Feeds

Speaking in Tech: Is this a mascot convention? Oh ... my God

Greg's unbelieve-fur-ball hotel experience plus this week's cloudy tech news

HP ProLiant Gen8: Integrated lifecycle automation

Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

Our regular podcast, this week recorded live in San Jose, California, is back with your hosts Greg Knieriemen and Ed Saipetch – Sarah Vela is away.

Before getting down to the technology news of the day, Greg reveals he just checked into a hotel that he thought was holding a sports mascot convention. But rather than being a meet-up for people who support their college team, it was filled with... well, this. He was put on the 18th floor to avoid the, er, noise.

On to business, the podcasters have on board special guest Chad Sakac, senior vice-president for global pre-sales technical resources at EMC. Check out the agenda below, download the MP3, subscribe to it, or just press play to hear what's going on from the audio stream.

  • An unexpected report from a FurCon
  • Playing with vLabs
  • EMC rap videos
  • Punching clouds, literally
  • The world other than Amazon Web Services
  • Letting workloads dictate cloud decisions
  • Is AWS not interested in the enterprise?
  • Owning your IT
  • Flash storage armageddon
  • Startup mechanics
  • Amazon's a bubble
  • Ed reviews the Pebble

Listen with the Reg player below, or download here.

Speaking in Tech: Episode

Podcast Subscriber Links

Subscribe through iTunes
Subscribe through Google
Subscribe through Stitcher

Feed URL for other podcast tools – Juice, Zune, et cetera: http://nekkidtech.libsyn.com/rss

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.