C2 Spring 2022

Is Your Covid-19 Vaccination Status Private Anymore?

The world has been dealing with the COVID-19 pandemic for two years now, and its effects have impacted us widely. Economics, health, relationships—almost every aspect of our lives has changed. We have seen lockdowns, business closures, hospitalizations and deaths, mask mandates, work-from-home, and—most anticipated, at least for most people—the stunningly rapid development of the vaccines that have provided some relief.
Read more

Infrastructure-as-code on HPE GreenLake using Terraform

[vc_row][vc_column][vc_column_text]

The process of managing and provisioning computer data centers through machine-readable definition files, otherwise known as Infrastructure-as-Code (IaC), offers many significant benefits. It helps to increase operational agility, simplify management, reduce errors, and save cost. In this post, I’ll explore some of the benefits of using IaC on HPE GreenLake through the use of Terraform.

Let’s harness some of the benefits of Infrastructure as Code

One of the superpowers of IaC is its repeatability, the fact that you can set something up once and then use the same information in multiple ways.…

Read more

Bidtellect reports 4 data management and analytics benefits using HPE Ezmeral

–Fast and easy migration to HPE’s data fabric saves money and improves performance, functionality, and security–

As is true for many companies that started their big data strategy on Hadoop and have been using it for years, Bidtellect was unexpectedly presented with a high renewal bill for support from their vendor. The bill motivated Bidtellect to migrate to a new vendor on which to run their cloud data management and analytics.…

Read more

Build a Cyber-Resilient Organization

People have always topped the list of what keeps enterprise executives up at night. Leaders wonder, “Is the right talent in the right places?” and “How do we maximize employee productivity and improve our customer experience?” Now two years into the pandemic, executives have a new people-related concern, “How do we stop bad actors from compromising our data and stealing it for gain?”
Read more

HPE Enterprise Storage, Encryption, Compliance, and Key Management

Hewlett Packard Enterprise is known for its enterprise solutions in the storage ecosystem to effectively store customer data and provide all the mechanisms to protect the data it stores. There are too many attack vectors that can lead to a successful compromise, if not protected against. One of the most important and proven methods to protect internal and external data from falling into the wrong hands is encryption.

Read more

Biggest Lie in the World (and Kevin’s Famous Chili Recipe)

He spilled the whole batch in the lobby, and no one got a bite. But that doesn’t mean his famous recipe is gone forever. A clever TikTok-er revealed that Peacock TV’s terms and conditions includes Kevin’s chili recipe buried in the tiny print as a reward for the very, very small percentage of subscribers who read the details.

 

Almost No One Reads the Terms and Conditions

Most apps or services require you to click a box to agree to their terms and conditions for use.…

Read more