VMs on RAID save Bacon

I was recently computing happily along, not suspecting anything, when suddenly things began to go terribly wrong. Web pages stopped loading. My email connections timed out. I could not remotely access my clients’ networks. The situation was serious. Then my wife told me that she could not get to any web sites. The situation had […]

Read More… from VMs on RAID save Bacon

Core i7 VirtualBox Server: Why Virtualization?

When I’ve talked to a small business owners about using virtualization in their IT infrastructure, one of the most consistent questions I’ve gotten – well, after “what’s that” – amounts to “why – what’s the advantage?” This is certainly a valid question, and it’s one I had to think about in order to articulate the […]

Read More… from Core i7 VirtualBox Server: Why Virtualization?

Core i7 VirtualBox Server

I’ve been using virtualization technology for several years now – first with VMWare (Workstation, Server, and Player), and then with VirtualBox.  I tried Xen very briefly while looking at OpenSUSE, but never did use it on a day-to-day basis.  Until now, I had only ever used desktop OSes (operating systems) (mostly Linux, but some Windows […]

Read More… from Core i7 VirtualBox Server

Okay, well, back to Ubuntu!

In my post Returning to Windows After 15+ Years I wrote that I was switching to Windows 7 after using various distributions of Linux or FreeBSD for over 15 years, and provided a brief explanation for the move. After several months it became apparent that the honeymoon with Windows 7 was over, and I wrote […]

Read More… from Okay, well, back to Ubuntu!

Preventing the Heartbreak of Lost Data

One of the questions I hear most often from my residential clients as they drop off an ailing PC is, “will I lose all of my pictures?”  In many cases, I am able to save most, if not all, of the data on their hard drives (pictures, emails, addresses, browser bookmarks, etc.)  My commercial clients […]

Read More… from Preventing the Heartbreak of Lost Data

The Safe Computing Triad

In Beware of Social Engineers, I wrote that I’ve recently had several clients that have contracted nasty malware that masquerades as security software and claims that the victim’s PC is infected.  It then offers to clean up the infections – if you pay for the software.  Of course, by that time the damage is done, […]

Read More… from The Safe Computing Triad