to one of our foreign customer who i was his account manager. I sent a routine notification to his forwarding address but got…

EVENTO SUL CLOUD: IL CLOUD COMPUTING AL SERVIZIO DELLE PICCOLE E MEDIE IMPRESE

IL CLOUD COMPUTING AL SERVIZIO DELLE PICCOLE E MEDIE IMPRESE Type: Event Owner: Easycloud.it Event Date: 2/20/2013 Start Time: 02:00 PM End Time: 05:00 PM Time Zone: (UTC) Casablanca Location: ComoNExt – Parco Scientifico Tecnologico Tags: pmi, cloud computing Details: Agenda inizio ore 16:00– Introduzione al Cloud Computing– Cloudeconomy e il ruolo del Cloud Service Broker– Il Cloud Computing per le PMI: applicazioni a supporto del business – Case study e strumenti per calcolare il ROI ore 18.30 Aperitivo offerto da Easycloud EasyCloud.it cloud service broker – easyCloud www.easycloud.it Easycloud.it è un Cloud Service Broker a supporto delle aziende che…

Posts navigation
Stop censorship
%d bloggers like this: