Cloud computing providers such as Google, EMC and others rely on a channel partner to educate, train, migrate and support firms using their products. CloudSherpas, a startup founded in July and one of 15 in the Atlanta CapVenture program this year, plans to be that guide to cloud computing.Source
Founder and CEO Michael Cohn tells TechJournal South the company is self-funded now and seeks a $500,000 angel round to establish itself as a cloud systems integrator.
“We’re building a service practice and a support organization to help companies move to the cloud,” he says. On the Google side, for instance, the company plans to help large organizations migrate from Microsoft Exchange and Lotus Notes to Google aps for the Enterprise.
The idea is to give firms migrating to the cloud environment “a local throat to choke,” says Cohn.
“Companies with 100 to 2,000 seats is our sweet spot,” he says.
Cohn says the initial stage of the business looks like a consulting organization, but its goal is to build a platform that enables secure integration.
The advantages of cloud computing are obvious, Cohn notes. “It’s a much lower cost (than licensing software outright). It enables a company to reduce capital expense and move the cost to operational expense by paying for IT as a service. Cloud computing takes the concepts of Software as a Service and utility computing and puts them under one umbrella.”
vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus
Comments
Post a Comment