Randy George

Profile of Randy George

Director, IT Operations, Boston Red Sox
Blog Posts: 38

Randy George has covered a wide range of network infrastructure and information security topics in his 4 years as a regular InformationWeek and Network Computing contributor. He has 13 years of experience in enterprise IT, and has spent the last 8 years working as a senior-level systems analyst and network engineer in the professional sports industry. Randy holds various professional certifications from Microsoft, Cisco and Check Point, a BS in computer engineering from Wentworth Institute of Technology and an MBA from the University of Massachusetts Isenberg School of Management.

Articles by Randy George

Windows Server 2008: A WAN Op Strategy

Bluecoat, Citrix, F5, Riverbed and other similar vendors all offer highly functional and well performing WAN Optimization appliances. Unfortunately, those high-end solutions can be either overkill or over budget for some organizations. So, instead of buying the whole pizza, why not try a slice first?

Post a Comment

Get Ready For The Impact Of 2048-bit RSA Keys

If you've had to renew an SSL certificate for any of your critical infrastructure delivery devices recently, then you probably took notice of the need to generate and deliver at least a 2048-bit CSR to your Certificate Authority of choice. While this new standard may have little impact on you, for others the impact may be huge.

Post a Comment

SMB Storage Replication: Acceleration VS More Bandwidth

With the cost of secondary storage and bandwidth plummeting, does it really make sense to invest in expensive acceleration solutions to service your storage replication needs? Faced with tight capital budgets, small organizations in particular should consider a "backward thinking" approach. Today, you can get 5TB of Amazon S3 storage for $150/month, and for another $100, you can get a nice fat business class internet pipe to ship your storage there. Compare that annual operational cost with the

Post a Comment

Ready For Open Source WAN Acceleration?

Open-source products have always had a place in enterprise IT. Administrators and engineers usually have some open source tools around, whether on production systems, in a test and dev lab, or in an skunk works playground where folks can knock around ideas and try new things. Consider how open-source alternatives have reshaped the Network Management System (NMS) space. Not so long ago, if you wanted to get a taste of a truly robust enterprise monitoring solution, you had to drop serious cash on

Post a Comment

Embracing Virtual WAN Acceleration

Almost every major WAN Acceleration vendor has jumped in on the virtual appliance bandwagon. The question is, are you ready to give up that shiny new appliance with your vendor's logo and replace it with just another boring server you have kicking around your data center? Let's face it, when you buy a Citrix NetScaler or a Bluecoat Proxy SG for WAN Optimization, you're really making an investment in a software solution.

Post a Comment

Metering Social Networking Sites At The Gateway

Most managers have no problem with a little internet frivolity during business hours. A personal E-mail here and a Facebook posting there can't possibly interfere with productivity on any measurable scale, right? Then there's "that guy." You know him, the guy who is on Facebook all day long. The guy who's connected with everyone on LinkedIn. The guy who tweets every detail of his day to the world. In other words, the guy who ruins everything for the rest of us.

Post a Comment

Default Passwords Can Kill You

It's been widely reported that Czech security experts recently uncovered a large botnet that exploited the weak and default passwords of many broadband routers and DSL/Cable modems. The impact? DNS redirects to malware sites, DDoS attacks and data leakage for many unsuspecting broadband users. Don't let this happen to externally-facing gear in your datacenter. There are a couple of easy and free ways to pen test your network.

Post a Comment

WAN Link Aggregation

Is the high cost of bandwidth from Tier-1 providers crushing your operating budget? Fight back with some value engineering in the form of WAN Link Aggregation. It wasn't that long ago that I was shopping for a 10Mbit internet pipe for a small company in a well wired urban center. I had a budget that I thought was relatively fair in order to acquire the bandwidth I needed. Boy, was I wrong. I got a few budget busting quotes back that were simply not going to fly.

Post a Comment

E-Mail Encryption Goes Mainstream

Fess up, have you ever emailed your credit card number or Social Security number to a friend, family member, or even to a third party? I have, and yes, I was a bonehead for doing it. In the business world, you need to make sure your employees aren't doing it either. Why should you care? New state mandated data privacy regulations are changing the rules of the game when it comes to emailing Personally Identifiable Information (PII) in cyberspace. Simply stated, it's bad business, and it's becomin

Post a Comment

Will Desktop Virtualization Break-Out In 2010?

We've been covering Desktop Virtualization ad nauseam at Network Computing and for good reason. As a technology, Virtual Desktop Infrastructure (VDI) has the potential to change the way we deliver an operating environment to our users. Unfortunately, broad acceptance of VDI has been hampered by vendors' inability to stream graphically intensive apps over remote viewing protocols like RDP, ICA, and others. If the lofty promises of the leaders in the virtual desktop computing space hold true, 201

Post a Comment

Extreme Catching Up On Enterprise WiFi

The switching business is tough, and Extreme Networks has faced its share of hard times recently. With the departure of CEO Mark Canepa in late October and with the announcement of a sizable layoff, it would be easy to assume that Extreme Networks has lost momentum against the big players like Cisco and Juniper, but Extreme is far from down and out. Read on to hear about some interesting news with respect to Extreme's enterprise WiFi strategy.

Post a Comment

Backup Adminstrators' Best Practices

A peer of mine at another organization is stuck in a time warp. Every day at 5PM he must shuffle tapes back and forth, deal with long back-up windows and deal with restore issues due to the complexity of his environment. If you're not adapting your backup strategy to the times, you're putting your organization at risk.

Post a Comment

Wanna Hear A Bad Idea? Wireless USB Thumb Drives.

Word on the street is that a company called Touch360, a self-described company of "explorers, innovators, creatives, and researchers with a yen for adventure," has apparently developed a wireless USB thumb drive. Data thieves everywhere, rejoice, because soon your victims...

Post a Comment

PayPal Takes The Fight To The Enemy

In an effort to fight back against a massive amount of phishing attacks against PayPal, the e-commerce company recently announced that it will soon force customers who want to use its service to upgrade to browsers that have the latest...

Post a Comment

Hacking VoIP

I must admit, I frequent the New York Times technology section. No, not for the engaging technical news, but for the good technology business-related info. Occasionally, I'll stumble across some interesting security-related topics, and today was one of those days....

Post a Comment

Malware Brought Hannaford Down!

It???s been widely reported today that the source of the recent massive credit card theft at the Hannaford and SweetBay grocery chains was a pervasively installed piece of malware. The finding was revealed in a letter from Hannaford general counsel...

Post a Comment
White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Twitter Feed