Better backups, faster restores with SEPATON DeltaStor deduplication technology

SEPATON’s S2100 is a virtual tape library backup appliance that can work to significantly reduce backup completion and restore times and cut down on storage requirements. It has a flexible capacity to hold from 10TB to over 1 PB and a wide collection of policies that can be crafted to particular applications and circumstances.

We tested a unit on a live network with actual production data with Firefox running on Windows XP in March 2010.

Price: starts at $110,500.
Backup products supported include Symantec’s NetBackup, IBM Tivoli
Storage Manager, EMC NetWorker and HP Data Protector.

SEPATON S2100-ES2 v5
400 Nickerson Road
Marlborough, MA 01752
Sepaton.com
508 490 7900

Is Google the next evil empire?

The news last week that Italian authorities have convicted three Google executives with criminal privacy violations got my attention for two reasons. One, the charges are based on a video that shows an autistic boy being bullied, a video that Google did not create or post. It was filmed by cell cameras and posted more than three years ago, and indeed one of the executives has since retired from Google. Two, none of the three live or work in Italy, and a fourth executive – a product manager – was acquitted. We truly live in a global village, and one in which the legal operations move slower and slower. As someone who was bullied as a child, I get this, although not sure that justice really was served here.

This case comes on top of the company’s missteps with Buzz, where it had to alter the default privacy settings after a rather embarrassing launch and lots of fanfare.

Has Google become more evil, or is it just the contentious times we live in that makes this sad state of affairs possible? One thing is clear, though: Google is becoming bigger and buying more and more companies that have products or services that I use. Picnik (online photo editing) and Etherpad (online real time document collaboration) are just two of the more recent acquisitions. The Etherpad acquisition was also a bit troubling, where the company had first announced they were turning off the service, then had to restore it after numerous complaints.

I still think the vast majority of people at Google adhere to the company’s ten founding principles, which is more than I can say for my dealings with Microsoft over the years. Certainly both companies are hyper-competitive. But the very nature and pervasiveness of Google’s online services makes it more pernicious, and has a greater potential for abuse, as the recent news indicates. But it also means that they can turn more quickly when they make a mistake: the Etherpad issue was resolved in a day or so. Imagine Microsoft trying to do that. Indeed, try finding something similar to this document on Microsoft’s Web site: you will find a lot of corporate doublespeak, rather than the plain spoken “Ten Things” that Google professes.

While all this was going down in Italy, I was reviewing what information Google has stored on me in Google Accounts. If you haven’t had a look at your “dashboard” lately, it is instructive to see exactly what Google can track on you. In my case, I use a ton of different Google products, and recorded for posterity include the following:

  • My most posts to my Blogger blogs
  • What items Google Alerts has located that mention my keywords
  • The three people I most often email in my contact list
  • The most recent Google Doc that I have edited and how many of them have been supposedly “trashed” but are still accessible
  • My complete Google Chat history of more than 1500 conversations
  • The photos stored in Picasa, fans and favorites included
  • My history of calls made on my Google Voice account
  • My most recent Web browsing history, including search terms, images downloaded, maps visited and news items read
  • And there are 12 other Google products that aren’t yet tracked, including AdSense, Knol, and Groups too.

You get the picture: there is a lot you can learn about me when you scroll through all this data, and a lot that I would prefer remain private. All it takes is someone to guess a single password, too. That is scary, and I hope that “do no evil” thing is still very much in force in the years to come.

ITworld: How to buy a Web Application Firewall

We all know that the Web is a nasty place, with denial of service attacks, SQL injection, cross-site scripting and other malware invented hourly to try to pry into your networks. Over the years, a number of vendors have come up with various solutions that go under the broad heading of Web application firewalls, or ways that they can help prevent the bad stuff from entering your user’s desktops. It’s worth diving into these products because they offer a great deal of protection that can save you aggravation down the road.

I talk more about how to buy these web app firewalls at ITWorld here.

eSecurityPlanet: Online Backup Buying Guide

By now, you probably know that you can choose from more than two dozen different online backup services that take your desktop data and make copies of it in “the cloud.” (I maintain a list of many of them here.) They all work in a similar fashion: a small software agent monitors any new files that you create on your PC and it makes copies of them over an encrypted link to the provider’s Internet data center. With so many similar contenders in the field, how do you know which to choose? Here is an article that I wrote for Internet.com that reviews your options.

IT Expert Voice Webinar: Understanding Windows 7 Security Features

What has changed for the better and worse with Windows 7 when it comes to endpoint security? There are some improvements to the built-in firewall and encryption features, remote management as well as better integration with Microsoft’s Network Access Protection services in Windows Server 2008. This panel will discuss these and other topics and talk about what are the security implications when you make the migration to Win 7 in your enterprise.

Join me as I moderate this webinar panel on March 11th at noon CT. You can register for this free event here, and check out other content on ITExpertVoice.com about Windows 7 topics too while you are at it.

Taking credit card payments via the Internet

It all started when one of my clients wanted to pay me with a credit card. It is odd that I have been in business for 18 years and this is the first time that I have been paid in this way. It is doubly ironic in that I used to teach classes on eCommerce back in the early days of the Web and hadn’t ever gotten around to getting a merchant account, which is what you need to take credit card payments.

If you want to accept credit cards, you enter a brave new world where there is an entire collection of jargon to use your secret decoder ring. For example, “discount rate” is the fee that the card issuer (like American Express or Visa) charges you per transaction. Typically these are anywhere from one to four percent, depending on a series of circumstances. Then there is the “virtual terminal” which is a series of Web-based services that allow you to enter the credit card number in your browser and have the transaction completed online. These replace the typical credit card swipe machines that you see in every retail shop.

Since my client wanted to use their American Express card, my first stop was to try my business bank, Bank of America, and see what they could offer me. Online had limited information but I tried the 800 number and got nowhere fast. They suggested that I talk to Amex and see what they could do for me. Within about 30 minutes I was setup with an Amex merchant ID and could start accepting their card via a telephone response number. The issue was that the transactions would take some time to clear and actually end up in my bank. They could also sell me their virtual terminal software, called Payment Express, which would be an extra charge of $20 a month. Amex has many different options that can easily get confusing – my recommendation is if you want to go this way, first sign up online to access your account and then read the various screens that describe Payflow, Payment Express and their physical card payment terminals.

In the interests of research, I pressed on to see what else is available.

Paypal was my next stop. While you can process some credit card payments, once you get beyond a few hundred dollars you need to have a Paypal business account. This means $30 a month, plus transaction fees of 2.4 to 3.1% to use their virtual terminal software. Here is a description of that process.

Intuit was next. Their merchant services are $13 a month, and it took about a day to set me up. They also have their own virtual terminal software and their home page takes something to get used to. They also charge less per transaction, with fees ranging from 1.9 to 2.9%. They have a great series of online demos here on their Web site.

So which do I recommend? If I had to start over knowing what I know now, I would go first to Inuit. They are geared towards their online product, they have a simple sign up process, and if you already use Quickbooks they can integrate with that too if you end up with lots of transactions. (I have been a happy Quickbooks user for nearly two decades, starting with the DOS version, can you believe it?) I would steer clear of Paypal, I just think they charge too much for too little.

There are dozens of other payment processors online, and this isn’t meant to be a comprehensive review. And feel free to share your own experiences on my blog or via Twitter.

Outbound content compliance using Global Velocity

Looking to do a better job monitoring all of your network’s applications portfolio? The GV-2010 is a unit designed to give you very granular control over how your end users use particular applications, and inspect all of your content leaving your network.

We tested the appliance on a small network in February 2010.

Global Velocity GV-2010
Globalvelocity.com
St. Louis MO
314 880 2900

Outbound content compliance using Global Velocity

Looking to do a better job monitoring all of your network’s applications portfolio? The GV-2010 is a unit designed to give you very granular control over how your end users use particular applications, and inspect all of your content leaving your network.

We tested the appliance on a small network in February 2010.

Global Velocity GV-2010
Globalvelocity.com
St. Louis MO
314 880 2900

Kace Kbox: Best Way to Massively Migrate Windows XP Desktops to Windows 7

Kbox (which was once part of Quest and Dell) is used to manage and control desktop system images that contain user files and applications and — with its Systems Management Appliance, sold separately — to do PC inventory and audits. It also works with both virtual and physical machines too. Unlike the PC Mover and Zinstall approaches, they are designed for large-scale deployments of hundreds or more PCs. This video was done in 2010.

Codeless Ajax Development with Alpha Five

Alpha Five is a powerful database and Web applications server and development environment that has been around for many years and continues to get more powerful but not at the expense of ease of use. There are numerous tutorials

You can watch my screencast video here: http://webinformant.tv/alpha5.html

We tested Alpha 5 v10 on a Windows XP running SP2 in February 2010.

Documentation, copious code examples and videos:
http://docs.google.com/View?id=d52ghw8_92f9r2m4dx
http://www.ajaxvideotutorials.com/videos/help/01intro/
http://65.75.250.238/webApplicationDemoV10/default/index.a5w

Alpha Five v10
http://alphasoftware.com/products/v10/
70 Blanchard Road,
Burlington, MA 01803
781.229.4500

Prices: Developer $349
Application Server $599, both for $799
Unlimited Runtime licenses $599
Windows XP or later required with at least IE v7 or Firefox 3.0