Welcome!


From the Blogosphere

In the beginning there was a simply acronym: MTTI (mean time to innocence). Weary after years of costly and time-consuming war room battles, IT organizations turned to AppDynamics to give an objective application-level view of production incidents. As a result, application issues are s...
Clearly, the buzz around wearable technology has to do with the hands-free user design – these smart peripherals allow for a better experience for certain functions. While consumers are not going to do away with their iPhones, tablets and computers anytime soon, wearables make sense as...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...
Like moving to IPv6, simply picking up your existing network architecture and moving it to a completely new one is not going to happen overnight. There will undoubtedly still be "traditional" networks hanging around even when SDN adoption is considered mainstream and fully mature. That...
While organizations spend the next few days and weeks patching OpenSSL vulnerabilities, the realization is setting in that we may never know the full extent of the damage caused by Heartbleed. Although Heartbleed was only announced in early April, it has actually been present in OpenS...
Earlier this week, Ethan Banks wrote a very nice article about Mellanox’s dual spine and leaf network in support of a large amount 10GbE access ports. After describing the scaled up network design, he reviews 8 observations about the design, not to point out good or bad, but merely to ...
Last week was a crazy week for information security. That's probably also the understatement of the year. With the public exposure of Heartbleed, everyone was talking about what to do and how to do it to help customers and the Internet, in general, deal with the ramifications of such a...
Like every one I am updating my terminology to reflect the shift that occurred – Business and technical executives immediately get that when combined with a world of smart, connected devices then Cloud computing only makes more sense. We have entered an age where IoT Cloud Computing...
This past weekend, like many of you, I started getting the blood curdling password resets from a bunch of OpenSSL affected sites. I also got a few emails from sites indicating that I had nothing to worry about. Bad news, good news. Probably the biggest security story thus far for 2014 ...
When I visit clients to talk about DevOps, I usually ask them what their monitoring strategy is. Too often, the answer I hear is "We use Nagios". I think Nagios is a great tool, but it sure is not a strategy. Nagios does a good job of monitoring infrastructure. It will alert you when y...
One of the most powerful aspects of the Internet of Things is the process of synthesis it achieves; it provides a mental model for people to associate and relate a number of different technologies under one umbrella concept and trend. Therefore one early quick win is a simple taxonomy...
OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs and "software-defined" (which really means software-controlled, but this is neither the time or place to get into that debate). It's about jailbreaking the network. Enabling access to features and functionalit...
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
Not too long ago, it took even the most successful entrepreneurs several centuries or at least decades to reach a valuation of a billion and thus become a member of the exclusive Billionaire Boys Club*. Families like the Rothschilds, the Waltons or the Brenninkmeijers have indeed built...
Despite claims that there exists (or will, look out!) a mythical "god box" for the enterprise data center, capable of performing every data center function imaginable, it remains, well, mythical. Efforts to effectively secure the data center and the applications it delivers therefore r...
HTML5 is still one of the most discussed topics amongst us technical types. The key challenge, however, has remained unanswered for a long time. How do you effectively wrap HTML5 for use in native mobile applications? Unfortunately I do not have a universal answer, but I do have a s...
If the CEO of the company has anything to say about Lenovo's standing in the PC industry, the company won't stop until massive growth is achieved. In a series of recent buying sweeps, Lenovo has bought Motorola Mobility for a whopping $2.91 billion from Google and also acquired the ser...
What is the “3rd Platform” of IT? It comprises of the cloud, mobile, social, and big data products. According to IDC, “3rd Platform technologies and solutions will drive 29 percent of 2014 IT spending and 89 percent of all IT spending growth”. Much of that growth will come from the “ca...
We love analogies. No matter what the topic, analogies are a great way to explain something in a different context to make a specific point with a frame of reference that may be more familiar to those we are making a point to. There is one that seems to come back over and over again in...
There is probably never going to be a perfect balance in the industry between Do-it-yourself (DIY) and Do-it-for-you (DIFY) networking. It seems exceedingly unlikely that there is a one-size-fits-all type of solution out there. And so we will invariably end up with a bifurcated market ...
There’s a new craze occurring in homes, highways, workplaces and everywhere imaginable – the Internet of Things or as I like to call it, The Internet of Nouns. Sensors, thermostats, kitchen appliances, toilets and almost every person, place or thing will have a chip capable of connecti...
The industry often talks about how the data center perimeter is expanding,necessarily, due to technological shifts such as cloud and mobility and BYOD. But that isn't really the case. If you look closely, you'll see that the perimeter is actually shrinking, getting tighter and tighter...
As the fourth installment of HBO’s ever popular hit series, Game of Thrones, premiered this past Saturday, millions of viewers were frustrated to find out HBO Go crashed due to overwhelming demand. A discouraging sign for fans who wanted to watch the highly-anticipated premiere. TechC...
Nick Lippis, who writes the eponymously named Lippis Report, had a fascinating report on the differences between enterprise and service provider environments with respect to network virtualization. He observes, through a survey of the ONUG (Open Networking User Group) membership, t...
The goal of any DevOps solution is to optimize multiple processes in an organization. And success does not necessarily require that in executing the strategy everything needs to be automated to produce an effective plan. Yet, it is important that processes are put in place to handle a ...
In any space, there is a very small vocal minority. Most people lack the time, interest, or even confidence to say what they think in public. So we are left with a vocal few who drive the conversation. In networking, the vocal minority consists mainly of the vanguards for change. For t...
The combination of cloud computing and big data is a match made in heaven. Big data requires a flexible compute environment, which can scale quickly and automatically to support massive amounts of data. Infrastructure clouds provide exactly that. But whenever cloud computing is discuss...
The CEOs of leading companies are already striving to create an agile business model -- one that responds quickly to competitive pressures and shifting market demands. Commercial agility often requires a corresponding accelerated business technology deployment. Meaning, the IT requirem...
I am the CEO and founder of GovCloud Network, LLC. In a consultative role, I help companies develop and execute targeted media strategies via social media channels to over 1.5 million professionals across 20 industry verticals. With a specialty in cloud computing, we and our partners a...
In the cloud lock-in is often a greater concern than lock-out*, but both should be top of mind for organizations looking to deploy cloud seriously, or better said, for organizations that want to deploy cloud for serious business. Lock-in is the phenomenon that it is often difficult ...
You've all heard the news, right? Load balancers are dead. But that doesn't mean load balancing is dead and, in fact, it's a pretty critical piece of today's emerging technologies. That's because when you look out at what's going on and what's growing like weeds in a Midwest corn fiel...
IBM has identified mobile devices, cloud computing and four other trends that are looking to shape the federal information technology of the future, according to Jane Snowdon, director and chief innovation officer at IBM Federal. In an op-ed for Federal Times, Snowdon writes that mbil...
When large enterprises move to a public infrastructure cloud (such as Amazon Web Services or others), it is a gradual, and often times, carefully measured process. Large enterprises strive for 100 percent certainty that the migration process will not impact the business; therefore, the...
​I recently asked a group of people a question that I thought would raise quite the debate, but it surprisingly (to me) failed to do so. I asked, “Have mobile apps been more influential to enterprise software, or is it the other way around?” I’d love to say that it was only a slight m...
Data is dumb but we can't seem to get enough of it these days. An entire industry has evolved to make sense of the massive amounts of data being generated every day. Massive data collection by itself does not guarantee the context required to solve business and IT problems... If we are...
Assuming that your organization is well down the road when it comes to adopting the Cloud and in fact, has been utilizing the Cloud for a while, then you are likely a true believer that ultimately all of your applications will be migrated to the Cloud. It is no longer a question of "if...
The term "service chaining" hasn't quite yet made it into the mainstream IT vernacular. It's currently viewed as a technical mechanism for directing packets, flows or messages (depending on where you sit in the network stack) around the network. Service chaining is the answer to "how ...
Spark is a platform for applications like Machine Learning, which can make a good use of distributed, in-memory capabilities. Machine Learning is critical part in extracting value from Big Data. Choosing proper model, preparing data and getting usable results on large scale data is n...
While technology changes on a regular basis, IT teams have had a standard approach to administration. In recent years, however, there has been a drastic shift in data center administration. One of the biggest shifts is the adoption of private and public clouds. In part one of this seri...
Hopefully you never forgot Group Policy! Whenever the topic of working with desktops in business is brought up, IT Pro’s always want to manage and maintain those desktops. For me the first thing that always come to mind is Group Policy and hopefully does for you as well. Group Pol...