Feeds

Speaking in Tech: Your OpenStack plug-in is NOT a meaningful code contribution

Talking smack about vendors ... Plus: How to unfollow Amy Lewis

Next gen security for virtualised datacentres

Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

It's another episode of El Reg's weekly enterprise tech podcast, hosted by Ed Saipetch, Greg Knieriemen and Sarah Vela. Ed's in the driving seat this week as a jetlagged Greg rides shotgun. Cisco's Amy Lewis joins as our special guest this week... and jumps right into a chat about why "listless" Greg unfollowed her on Twitter. The gang also talk about what constitutes a "meaningful" code contribution, the Boston marathon bombings on social media and how Michael Dell was right all along...

This week we cover:

  • Greg and Amy continue their social media unfeud
  • Ed visits the OpenStack Summit
  • OpenStack and meaningful code contributions
  • How the concept of "open" has changed in 12 months
  • London StorageBeers recap
  • Cloud Schnitzel
  • Dell still going private
  • Next week, the big Chad Sakac podcast
  • Boston bombings and social media
  • Learning to be cynical on social media

Listen with the Reg player below, or download here.

Download Podcast

Podcast Subscriber Links

Subscribe through iTunes
Subscribe through Google
Subscribe through Stitcher

Next gen security for virtualised datacentres

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.