Category Archives: Uncategorized

Move over Road rage, Its desk rage thats all the rage now.

Desk rage: angry and violent outbursts at work
Move over Road rage, Its now “Desk Rage”.
New survey from welfare charity The Brooke has found more British workers than ever before are suffering from ‘desk rage’. What is causing the anger epidemic?
Office niggles start off innocently enough. We’d prefer it if our colleague didn’t do that, or wouldn’t it be great if they did do that? Time passes and, with it, niggles turn to gripes, gripes to bugbears and, before we know it, bugbears morph into full blown ‘desk rage’.
Indeed, according to a new survey, the British workplace is rife with enraged employees. More than half of the 2,000 people polled by welfare charity The Brooke complained about their office life. Printers crashing, being called at one minute to five and colleagues suffering from halitosis, were some of the top irritations. Inspired, we realise that this does not apply to anyone at CMX as we are perfect, happy well adjusted people, but we go in an awful lot of offices where we can quietly listen in and make our own judgements. So here is the CMX A-Z observed list of office annoyances of everyone else, ok we have slipped some of ours in too but I’m not telling which.
  • Answering other peoples’ mobiles. The landline, OK. But leave the colleagues mobile alone.
  • Back-handed compliment. “You have been looking nice recently.” What? Did I look terrible before? What’s wrong with a simple ‘You look nice.”
  • Colleagues chatting loudly when there is a deadline.
  • Diets. “Really, you’ve only had a piece of cucumber all day? My goodness that’s fascinating.” Don’t bring your diet to the desk. No one cares. Fainting from hunger isn’t going to get the work done, is it?
  • Emails. Was any of that content useful for me? Did any of that content concern me? No. So stop cc’ing me. It clogs up my inbox and wastes my time.
  • Fakeness. “I’m so happy for you about the promotion! Seriously, it’s so well-deserved.” No you’re not – Just say “Well done”, the fakeness is awkward.
  • Gossiping. You’re the other side of the desk, not in another room. we can hear that whispering and it makes me feel paranoid.
  • Holidays. I get x-days holiday a year in my contract – don’t make me feel guilty for taking them.
  • Illness. If you’re ill don’t come in and splutter all over the desk. I don’t want that cold over the weekend, thank you very much.
  • Jolly. Yes, it’s nice to be in a good mood. But when you’re all smiles 24/7, constantly chirpy and positive, it’s annoying.
  • Keep saying you’re right. I know, you know, we all know that you’re wrong. Just admit you’ve made a mistake and move on. It has happened to us all.
  • Love. “Hi Love/ Darling / Chum / Mate, how are you?” I don’t know who you are and you don’t care how I am. Please don’t address me like that – it’s unprofessional and creepy.
  • Meetings. Spending an hour in a meeting – when you really need to be at your desk – going over a 10-point plan, and then being emailed exactly the same plan the next day. Did we really need the meeting? I could have picked up all I needed to know from the email.
  • Nattering. If you want to talk incessantly about nothing to each other, do it away from the desk. It’s distracting.
  • Odour. Please, please, please, just buy some deodorant. I like you, but the smell, it’s too much.
  • Pens. If you are going to borrow my pen, fine, but give it back.
  • Questions. Being repeatedly asked the same question. I told you five-minutes ago, and five-minutes before that, they haven’t come back to me yet. If the situation changes, I’ll tell you!
  • Reading over your shoulder. Is this email addressed to you? No, I didn’t think so. So stop reading!
  • Slamming the phone down. I’m sorry your day isn’t going well, but there is no need to distract the rest of us. And, is breaking the phone really going to help the situation?
  • Tears at the desk. If you’re going to cry, do it away from the desk. I’ve got work to do and don’t want to feel obliged to look after you.
  • Understanding. Lack thereof. I’ve never arrived late before, this is the first time and I have a genuine excuse, so stop raising your eyebrows.
  • Volume. We know that you’re on the phone, but does the whole office need to know? We’re not deaf, seriously calm down the decibels.
  • Work load. When suddenly more and more things become your responsibility but your salary remains the same.
  • Xxxxs. There’s a time and a place for kisses – and it’s not on the end of a work email.
  • You look well. Don’t say that to me: we all know that means I’ve put on a few pounds.
  • Zombie. You’ve had an all-nighter and come into the office with no sleep. Go out at the weekend, not mid-week. You look awful, you smell awful and you’re not going to get anything done.

 

Top 10 tech mistakes Small Business Owners (SBOs) make – and how to avoid them.

As a small business owner, you know that small things can add up quickly. e-mail’s go unanswered longer than you’d like, and administrative tasks take longer than expected – leaving little time to tackle other tasks. It’s no wonder then that thousands of small business owners tend to overlook or avoid the often complicated burden of keeping technology in line with business needs. And yet, one slight technology mishap can lead to critical data loss, hardware failure, or security breaches.

Why learn the hard way? If you’re equipped with the right information to avoid these common pitfalls, you can protect your business and prevent catastrophic events.


Mistake 1: Leaving back-up on the back-burner
An astounding 70 percent of small firms that experience a severe data loss go out of business within one year. That’s not to say that data loss alone can bring your business down, but the point is that data loss is expensive – and recovery can be excruciatingly time-consuming. To put it in perspective, it can take 19 days and

£17,000 to recreate just 20 MB of lost sales and accounting data, and 42 days and £98,000 to enter in engineering data that’s been lost. That’s not even counting lost productivity and revenue, along with damage to a company’s reputation when it can’t meet deadlines or fulfil obligations.


Mistake 2: Skimping on security
“The web has become the attack vector of choice,” says a chief research officer of a leading security software development company. Unprotected PCs can become infected within eight seconds of being connected to the Internet, according to one BBC report.

Clearly, the costs of an exposed PC extend far beyond the initial recovery expense. You face locking down infected PCs to erase every last thread of the virus, while also checking out the PCs that don’t appear to be contaminated. All of that leads to crippling downtime for your entire organisation.

What if the data – like sensitive client information – becomes compromised? According to one study, 30% of the companies surveyed said that a major security breach had the potential to put them out of business entirely. To make matters worse, you can also be held liable for any information that leaks out – even if you’re not directly responsible.


Mistake 3: Losing sight of what you own
Can you name how many software licences or PCs you have in your organisation? If you’re like most small business owners, the answer is likely ‘no.’ And that can lead to serious problems, such as the inability to qualify for a loan and other financing (most small business loans are secured by business assets), or simply not being able to accurately estimate costs or plan an operating system upgrade at the right time.

For many service-based businesses, such as those working in the financial, legal, or health care industries, increasing regulatory measures may require that business owners monitor assets like network infrastructure more closely than ever before. As Jane Disbrow, an analyst for Gartner, says, “If you don’t know where all your laptops and software are located, how can you tell regulatory bodies that customer information is being kept private?”

Asset management is a critical small business task. Depending on your size, there is a range of approaches, from simply using a spreadsheet to track assets, to investing in a software program that allows you to easily aggregate, sort, and update your business-critical inventory.


Mistake 4: Failing to tailor technology
Choosing the right technology for your business isn’t always simple, but spending the time to ensure what you buy and use will pay off. It begins with having a fundamental understanding of what you and your employees need to complete tasks as quickly and effectively as possible. How much processing power do you really need? What are the most important features in the laptops you’re buying for your sales people? Will a touch screen help employees get work done faster and therefore save time and money?

As Brian Roach, president and CEO of Evolve Technologies suggests, “Buying equipment is just like buying a house.” That’s because technology purchases are an important investment – which require careful consideration of not just the costs, but also how the benefits will help you maximise productivity. For example, graphic designers may find that more processing power, high-end graphics and even touch screens are worth the ticket price, while a financial services firm might choose processing power and a bigger hard drive but skip the graphics and touch screen.

You can leverage online forums and tools to help understand what options are available so you can make an informed decision.


Mistake 5: Wasting time with inefficient training
Having the right technology for your business is important, but if your staff doesn’t have the proper training on how to perform routine tasks, productivity can suffer and customers might not receive the kind of support and service they need.

Because training takes time, it can become a lower priority. According to one Tech Republic article, “It’s estimated that office staff understand less than 20% of the available features in the software applications they use. That means 80% of the features, timesaving capabilities, and cost-reducing functions remain unused.”

When bringing on a new employee, this issue can be magnified as there’s a lot to teach in a short amount of time.


Mistake 6: Having a ‘set it & forget it’ mentality
You probably take your car in for regular oil changes and tune-ups, but do you treat your technology to the same kind of routine maintenance? Even the most powerful technologies need ongoing care to ensure optimal performance – and it only takes a few minutes of maintenance to keep your systems running smoothly.
To avoid inevitable system lags that occur as a result of overlooking or avoiding computer updates, it’s best to run weekly system and anti virus updates. It’s also a good idea to clear your browser cache, delete old e-mail messages, and run Disk Defragmenter and Disk Cleanup every month to increase the performance of your PC

Mistake 7: Hesitating to call for help
There are a lot of IT issues that you can solve on your own fairly quickly. But some situations, such as optimising major technology purchases or repairing faulty equipment, might require more time – and energy – than you anticipate. So how can you determine the right time to tap professional IT support?

When it appears that fixing IT issues will take longer than you would like – or if you simply want to ensure that you’re setting up or repairing systems the right way from the beginning – it’s a good time to call for help. Eradicating viruses and spyware from infected PCs, for example, might be a task best left to the pros.

If you’re facing a complex technology challenge, a professional consultant can help you save minutes, hours, or even days. That’s because a qualified IT professional is adept at identifying and resolving complex issues quickly, can determine the appropriate hardware and software investments for your organisation, and put proactive monitoring and maintenance services in place to minimise or eliminate downtime.


Mistake 8: Using multiple vendors and OS
According to International Data Corp. (IDC), 36 percent of businesses surveyed rely on two or more operating systems – which requires multiple efforts to manage them. The research firm indicates that those who standardise not only operating systems but also hardware and software programs have “the highest levels of Return On investment” and lower costs associated with training, deploying updates, and managing systems.

This is partly due to the fact that troubleshooting and resolving issues on disparate systems requires more investigation into each problem. And if you need to replace hardware components, you have to track down purchasing records to determine which parts each system needs – and that, of course, takes time that could be better spent running your business.

This doesn’t mean you need to update all of your hardware and software systems at once, but when you do upgrade your PCs, “make sure you purchase only business class computers, and always get the same model,” says IT support guru Michael Cooch. It’s also wise to use the same operating system and application suites on all of your PCs so every employee has the same set of tools at their fingertips. That way, if any issue ever comes up, you can solve it once.


Mistake 9: Delaying hardware replacement
Technology, like everything else, has a set life cycle. And that’s why, as one report indicates, “Accountants typically amortise computers after three or four years.” After that, hardware is prone to failure — and putting off hardware replacements can actually end up costing more than purchasing new equipment.

Darin Stahl, Info-Tech Research group analyst suggests that holding off on technology upgrades may seem like the prudent choice, but that “really it’s costing you.” Consider the research conducted by Tech Aisle, which indicates that the cost of maintaining newer PCs can be as much as 150 percent lower than maintaining older ones – yet 40 percent of PCs in small businesses are more than three years old.

With newer hardware running the latest software, you’ll benefit from improved processing speeds and a smoother overall operation – which results in more time, flexibility, and productivity for your organisation.


Mistake 10: Lacking an emergency plan
What would happen to your business if your accounts receivable files were lost, or contact lists destroyed? Would a technology mishap put you permanently out of business?

Lack of planning is cited as one of the top reasons small business fail, according to the SBA and SCORE. And that includes both preparing for disaster – and also planning for recovery and growth. That’s why it’s important to know which kinds of losses would be most damaging to your operation, because understanding where you’re vulnerable can help you prepare for unexpected – and potentially devastating – events. This includes not just backing up files and using anti-malware systems

How to perfect your body language of on-line presentations


10 powerful presentation tips

As mobile work styles become increasingly popular, odds are you’re going to wind up hosting a video conference or webinar sometime in the near future. With a limited amount of screen real estate to work with and varying device screen sizes that your audience will be using, it’s more important than ever that you make a great first impression. So, are you ready for your close up?

It is crucial for you as the speaker to be able to establish confidence and credibility with your audience in order to hold their attention, especially on a video conference. Think about it—they don’t even have to worry about looking rude if they want to leave; if they don’t like you, they can just turn off their device. Luckily we’ve compiled 10 tips for simple and powerful body language improvement that you can follow to help build trust nonverbally with your audience.

Tip 1: Check your body language (before you wreck your body language).Are you sitting slouched over? Are your arms crossed? Do you appear approachable? Those are all questions that your audience asks themselves when they see you for the first time. They are looking for subtle physical cues to inform how they are going to listen to you or interact with you. If you open up your posture and appear relaxed and friendly, your audience will subconsciously mirror that behavior and be more accepting of what you’re going to say.

Tip 2: Create positive eye contact, not the creepy kind.
We all know that there’s a clear distinction between “creepy” eye contact and positive eye contact. Your audience is going to be staring directly at your face for an extended period of time, so make sure that your expression isn’t too intense and try to smile with your eyes, or just relax your face and pretend like you’re talking with a friend. This will put your audience at ease, and they will find themselves smiling back at their screens. Like yawning, it’s contagious.

Tip 3: Use microexpressions to add animation.No need to maintain a blank poker face when talking on a video conference or webinar. In fact, your audience will probably appreciate you having animation as it shows them that you are passionate about your topic or empathetic to their problem.That being said, before you turn on your webcam to hundreds of (hopefully) intent listeners, take a few minutes and preview yourself in the video viewer. Do you raise your eyebrows when you’re surprised? Do you furrow your brows when you’re confused? Being aware of these microexpressions can help you shape your audience’s initial impressions of you while projecting self-confidence on camera.

Tip 4: Decide what to wear and what not to wear.It’s difficult to listen to someone or even take them seriously when they are wearing a sloppily tied bow tie or ridiculously tight clothes. You find yourself distracted and focusing on the person’s appearance instead of their message. The same goes for your audience. Make sure you have selected an outfit that is culturally appropriate for the audience you are addressing. Try wearing form fitting, professional clothes that make you feel good and colors that you know will compliment your overall appearance on camera. (Red is the hardest color to produce on video.) That small level of self-comfort will translate on screen in a big way to your audience. The more at ease you look, the more confident you will appear to people—and that goes a long way towards building credibility.

Tip 5: Know your frame game.
A typical phrase used in television is to ask “What’s my frame?” It’s a way for an actor or director to understand how the camera is going to be framing up their shot. As you are your own active cameraman, you’re going to have to take the responsibility to ask “What’s my frame?” before your audience even sees you. Are you in a professional setting where you feel relaxed and ready to talk? Is your chair at the optimum height for your audience to see you? Is your webcam pointed directly at you? Is the lighting around you unflattering? These are all small things that you can adjust so that you feel ready and don’t have any last-minute scrambling, which your audience might interpret as you not being ready or not caring about their time.

Tip 6: Keep your gestures within view.
Have you ever had a conversation with someone who liked to talk with their hands? While it can be a fun way to illustrate your point (or a not-so-fun way to put out an eye), it can also be a giant distraction for your audience. In a video conference, you don’t have a lot of space for gestures, and wild or large hand movements that may work in live environments might make you look erratic or completely detract from what you are trying to say. Keep your movements controlled and on-camera at all times. Be assertive with your movements without being harsh and try to keep the movement as natural as possible. Looking crazy or nervous on a video conference using fast or unnatural gestures could be interpreted by your audience as bring unprepared.

Tip 7: Sit up straight, like you’ve always been told.Do you ever find yourself hunching over to look in to your camera? Well, your audience sees that too, only it looks like extreme slouching to them. Good posture is a subtle nonverbal cue that your audience will pick up on as an indication of poise. The more open and erect your posture on camera, the more confidence you are going to project to those watching you. If you look assured of yourself and your presence on camera, your audience will trust that you know what you’re talking about.

Tip 8: Know your stuff.This seems like a no-brainer, but it’s worth repeating if it will help you build credibility and lead to a stellar first impression with your audience. Have you rehearsed your presentation? Do you know your topic inside and out? Do you know who you are talking to? Are there any cultural nuances that you should be aware of with your audience?
Asking yourself these types of questions beforehand can help you avoid embarrassing pitfalls which could annoy or even offend your audience. Knowing your subject matter will also allow you keep your head up instead of buried in notes. That will give the impression of self-assuredness and intelligence—two very good things when trying to build trust and make connections with new people on a video conference.

Tip 9: Vary your vocal pitch (but not too much).The inflection of your voice, even before you get into the meat of your presentation, has the power to influence the way others will see you. Before you start your video conference, allow your voice to relax into its optimal pitch. Do some vocal warms ups, practice how you are going to say hello or even just practice the first few lines of your pitch. This will help you maintain a more even and relaxed tone when meeting your audience for the first time. Try to keep your vocal inflection varied but not all over the place. It will keep your tone interesting. Sounding confident and prepared will help establish you as a thought leader in your audience’s eyes.

Tip 10: Get familiar with your good side.
It sounds funny, but do you know your “good side?” Being aware of your strengths will go a long way to establishing credibility with an audience who are going to be making a snap judgment of you based on what they see on a webcam. The  audience is literally taking you at face value when they first meet you on a video conference. Understanding how you look on camera and what angles work for you is an easy way to show your audience that you know what you’re doing and that they should listen to you.

Lights, camera, your turn!
Closing that big deal or presenting to an executive board can be stressful, but using these simple yet effective tips can help you to exude self-confidence and build credibility with your audience.

First published by citrixonline.com

How to win at rock paper scissors

A group of scientists in China showed that while the strategy of players looks random, it actually consists of predictable patterns that an opponent could exploit to gain a vital edge

Study reveals there is a winning strategy to the simple playground game

A study into the popular game rock-paper-scissors has discovered the best strategy to win the game

A group of mathematicians in China showed that while the strategy of players looks random, it actually consists of predictable patterns that an opponent could exploit to gain a vital edge.
Dr Zhijian Wang recruited 360 students from Zhejiang University who were divided into 60 groups of six players. The players played 300 rounds of rock-paper-scissors against each other and their actions were recorded.
On average, the players in all the groups initially chose each action about a third of the time, which is what would be expected if their choices were random.
However Zhijian’s results showed that players who won the first round of the game tended to stick with the same action while those who lost would switch actions in a “clockwise direction” where rock changes to paper, paper to scissors, scissors to rock.
It was previously thought that players chose each of the three options of rock, paper or scissors equally over time.

Dr Zhijian says that this could be because previous experiments have all been done on a much smaller scale.

He says that it is not clear whether the human response to the game is “built in” to the brain, but that the conclusion that people use a predictable strategy when playing rock-paper-scissors means that the weakness could be exploited:

“Our theoretical calculations reveal that this new strategy may offer higher payoffs to individual players” he said.

Study shows only half of the UK IT decision makers are aware of impending EU data laws

 

Only half of UK IT decision makers are aware of the coming EU Data Protection Regulation, compared with 87% in Germany, a survey has revealed.

The proposed regulation is a set of legislation that aims to bring comprehensive reform to data protection, strengthen online privacy rights and boost Europe’s digital economy.

If the regulations are broken, fines could be as high as €100m or 5% of global revenue.
While 95% of German respondents were aware there would be fines, almost a quarter of UK respondents were unaware of the proposed fines.
The survey by security firm Trend Micro polled 850 senior IT decision makers across Europe.

Of the 250 UK respondents, just 10% said they fully understood what steps their organisation needs to take to achieve compliance.

More than eight in 10 UK respondents believe their organisation faces significant challenges to comply with the data protection regulation, with a quarter saying that adhering to it is unrealistic.

Lack of employee awareness (44%) and restricted resources (31%) were highlighted as the biggest barriers.

Nearly half of UK businesses said two to four years was a more realistic timeframe for them to comply.

“With ratification expected in 2014, it is alarming to see how little is known about such key privacy regulations,” said Rik Ferguson, vice-president security research at Trend Micro.
“This affects every organisation, regardless of size. If a company processes data then it needs to be aware,” he said.

According to Ferguson, data privacy should be a board-level discussion as companies look to gain maximum value from a new generation of big data projects.
“This is not just an IT issue. Duty to comply falls to everyone from the receptionist right up to the chief executive officer,” he said.

The survey revealed that even UK businesses aware of the regulations are confused over to whom it will apply and who will be responsible for compliance.

Almost a quarter of respondents either did not think the regulation would apply to their organisation or did not know.

Nearly four in five of UK respondents believe some responsibility for ensuring compliance with the proposed regulation lies with the organisation as a whole.

More than a quarter (28%) place responsibility for this with a data protection officer and around a tenth with the government or a business insurance provider.
Half UK IT decision makers unaware of coming EU data laws, study shows

Nearly two thirds of respondents believe the proposed regulation will apply to EU-registered companies and over a third think it will apply to companies in business with EU companies.

Less than half of respondents correctly identified that the proposed legislation will apply to any company that deals with EU resident data, even if that company does not have a legal entity within any EU state.

More than eight in 10 UK respondents said their organisation will need to take steps to become compliant.

To achieve this, most plan to increase employee training on data protection (57%), half plan to increase investment in IT security, and just over a quarter plan to increase their data breach insurance cover.

“These findings need to serve as a wake-up call, both to businesses and governments that these changes are coming and we all need to prepare,” said Ferguson. “If they don’t take action there is the very real chance that they might wake up with a nasty fine on their hands that could potentially have a major impact on their business,” he said.

According to Ferguson, every business should start the process of compliance with a health check or assessment of where the organisation is right now in terms of what data is stored, how it is processed and what policies currently govern it.

“This will put organisations in a position to know where the holes are in their data policy and what needs addressing,” he said

Windows XP – NOTHING HAPPENED so far

– but what about the rest ?

XP went end of life nearly a month ago and so far not one vulnerability has hit the headlines, so far. I don’t think its a priority for any ne’er-do-well. There are much better pickings to be had from other software that went end of life but without all the fanfares.

This is the official line from Microsoft:

Microsoft will offer a minimum of 10 years of support for Business and Developer products. Mainstream Support for Business and Developer products will be provided for 5 years or for 2 years after the successor product (N+1) is released, whichever is longer. Microsoft will also provide Extended Support for the 5 years following Mainstream support or for 2 years after the second successor product (N+2) is released, whichever is longer. Finally, most Business and Developer products will receive at least 10 years of online self-help support

Believe it or not there were several products that went End of Support in 2010 but there were no news articles about that. That’s because its not as interesting but it is more worrying. These products went end of support in 2010, which is the same for all the products we are talking about here today.   
.
Server 2003
Server software is the least considered but the most important in any network environment. Ignoring all the tasks such as email, print and file serving what does it do?

The server is responsible for users and their security, crack the server and you have everything and it has always been the target for “Quality hackers”. All your data and emails are here so get in and the world is your oyster.

Every user should have a password and this is your first defence but in Server 2003 there was one user that was Automatic. That’s the Administrator account, armed with this and some password guessing software and you are in.
The server has several holes that are accessible and to use these all you need to know is the protocol, username and password. Seems pretty tight doesn’t it? You need four pieces of information. Well I have news for you. Nearly every server 2003 has hole number 3389 open, the protocol is RDP and Server 2003 has the username of Administrator, that’s three out of four now known to hackers and that’s the easy way in.

The server also manages the firewall and all the security, so if there are vulnerabilities, and there will be, XP was patched a few days ago for one last time ands it sorted out three on a system 12 years old.

Really if you haven’t replaced Sever 2003 by now you should be seriously well on the way to planning it, but its not that simple as the licencing costs for small business has gone through the roof to force you on to the cloud where Microsoft will squeeze three times as much money out of you over five years.

Office 2003
This is not as critical as XP or Server as it does not connect directly to the internet all the time Although that’s not strictly true, Outlook can get to emails and as it can run scripts it could be a target but I doubt it. Word and Excel also do internet searches but again its not that critical but its a good idea to upgrade as what you can do, and how you do it has changed a great deal.

Exchange 2003
This is quite critical as exchange handles your email out and in and has a whole set of things that can be exploited. If anything we would have advised clients to upgrade this as a higher priority than XP.

Its hard to be specific about the threats as we are not trying to exploit any vulnerabilities and the first we will know of them is when there starts to be large scale compromising of systems and plenty of breaches of security.

So our advice is that you wouldn’t use an out of date medicine so why risk your business health by taking chances?

Too  many business are worried about having the latest car or gadget rather than caring about what matters.

Charlatans5 Things You Didn’t Know About Cloud Backup

We at cmx come across as anti-cloud, we are not, but what we are against is that new breed of IT salesman which we called the “the charlatan”.

According to that fount of all knowledge, Wikipedia; A charlatan (also called swindler or mountebank) is a person practicing quackery or some similar confidence trick in order to obtain money, fame or other advantages via some form of pretense or deception.

Perfect description; the word comes from French charlatan, a seller of medicines who might advertise his presence with music and an outdoor stage show –

 This sums them up exactly but we do not and cannot imply reverse logic that all  cloud sales people are charlatans. I speak of those who sell a very good product, for the right circumstances to the people who need it. I consider these as professional friends and I will be happy to recommend tyhem and introduce you to them.

The ones I speak of are those that in former lives sold double, glazing, PPI insurance, Cavity wall insulation, endowment mortgages and extended warranties, these are the guys who can spot an opportunistic bandwagon to leap on to make money on commission.
These are the guys we have a problem with and its to counter them that cmx appears to have adopted the anti cloud view. We are not anti-cloud, we are anti-charlatan. So we will carry on with the warnings.

1. Data privacy can easily be compromised by encryption key holders.
If your service provider has access to your encryption keys, your data is just not private.
Encryption is vital to data protection and most backup solutions offer it. However, encryption is not always a guarantee of security and privacy of business data. After all, if an employee at your data backup company can access your encryption keys, is your data truly secure?
Some service providers have responded to this concern by purporting to “” the key, saving it separately from data, and rotating it frequently. But no matter the steps taken, as long as the service provider has access to your encryption keys, your data is just not private. And a subpoena will force service providers to produce unencrypted customer data – even when encryption keys have been escrowed.

Another response to securing encryption keys has been to use an onsite server, behind the client’ firewall, to house encryption keys in order to guarantee sole ownership. However, this is not a true solution for cloud-based backups since there is still hardware to manage and maintain, defeating the purpose of cloud services. Additionally, an onsite server adds another point of potential failure, requiring additional data protection.

If your service provider has access to your encryption keys, your data is just not private

For maximum privacy, two-factor encryption key management is the recommended solution. With two-factor encryption key management, the encryption key is further encrypted using customer admin credentials, and only a token is stored in the cloud. With this solution, the service provider has zero access to encryption keys and customers avoid the hassle of supporting key servers on-premises.


Only customers have access to the key and, subsequently, their data, once authenticated.
And to truly guarantee privacy, the key is destroyed at the end of each customer session.

2. Choosing the wrong cloud could mean permanent data loss.Of course, most of ” cloud” actually exists at ground-level, supported by many connected servers and other devices which require electricity and protection from the elements. As much as dependability of data centers has increased over time, these server farms are still vulnerable to power outages, sabotage, and natural disaster.

This is why it’ important to understand the Service Level Agreements for any backup providers under consideration. Many cloud service providers don’ offer data redundancy across multiple data centers. In the event of a power supply disruption, service is suddenly unavailable and files are out of reach until the problem is corrected. A natural disaster, such as a flood, could even result in permanent loss of your critical corporate data.


Leading service providers offer data redundancy across multiple facilities, each of which is physically separate, located in lower risk flood plains and fed via distinct grids from independent utilities. These facilities are connected to different networks to ensure the
highest data availability and durability possible.

3. Local cloud backups can violate data residency laws.
Traditionally, cloud backup providers have employed a limited number of data centers
and housed those data centers within the borders of a single country. Adding Many cloud service providers don’t offer data redundancy across multiple data centers.
Server farms are still vulnerable to power outages, sabotage, and natural disaster.
5 Things You Didn’ Know About Cloud Backup storage typically requires following a multi-step process, often cumbersome and not immediate.

If your business has global reach, these localized backup providers are simply unable to offer a premium, worry-free experience. By definition, a global enterprise supports internal systems which are utilized by employees and other users all over the world, subjecting the enterprise to a specific set of laws in each country. Using localized cloud backup providers from a single country is not only inefficient but, in many cases, it results in a violation of local
data residency laws.


By contrast, leading cloud backup providers are equipped with multiple redundant data centers across the globe, enabling customers to control which data centers are used for their data backups. Leading providers also utilize an ” storage” concept, enabling customers to add storage instantly in any data center without having to worry about scaling their storage requirements.

4. Without deduplication, your backup speed is a fraction of what it could be.

One of the reasons traditional cloud backup systems can be very slow is that the software must compare the last file and directory structure with the latest file and  directory structure in order to determine what’ changed. Unfortunately, as much as 80 percent of data is duplicated across a typical enterprise. This is because users often have multiple copies of an identical file stored locally, as well as on shared or removable drives. This causes storage requirements to boom, considerably slowing cloud data transfer.


When backup solutions practice global deduplication, cloud backup and restore times are dramatically improved because an enormous amount of duplicate data has been identified and removed.


To perform enterprise restores quickly, a backup solution must also use multi-threaded restores in order to allow parallel transfers of multiple files. Using multi-threaded restoration significantly accelerates the time it takes to restore data to a user’ computer.

Traditional cloud backup systems without global deduplication can be very slow. Using localized cloud backup providers is inefficient and often results in violation of data
residency laws. 


WAN optimization will also speed up endpoint backups because WAN optimization
makes best use of the available bandwidth. If there’ a network interruption, WAN
optimization ensures that the dropped backup automatically resumes at precisely
the right point.

5. Outdated backup solutions severely restrict IT control.
Using older principles of storage technology, some backup companies are not able to leverage federated search, which can quickly locate information anywhere on the network. This is a challenge when attempting to track down a file or to enforce a new policy. Because federated search looks across every file and device in the enterprise, it becomes easy to locate files, gather or even collect them for legal hold, in order to preserve custodian data for e-discovery.


On the other hand, modern backup solutions empower IT with visibility and make it easy to enforce policies on data backup, restore, and access. These leading backup companies also make use of detailed audit trails to strengthen IT’ oversight and to prevent material information, such as intellectual property, from being compromised due to the increasingly mobile workforce. Detailed audit trails preserve a record of all user and admin activity, as well as provide real-time visibility, enabling organizations to support their governance
and compliance needs.


If the enterprise is subject to industry regulation, it’ well worth it to select a service provider that already has passed the requisite certifications (e.g., HIPAA, PCI-DSS, ITAR) for its data centers and operations. Without federated search, it is a challenge to track down a file or
enforce a policy






"egg"ccident 3Cancer, Car accidents, hacking, card fraud all have a lot in common – They only happen to other people, not you.

Is this arrogance, ignorance or what?

Everyone knows someone that something bad has happened to, if not then themselves, then someone close, or a friend, or a friend of a friend, maybe somebody in the same village or town even somebody living in a faraway country but in similar circumstances.

So in a word Sh*t happens, a lot, to everyone all the time so it can never be ignorance.  Maybe the alternative to “it’ll never happen to me” is a permanent fear that something is going to happen which is bordering on the symptoms of depression.

So if appers that we go around with an optimistic view on life to avoid the permenant worry of what’s going to happen next.  That’s fine as it enables us to lead a normal life of driving, shopping, flying kindly of the things we do on a day to day basis.

BAD NEWS.
That’s really bad news, we need to establish some form of balance unfortunately we don’t.  The anytime we do this is when we plan for emergencies that are unlikely to happen.  When we go on holiday we take offense take a first aid kit and no one really leaves without insurance.  I even know someone who drains down the heating system when they go away, which is usually in the summer.
 
It’s the same thing that suddenly wakes us up at four in the morning and gets us to worry what speed we went past that little yellow camera on the side of the road.
 
All of these things do not really need to be worried about because although they do happen the chance of us facing a disaster like we have imagined is unlikely.

It’s also guaranteed that it won’t happen because we have planned what we would do in case of an emergency.  I sail in all types of boats, I wear life jackets, make sure that there is manoverboard equipment, first aid kits etc.  Luckily I have never had to use this equipment and I hope I never will.

Now the point of this article is that the things that almost likely to happen, in fact happen every day to lots of people are so far down their list of priorities that no thought is at a given to them even on a  yearly basis.

Your building is unusable – KEEP OUT
The day of the 1987 stolen I went to work as usual, I didn’t expect anything different nobody had called and apart from losing the side of my house, the large amount of trees I expected to roll up at our Colchester office and start work as usual.

What I didn’t expect was to see 36 people standing outside staring of the site of the building.  The whole side which was made of glass had been totally removed by the next door factory roof.  We had asbestos and glass all over 50% of the building.  In my office the carpet was ruined, the wall and door had glass embedded in it.  The computer screen was smashed and as it turned out all of are servers were destroyed.  “It” had just happened to us.

All backups were off site, we had spare equipment, another office and we were up and running again later that day.

We had a plan.
We had actually spent some time compiling everything we needed to implement a disaster  plan.  We started from the premis that we would arrive at the very large hole which was water filled that now replaced our 6,800 sq foot office building in south Colchester, we prepare the same plan for Ipswich.

We went around everybody in the company announced what they would need to be operational again, this was incorporated into the plan and tasks were delegated.  We looked at everything, wrote it all up and circulated plenty of copies.  Apart from the daily routine of data backup the plan was forgotten except when it came out to be reviewed once a year during a meeting of everyone, usually down the pub ensuring 100% attendance.

We had confidence that should a disaster strike we had done as much as possible.  Backups were tested and we had established a routine.

That disaster cost us nothing, not a bean, no cash flow interruption, no lost data and we were able on the same day to go out and look after clients who had faced thier own disasters.

We get 250 calls a year over lost data 
We get roughly one call a day from someone who has lost their  data, that’s over 250 calls a year. We have special software that can unscramble disk drives. No one else we know does this.

Only a fraction of the callers, as low as 2%, has an adequate backup.  Most of them think may have but they haven’t.  I suspect that that only 2% of all the people who start reading this article will get this far.  If you have then I am personally available to come to you and check your backup. Free of charge. That’s to prove my point. I will publish the results in a months time of who has taken me up on this my number is 01206 256459 or 01473 231800 ask for extension 25 and I will talk to if I am in, if not I’ll ring you back as soon as I can. 

Security
Doesn’t have to be a big disaster, or even one you can see, you can have a virus, a hacking or fraud attempt. These can cost you so much more and in a shorter time. The difference is you may not know about it until its too late.

The moral is?
Its not down to arrogance, its all down to ignorance and ignorance especially about planning. I was once told “If you fail to plan, you plan to fail”, that’s a military adage. here’s another “Proper Planning Prevents P*** Poor Performance” and my particular favourite, Lack of preparation on your behalf does not justify an emergency on mine”. When bad things happen we react, its better to have the cool judgement of a previous “you” telling you what to do than the “panic you” running round in ever decreasing circles doing headless chicken impressions as you hard built up business disappears into dust & debt.

The moral is that everyone needs a plan, needs to check it and make sure it works. Our clients may not know it but we have a disaster plan for them too.  We have loan equipment and the expertise to get them up and running as quickly as possible.
 
This will all be useless unless the backups are good enough, they have the proper insurance policy and the ability to start up again somewhere else almost immediately.

Oh I forgot, its what happens to other people isn’t it? Like the people flooded in  Wales, Someset, London and the riots in Croydon, Brixton, Toxteth.

TECHIE POST: Hyper-V on the Client: How to install the hypervisor on Windows 8 to run Windows XP without security issues.

 So you know how to install Hyper-V in Windows Server, just use the Add Roles Wizard.  As that is not an option in Windows 8, it is slightly different.  Here you go, step by step:
  • SNAGHTML4b439You need to open the Windows Features screen.  There are two ways to do that.  The first is from the Control Panel, click on Programs and then Turn Windows features on or off
  • For those of us who like to use the direct commands you can click Windows Key-R to open the Run box, and then type appwiz.cplThis will open the Programs and Features window.  the option to Turn Windows features on or off is in the navigation pane.

In previous versions of Windows you could manage remote Hyper-V instances by downloading the Remote Server Administration Tools (RSAT) from Microsoft.  Since Hyper-V is now included in the operating system, so are the management tools.  From this screen we see that we have the option to simply install the Hyper-V Management Tools and you are off to the races – nothing has changed.  (the two sub-options are Hyper-V GUI Management Tools and Hyper-V Module for Windows PowerShell)

  • Once you select the Hyper-V Platform Windows will check to make sure your system supports it – of course, it is a 64-bit only option, and virtualization has to be enabled in the BIOS – and then installs the role.  It only takes a few seconds, and then you will get the screen asking you to reboot.

As it is in Server, installing Hyper-V requires multiple reboots but because of the greatly improved boot time of Windows 8 that takes less than a minute. Once you are back in, the Metro Start screen has two new tiles:
image
As you see, the Hyper-V Manager and the Hyper-V Virtual Machine Connection tool are there and ready to go.  You can start creating and booting up VMs, as well as connecting to VMs both locally and remotely.

Remember, if you are going to manage or connect to remote systems, you will have a much better experience with domain-joined clients.  The security is still managed by certificates.
Now that we’ve got Hyper-V in the client, what are you waiting for people? Virtualize!

Windows XP’s date with destiny has passed….. What now? 

As of Tuesday, Microsoft will NOT be releasing any new security updates. With one in five PCs still running Windows XP, there’s a chance you are among those whose computer is now running an unsupported operating system. What now?

Doing an in-place upgrade to Windows 7  or 8 isn’t a good choice. Yes, it will keep all your apps and settings, but it’ll also preserve all the clutter and crud that slows down an old Windows install, and you’re limited to 32-bit Windows 7. You really need to nuke and start over.

But there’s another, little-known way to replace your old, unsupported OS with a new one that’s safe, current, gets updates and comes free of charge. The answer: run Windows XP as a zombie OS on something else.

Chances are you’re using WinXP for a particular application that’s incompatible with 64-bit Windows; backwards compatibility with legacy code was dropped to keep the size and complexity of the operating system down. Vista was the first 64-bit version of Windows to see much adoption, and its users suddenly found that some of their beloved but ancient apps didn’t work any more.

So, Windows 7 introduced a workaround: Windows XP Mode. This is a free download for Windows 7 Pro and above, comprising two files: a compressed virtual machine containing a complete, pre-installed copy of XP Pro, and a copy of Microsoft’s free desktop hypervisor, Virtual PC, preconfigured to run that copy of XP with desktop integration – so XP windows appear on Windows 7’s desktop and so on.

This has been dropped in Windows 8.x – the newer OS has its own built-in hypervisor, and by now, you’re meant to be running 64-bit native apps anyway.

However, XP Mode remains a free download, and with a little work, you can get it running on the cheaper editions of Windows 7, on Windows 8.x – and even on Linux (Ubuntu in my case). All you need is a different hypervisor.

If you’re a committed VMware user, then the freeware VMware Player will do, but otherwise, Oracle’s VirtualBox is free and open source. You only need proprietary code for the extension pack, which adds USB2 support among other things – but it’s still gratis.

You can download the XP Mode VM freely from Microsoft’s website, but to do so, your PC needs to pass Windows Genuine Authentication – so here’s a handy list of direct links that will serve you the file directly, whatever OS you’re running. Once you have the file, you’ll need a grown-up archiver to unpack it, such as Zip central.

You need an XP licence, of course – the copy in the VM is keyed against VirtualPC’s emulated hardware and will fail when running on VirtualBox, so you’re going to need a valid XP Pro licence key. Microsoft handily includes a key in the download file “sourcesXPMKEY”), but the chances are it won’t work. Of course, you may well have one on a sticker on your PC case or knocking around somewhere.

Just in case you thought running Linux had banished Windows Update forever… 
 

Once you’ve unzipped the download file, you’ll find another archive (“sourcesxpm”) inside it. Extract that, too. In there is a VirtualPC VM image and its virtual hard disk (“VirtualXPVHD”).
Next, create a new Windows VM – I called mine “XP Mode”. Move VirtualXPVHD into your new VM’s folder (“~VirtualBox VMsXP Mode”), insert a full stop in the appropriate place (“VirtualXP.VHD”), and when VirtualBox asks whether to create a new virtual HD or use an existing one, choose it.

Now you can boot your new VM. It has to go through the final stages of setup – that’s your chance to set it to a UK keyboard etc – and then it will finish loading. The snag is that the VM has the “VirtualPC Integration Components” pre-installed, and they won’t work under VirtualBox, meaning that the VM will lock up.

You’ll have to forcibly power off the VM, restart it, uninstall the VirtualPC gubbins, try to shut it down, watch it freeze again, close it, and reboot it again. It should restart OK, at which point, you can install the VirtualBox additions and reboot it again. Now, you’re in business, and you also remember why you wanted to get rid of XP in the first place.