Feeds

Speaking in Tech: Holy SiT! It's our 100th ep. Time for a video-podcast

Friends don't let friends reject Edward Snowden for Lena Dunham

Internet Security Threat Report 2014

Vid special

speaking_in_tech Greg Knieriemen podcast enterprise

This week is the 100th episode of Speaking in Tech which was broadcast through video on Google+ Hangouts! Fear not, uncool kids, we recorded it for you.

Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. Our special guests this week are John Troyer from VMware, Amy Lewis from Cisco, Chris Evans from Architecting.IT, Mark Twomey (aka Storagezilla) from EMC and Vaughn Stewart from Pure Storage.

This week we discuss…

  • Introductions (0:45)
  • The worst episodes of SiT (5:25)
  • The worst hosts of SiT (10:55)
  • VMware busy with announcements: VSANs and Desktop as a Service (DaaS) (12:23)
  • VMware noise around VDI (18:39)
  • Challenges for Microsoft (22:50)
  • Chris Evans rumor alert: Project Mystic – EMC & VMware Do Hyper-Converged Infrastructure (27:15)
  • Snowden live at SXSW: Encryption and oversight are key to privacy (29:30)
  • Lena Dunham vs Edward Snowden at SXSW (36:12)
  • Privacy and control of data in the cloud (39:50)
  • Austin cracks down on Uber during SXSW (41:00)
  • Uber is criminal and serial killers on Craigslist (47:20)
  • Future guest requests (50:50)

Listen with the Reg player below, or download here.

Speaking in Tech: Episode

As a special treat for Speaking in Tech's century, we videoed the whole Google+ Hangout too:

Video of Speaking in Tech live broadcast

Podcast Subscriber Links

Subscribe through iTunes
Subscribe through Google
Subscribe through Stitcher

Feed URL for other podcast tools – Juice, Zune, et cetera: http://nekkidtech.libsyn.com/rss

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.