Welcome!


From the Blogosphere

If the future of federated controllers is based on service layering, then how do multiple controllers manage the same device? Is there a requirement for state synchronization? Do they share information about device operation or configuration? Is there a need for controllers that are ma...
Looking back to one of my predictions for 2014, I had posited that traditional storage solutions labeled cloud will no longer fly this year, and some of the big-iron vendors will be forced to offer their wares as pay-as-you-go services. Perhaps this was stating an obvious eventuality a...
It's that time of the year, when resolutions promising grand changes in our lives are made - and more often than we'd like to admit, broken. Along with the resolutions comes advice on how to make them "stick." In other words, how to make them habitual. Many folks still cite the old ...
Recently Famo.us made a big announcement around offering their own PhoneGap alternative using a WebView that could use Chrome instead of the Stock Android Browser. Android 4.4 (KitKat) actually offers this out of the box now but it is actually Chrome 30 which isn't quite up to the same...
If you thought that cyber security threats were troubling in 2013, then you should brace yourself for the onslaught that's very likely in 2014. A new generation of security threats stemming from progressive business technology trends -- such as BYOD, mobility and cloud services adoptio...
Today’s blog post is headed back to the basics. I’ve been using and talking about APM tools for so many years sometimes it’s hard to remember that feeling of not knowing the associated terms and concepts. So for anyone who is looking to learn about APM, this blog is for you.
In part one of this three-part series I summed up how the way we produce and consume data has evolved over the last three decades, creating a need for new storage methodologies that can help enterprises store and effectively manage massive pools of data. I concluded that the immutable ...
Application developers are aware (you are aware, aren't you?) that when applications are scaled using most modern load balancing services that the IP address of the application requests actually belong to the load balancing service. Application developers are further aware that this me...
As SDN moves closer to large-scale deployments, the issue of controller scaling is becoming a hotter topic. The consensus seems to favor some form of distributed cluster environment, likely in the form of federated clusters. But how should these federations be formed? The first thin...
Flash storage is revolutionizing the way enterprise stores, processes and accesses important data. As opposed to the old methods of storage, most notably hard disks, flash storage is faster and consumes less energy. Flash devices also don't require the amount of space that other techno...
AlephCloud has developed proprietary technology that enables secure collaboration without the need for a trusted third party. This “zero knowledge” model makes sure only authorized parties are privy to the information exchanged and stored, while nobody else has visibility, not even Ale...
Organizations have opened their businesses to drive growth and operational improvements. They’ve done this by incorporating cloud services and mobility, by opening their business to partners and customers and by externalizing APIs to accelerate application delivery. All of this demands...
If you are new school or old school, then will you be stuck on those school's of thought or advanced to the current and future schools? From the old school folks you will hear things along the lines of that is how we do or did it. Also you might hear things along the lines of lets use...
A lot of security-minded folks immediately pack up their bags and go home when you start talking about automating anything in the security infrastructure. Automating changes to data center firewalls, for example, seem to elicit a reaction akin not unlike that to a suggestion to putting...
Financial Services companies operate in a difficult environment. Many of their applications are absolutely vital to the proper workings of the global economy. They are one of the most heavily regulated industries in the world, and they are a constant target of hackers. Their systems ne...
In the last post I covered several architectural techniques you can use to build a highly scalable, failure resistant application in the cloud. However, these architectural changes - along with the inherent unreliability of the cloud - introduce some new problems for application perfor...
“Edward Snowden’s leaks have heightened awareness of the risks in cloud. However, the word is still not viral yet that it’s now possible to apply Searchable Strong Encryption – that delivers AES -256- bit encryption, the highest commercially available level to protect data in cloud app...
The storage industry is going through a big paradigm shift caused by drastic changes in how we generate and consume data. As a result, we also have to drastically change how we store data: the market needs massive, online storage pools that can be accessed from anywhere and anytime. Ob...
There's been a lot of discussion on the Internet about the definition of Platform-as-a-Service. Here's just a few very active Twitter discussions to illustrate the level of activity and passion over the topic: This is just a few of the hundreds of tweets returned when I queried "Paas"...
Peerlyst is a social media platform designed to give enterprise technology decision makers the unbiased information they need to buy, and make the best use of, IT solutions. The network enables a new social buying experience based on peer-to-peer interaction regarding technology produc...
SecureAuth provides 2-Factor Access Control to all industries, extending to mobile, cloud, web, and network resources. 2FaaS accepts any identity and authenticates via SMS, Telephony, and E-mail One-time Passwords (OTPs), and our patent-pending, low-friction Device Fingerprinting to en...
Attack Mitigation Network (AMN) expands cyber attack detection coverage across all enterprise resources and automates the mitigation by selecting the most effective tools and locations – in the data center, at the perimeter or in the cloud to block the attacks. This revolutionary attac...
Pundits, owing to SDN still being very young and not widely adopted, continue to put forth treatise upon treatise as to why organizations should be falling over themselves to go out and get themselves some SDN. Now. Not tomorrow, today. One of the compelling reasons to adopt is to add...
I’d love to take a poll (feel free to share your opinion in the comments section below) on whether software should be considered a living organism in the purist biological sense. Sure, software is made up of code instead of cells, and it may have trouble finding a home in the classic t...
Government organizations, utility companies and private individuals are using big data to fight crime, maintain bridges and prepare for natural disasters. Unless you are an IT manager, understanding all of the technical details of how big data technology — such as Hadoop Hive or Apac...
SDN is almost universally associated with disruption; the general consensus being that it is a significant departure from the way networking has been handled for decades. Insofar as SDN marks a major architectural shift, it absolutely should be considered a disruption. But how does dis...
It is human nature to try and relate new information and new ways of doing things to something that we know, something we are familiar with. Often when we talk about the way we fit traffic onto a Plexxi mesh network, the reaction is “I know what you mean, you are doing traffic engineer...
Many IT teams are looking at virtualization in the Cloud where enterprise-level storage is kept in “pools” often hosted by vendors who specialize in virtual storage. Most commonly, the data and additional space is accessed via a web-based API. Coraid offers a unique storage management ...
With the cloud in its sights as a fast-track strategy for growth, SHI International Corp. has partnered with Zetta.net to round out its expanding portfolio with an enterprise-grade cloud backup and disaster recovery (DR) solution. SHI, which has transformed over the years from a $1 mi...
Bellis: "We emerged in 2012 as the first SaaS platform to use big data security analytics to tell a security pro two important things: number one: which vulnerabilities pose the greatest risk to their organization, and number two: their likelihood of experiencing a breach. Our platform...
Estimates based on reports from Google put the number of daily activations of new Android phones at 1.3 Million. Based on reported data from Apple, there are 641 new applications per day added to the App Store. According to Cisco's Visual Networking Index, mobile video now accoun...
After an interesting career in the corporate world and an independent, I am making another change. Starting next month, I will take up the role of Research Manager in the Platform as a Service Practice with International Data Corporation (IDC). After spending 5 years evangelizing clou...

#SDN #Devops #LineRate When you put software into the data path there are some things it better have to make sure it doesn't become a liability

The software-everywhere drumbeat continues to resound across the entire industry. Experts assure us that software can perform as w...

A hybrid cloud may become the solution as the debate between public vs private cloud becomes so 2013. The industry’s experts will debate on when the hybrid clouds are and are not the be all and end all and if the infrastructure supporting the hybrid clouds really matters. As stated by ...
There are a plethora of tactics used to test applications as they move to production. For example, as a developer I've created data and captured data for testing and - my favorite - ignored testing altogether. After all, it worked on my machine. The reason there are so many tactics ...
Has it really been one whole year since my last post? I suspected I was near that milestone, but it’s still surprising to discover it has been so long. Blogs have a natural ebb and flow, governed by the irregular rhythms of the day job. But this was a pretty big ebb—maybe more accurate...
Not entirely unexpected, the optical capabilities in our switch have provoked questions from customers and potential customers on whether the Plexxi solution could be used to create campus, metro or even long distance multi site fabrics. The answer to that question is a resounding yes,...
BYOD may be the word of the day on the street but underlying the "come as you are" approach to computing is a variety of technology that enables organizations to confidently take up the gauntlet thrown down by users to support their demand to use the computing platform of their choice....
It’s not clear to me whether there is really a conclusion to a technology trend. I suppose that one trend begets another and that morphs into another. So in some sense, discussing the SDN end game is really foolish. It seems most likely that we all stop talking about SDN in another yea...
Oracle has sounded extremely optimistic about their future; one that is going to be dominated by the cloud. The company has reported cloud revenue growth of anywhere between 35% and 50% over the past few quarterly financial reports. Safra Catz, the Chief Financial Officer at Oracle is ...