Thin Client Laptops: Functionality, Security, Mobility

For the past few weeks I’ve been using a unique device — a totally stateless laptop. It is the Tadpole M1400 Ultra-Thin Client Wireless Sun Ray. Here are some things this device can enable for enterprise users: Enhanced security.  If the laptop is lost/stolen/attacked no data is lost.  The data is never in the laptop, […]

The Future Is Changing Again

There have been several recent announcements by the One Laptop Per Child (OLPC) project worth note.  OLPC is a nonprofit organization founded in 2005 by Nicholas Negroponte and others from the MIT Media Lab with the goal of providing one laptop for every child on the planet.  So far they have delivered about 500,000 systems.   […]

Thin Clients and The Enterprise

CTOs, like everyone else in the enterprise, need to contribute to workforce agility, mobility and productivity, and they need to do that in a way that provides security.  And all that needs to be done in a way constrained by fiscal realities. Which leads to the point of this post. All CTOs need to be […]

Open Source Databases

All indications are the next significant growth segment for open source software will be in databases. This follows the trend of open source operating systems (Open Solaris and Linux). Two open source databases of note are Hadoop and MySQL. Hadoop is not for everyone. It is a very powerful open source software focused on highly scalable […]

Widespread Cyber Espionage: More evidence and what to do about it

This week the New York Times and CNET ran a story by John Markoff titled “Vast Spy System Loots Computers in 103 Countries” It reads in part: “A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, […]

The Number One Reason To Move To Open Source: Security

I just read Bill Vass’s latest blog entry titled:  “The No. 1 Reason to Move to Open Source is to IMPROVE Security” Bill opens this article with: “If you are like me, and you have been involved in cryptography and Cyber Security for a long time, it’s obvious to you that commercial open source code […]