Monthly Archives: February 2014

The Dangers of Cyber-Bullying [Infographic]

Originally posted on The Official Blog of ChronicleMe.com:
A useful reminder of the impact even that even affects people of all ages. The Official Blog of ChronicleMe.com View original post

Posted in Uncategorized | Leave a comment

Progressive Disaster Recovery Testing

As a follow-on from my previous post Disaster Recovery is about Business Process Recovery not IT Infrastructure Recovery I wanted to talk about the sort of DR testing required. Many companies are very aware of the need for disaster recovery … Continue reading

Posted in Disaster Recovery | Tagged , , , | Leave a comment

Fast, Flexible and Secure Cloud Backup

I have been using Jungle Disk for years now to transparently perform backups on multiple home computers. I have been happy because the backups went to Amazon S3, it has its own unique private key for backup, it stored multiple … Continue reading

Posted in Cloud | Tagged , | Leave a comment

Disaster Recovery is about Business Process Recovery not IT Infrastructure Recovery

So often the basic principles of Disaster Recovery are forgotten when planning and testing. Too often the focus is put on the recovery of the network and IT infrastructure without taking into account the underlying reason for recovery is to … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Architecture Patterns Across Disciplines

I have spent a good few weeks over the past few months examining the flow of data for a data storage solution. The purpose was to find the bottlenecks in the data being transported between locations that are several hundred … Continue reading

Posted in Architecture, Engineering | Tagged , , , , , , , | Leave a comment

Managing Virus Outbreaks with a Trusted Inventory

It was some years ago there was a worm outbreak at a client we had just started managing where we urgently needed to identify every server infected and work on a plan to remove the worm using our own custom … Continue reading

Posted in Cyber Security, Security and Privacy | Tagged , , , , , | Leave a comment