Welcome!


From the Blogosphere

A survey from the Vanson Bourne market research agency (with CA) late in 2013 indicated that 39% of those surveyed had adopted some form of DevOps and 27% were planning to do so in the near future. Despite this being such a hot topic in the IT sector, and with a high level of take-up, ...
When applications crash due to a code quality issues, the common question is, "How could those experts have missed that?" The problem is, most people imagine software development as a room full of developers, keyboards clacking away with green, Matrix-esque code filling up the screen a...
There are a few ‘The ______ of Our Lives’ out there: Days. Time. Moments. Love. They define who we are, where we’ve been and where we are going. And today, many of those days, times, moments and loves interact with applications. Both the apps we tap and the back end applications used t...
This post is following up on last week's post, "The Inevitability of Idle Resources", in which I mentioned the importance of ensuring not only that resources are available when you need to provision a new service to scale but that the resources available match the needs of the service....
Once you learn the definition of shadow IT, it shouldn’t be too shocking to learn how widespread it is at companies large and small all over the world. I hate to assume, but the odds are, that you yourself have used a non-IT approved SaaS option for the same reason as everyone else, m...
Digital Ocean is a NY based hosting provider specializing in SSD based virtual machines. A majority of our customers choose to deploy and manage databases on Amazon AWS. However running large scale write intensive databases on AWS is a fairly difficult and time-consuming operation. If ...
It used to be called a business plan. But management-speak and a few decades of PC-fueled innovation changed that simplistic approach. Bill Gates famously entitled his first book The Road Ahead and although this didn’t officially help coin or endorse the phrase “roadmap,” it didn’t do...
They say good things come to those who wait – but sometimes good things happen simultaneously and you don’t even have to wait to revel in them. While I was enjoying a week of snowboarding in Val d’Aosta, right by the legendary Matterhorn, DDN was announcing the new WOS 360 at the Next ...
Most of the discussions on Big Data begins and ends with Hadoop. It is the commercial version of HPC (High Performance Computing), whose underlying technologies have been around for years: clustering, parallel processing, and distributed file system. In today’s parlance you can read Ha...
There are people who take life slowly, accept it on its terms, meditate, read about meditation, and internalize books like "Wherever You Go, There You Are," a bestseller by a guy with a hyphenated name. I'm more of a Malcolm Gladwell fan -- Outliers or his newest book “David and Goliat...
Proponents of pure software infrastructures often point to rapid provisioning (like right now, push a button and blam! Instant scale) as one of the reasons to "go software." Superficially this is true. If your infrastructure is all software (or virtual, if you prefer) then when you nee...
The term "Big Data" is quite possibly one of the most difficult IT-related terms to pin down ever. There are so many potential types of, and applications for Big Data that it can be a bit daunting to consider all of the possibilities. Thankfully, for IT operations staff, Big Data is mo...
Google’s pursuit of self-driving cars has been well documented over the years. The promise of fleets of self-driving vehicles that could potentially make driving safer while simultaneously shortening commute times makes it one of the most attractive futures technologies around. But whe...
Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overw...
LIn 1974 a specification was developed that would, eventually, launch what we know of as "The Internet." That specification was TCP and though it is often overshadowed by HTTP as the spark that lit the fire under the Internet, without TCP HTTP wouldn't have a (transport) leg to stand o...
One of the most often questions/feedback we get regarding Windows 8.1 is where is my start menu. These conversations can get very passionate, and usually turn into a commentary around on how much we miss our start menu. I am sure some folks want to punch the screen. I totally unders...
Disaster recovery is about being able to get your business back up and running as quick as you can after the disaster happens. Throughout this series, my teammates have focused on the Infrastructure side of the house, servers, virtual machines, etc. You can see the full series here: D...
IoT is not a new concept. Wikipedia says: “The term Internet of Things was proposed by Kevin Ashton in 1999 though the concept has been discussed in the literature since at least 1991.” In its early stages, the concept relates to the use of radio-frequency identification (RFID) and how...
The so-called Bring Your Own Device (BYOD) phenomenon has gone hand in hand with the consumerization of IT trend. Both of which sound like strangely disconcerting and confusing terms if taken out of context or presented to a layman or novice for the first time. Of course all we are ta...
Gordon E. Moore's famously predicted tech explosion was prophetic, but it may have hit a snag. While the number of transistors on integrated circuits has doubled approximately every two years since his 1965 paper, the ability to process and transact on data hasn't. We're now ingesting...
Back in the noughties I made the conscious decision as a Storage guy to immerse myself into what was being termed server virtualization and understanding the product offerings of a relatively new company named VMware. To this day I remember the incredulous looks and responses I receive...
I’ve been traveling the last few weeks shooting some videos for VMware PEX and RSA. When that happens, my browser tabs get crowded with the various stories I’m interested in but will read later. This time they all seemed to hover around Identity Theft. When I got home, in my awaiting p...
The Network Centric Operations Industry Consortium (NCOIC) has begun offering an open process that will enable governments, agencies and businesses to create and manage a secure, hybrid IT computing environment quickly and cost effectively. Known as the NCOIC Rapid Response Capability...
When considering the major benefits of modern cloud computing, the lower operational overhead of the cloud should be high on anyone’s list. But when it comes to sensitive data — such as healthcare, finance, retail or government data — security measures are needed to ensure privacy and ...

#sdas #webperf New TCP algorithms and protocols in a platform net improved performance for apps

The original RFC for TCP (793) was written in September of 1981. Let's pause for a moment and reflect on that date.

When TCP was introduced applications on "smart" devices...

If the future of federated controllers is based on service layering, then how do multiple controllers manage the same device? Is there a requirement for state synchronization? Do they share information about device operation or configuration? Is there a need for controllers that are ma...
Looking back to one of my predictions for 2014, I had posited that traditional storage solutions labeled cloud will no longer fly this year, and some of the big-iron vendors will be forced to offer their wares as pay-as-you-go services. Perhaps this was stating an obvious eventuality a...
It's that time of the year, when resolutions promising grand changes in our lives are made - and more often than we'd like to admit, broken. Along with the resolutions comes advice on how to make them "stick." In other words, how to make them habitual. Many folks still cite the old ...
Recently Famo.us made a big announcement around offering their own PhoneGap alternative using a WebView that could use Chrome instead of the Stock Android Browser. Android 4.4 (KitKat) actually offers this out of the box now but it is actually Chrome 30 which isn't quite up to the same...
If you thought that cyber security threats were troubling in 2013, then you should brace yourself for the onslaught that's very likely in 2014. A new generation of security threats stemming from progressive business technology trends -- such as BYOD, mobility and cloud services adoptio...
Today’s blog post is headed back to the basics. I’ve been using and talking about APM tools for so many years sometimes it’s hard to remember that feeling of not knowing the associated terms and concepts. So for anyone who is looking to learn about APM, this blog is for you.
In part one of this three-part series I summed up how the way we produce and consume data has evolved over the last three decades, creating a need for new storage methodologies that can help enterprises store and effectively manage massive pools of data. I concluded that the immutable ...
Application developers are aware (you are aware, aren't you?) that when applications are scaled using most modern load balancing services that the IP address of the application requests actually belong to the load balancing service. Application developers are further aware that this me...
As SDN moves closer to large-scale deployments, the issue of controller scaling is becoming a hotter topic. The consensus seems to favor some form of distributed cluster environment, likely in the form of federated clusters. But how should these federations be formed? The first thin...
Flash storage is revolutionizing the way enterprise stores, processes and accesses important data. As opposed to the old methods of storage, most notably hard disks, flash storage is faster and consumes less energy. Flash devices also don't require the amount of space that other techno...
AlephCloud has developed proprietary technology that enables secure collaboration without the need for a trusted third party. This “zero knowledge” model makes sure only authorized parties are privy to the information exchanged and stored, while nobody else has visibility, not even Ale...
Organizations have opened their businesses to drive growth and operational improvements. They’ve done this by incorporating cloud services and mobility, by opening their business to partners and customers and by externalizing APIs to accelerate application delivery. All of this demands...
If you are new school or old school, then will you be stuck on those school's of thought or advanced to the current and future schools? From the old school folks you will hear things along the lines of that is how we do or did it. Also you might hear things along the lines of lets use...
A lot of security-minded folks immediately pack up their bags and go home when you start talking about automating anything in the security infrastructure. Automating changes to data center firewalls, for example, seem to elicit a reaction akin not unlike that to a suggestion to putting...
Financial Services companies operate in a difficult environment. Many of their applications are absolutely vital to the proper workings of the global economy. They are one of the most heavily regulated industries in the world, and they are a constant target of hackers. Their systems ne...