What’s The Story of the OpenSSL Hack?
As we discuss in Learning Tree’s Cloud Security Essentials course, the cloud is based on open-source technology. And, if you are developing your own solutions, as you do in PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) cloud settings, you should use carefully tested and trusted open-source components. The OpenSSL project provides […]
What’s With All The Linux, I Thought We Were Talking About The Cloud
As Larry Ellison has famously observed, people use “cloud computing” to mean everything, and therefore nothing. In with the buzzwords, out with the meaning. Take anything that involves two computers and a network connection, and someone is going to call it cloud computing. Or if you are going to use virtualization: some people rationalize this […]
Key Thieves Disturb the Peaceful Xen Garden
What is the sound of one VM hacking? Quite the racket of interprocess interrupts! Virtualization is an absolute requirement for cloud computing. Researchers are now discovering new ways to subvert virtualization. This is big. Most operating systems tinkerers are familiar with so-called Type 2 or Hosted virtualization. This is something like VMware Player (or Workstation […]
What You Need To Know About Implementing Virtualization in the Workplace
The resurgence of virtualization in IT departments has been attributed to gains in efficiency, increased effectiveness, cost savings, and potency in reducing server and desktop “sprawl”. This White Paper provides an introduction, as well as details on configurations, benefits and how to select a virtualization platform based on your needs. Chapters include Virtualization on the […]