Feeds

Speaking in Tech: 'Wanna come upstairs and look at my VRTX?'

Plus: Place a bet on Snowden's final destination

HP ProLiant Gen8: Integrated lifecycle automation

Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

Another fine instalment of El Reg's all-encompassing tech podcast wings its way to loyal Reg readers (and listeners), hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week all three of the terrific trio are together for the first time in weeks!

Technet's gone forever, and Eddie speaks movingly about how much the $4,000/yr subscription service meant to him. Sarah boasts about her new VRTX ("a shared infrastructure platform" from Dell, so now you know) while Greg holds forth on the whole Snowden-Assange-Ecuador saga. All the team take bets on Snowden's final destination - Reg readers are invited to place their own bets in the comments below.

Oh, and in a homage to Canada Day (1 July) Ed tries to sing the first few lines of the Canadian national anthem. Viva Canada! ... um, wait a sec ...

This week the team discuss:

  • Eddie and Greg banter about Cisco Live and Orlando
  • Geek Karaoke
  • Sarah's VRTX
  • Microsoft kills TechNet, Freeloaders revolt
  • Snowden getting the squeeze
  • FalconStor CEO Jim McNiel resigns
  • Twitter fail
  • IT isn't dumping infrastructure for the cloud
  • Benioff and Ellison become strange bedfellows

Listen with the Reg player below, or download here.

Download Podcast

Podcast Subscriber Links

Subscribe through iTunes
Subscribe through Google
Subscribe through Stitcher

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.