Welcome!


From the Blogosphere

The storage industry is going through a big paradigm shift caused by drastic changes in how we generate and consume data. As a result, we also have to drastically change how we store data: the market needs massive, online storage pools that can be accessed from anywhere and anytime. Ob...
There's been a lot of discussion on the Internet about the definition of Platform-as-a-Service. Here's just a few very active Twitter discussions to illustrate the level of activity and passion over the topic: This is just a few of the hundreds of tweets returned when I queried "Paas"...
Peerlyst is a social media platform designed to give enterprise technology decision makers the unbiased information they need to buy, and make the best use of, IT solutions. The network enables a new social buying experience based on peer-to-peer interaction regarding technology produc...
SecureAuth provides 2-Factor Access Control to all industries, extending to mobile, cloud, web, and network resources. 2FaaS accepts any identity and authenticates via SMS, Telephony, and E-mail One-time Passwords (OTPs), and our patent-pending, low-friction Device Fingerprinting to en...
Attack Mitigation Network (AMN) expands cyber attack detection coverage across all enterprise resources and automates the mitigation by selecting the most effective tools and locations – in the data center, at the perimeter or in the cloud to block the attacks. This revolutionary attac...
Pundits, owing to SDN still being very young and not widely adopted, continue to put forth treatise upon treatise as to why organizations should be falling over themselves to go out and get themselves some SDN. Now. Not tomorrow, today. One of the compelling reasons to adopt is to add...
I’d love to take a poll (feel free to share your opinion in the comments section below) on whether software should be considered a living organism in the purist biological sense. Sure, software is made up of code instead of cells, and it may have trouble finding a home in the classic t...
Government organizations, utility companies and private individuals are using big data to fight crime, maintain bridges and prepare for natural disasters. Unless you are an IT manager, understanding all of the technical details of how big data technology — such as Hadoop Hive or Apac...
SDN is almost universally associated with disruption; the general consensus being that it is a significant departure from the way networking has been handled for decades. Insofar as SDN marks a major architectural shift, it absolutely should be considered a disruption. But how does dis...
It is human nature to try and relate new information and new ways of doing things to something that we know, something we are familiar with. Often when we talk about the way we fit traffic onto a Plexxi mesh network, the reaction is “I know what you mean, you are doing traffic engineer...
Many IT teams are looking at virtualization in the Cloud where enterprise-level storage is kept in “pools” often hosted by vendors who specialize in virtual storage. Most commonly, the data and additional space is accessed via a web-based API. Coraid offers a unique storage management ...
With the cloud in its sights as a fast-track strategy for growth, SHI International Corp. has partnered with Zetta.net to round out its expanding portfolio with an enterprise-grade cloud backup and disaster recovery (DR) solution. SHI, which has transformed over the years from a $1 mi...
Bellis: "We emerged in 2012 as the first SaaS platform to use big data security analytics to tell a security pro two important things: number one: which vulnerabilities pose the greatest risk to their organization, and number two: their likelihood of experiencing a breach. Our platform...
Estimates based on reports from Google put the number of daily activations of new Android phones at 1.3 Million. Based on reported data from Apple, there are 641 new applications per day added to the App Store. According to Cisco's Visual Networking Index, mobile video now accoun...
After an interesting career in the corporate world and an independent, I am making another change. Starting next month, I will take up the role of Research Manager in the Platform as a Service Practice with International Data Corporation (IDC). After spending 5 years evangelizing clou...

#SDN #Devops #LineRate When you put software into the data path there are some things it better have to make sure it doesn't become a liability

The software-everywhere drumbeat continues to resound across the entire industry. Experts assure us that software can perform as w...

A hybrid cloud may become the solution as the debate between public vs private cloud becomes so 2013. The industry’s experts will debate on when the hybrid clouds are and are not the be all and end all and if the infrastructure supporting the hybrid clouds really matters. As stated by ...
There are a plethora of tactics used to test applications as they move to production. For example, as a developer I've created data and captured data for testing and - my favorite - ignored testing altogether. After all, it worked on my machine. The reason there are so many tactics ...
Has it really been one whole year since my last post? I suspected I was near that milestone, but it’s still surprising to discover it has been so long. Blogs have a natural ebb and flow, governed by the irregular rhythms of the day job. But this was a pretty big ebb—maybe more accurate...
Not entirely unexpected, the optical capabilities in our switch have provoked questions from customers and potential customers on whether the Plexxi solution could be used to create campus, metro or even long distance multi site fabrics. The answer to that question is a resounding yes,...
BYOD may be the word of the day on the street but underlying the "come as you are" approach to computing is a variety of technology that enables organizations to confidently take up the gauntlet thrown down by users to support their demand to use the computing platform of their choice....
It’s not clear to me whether there is really a conclusion to a technology trend. I suppose that one trend begets another and that morphs into another. So in some sense, discussing the SDN end game is really foolish. It seems most likely that we all stop talking about SDN in another yea...
Oracle has sounded extremely optimistic about their future; one that is going to be dominated by the cloud. The company has reported cloud revenue growth of anywhere between 35% and 50% over the past few quarterly financial reports. Safra Catz, the Chief Financial Officer at Oracle is ...
Savvy executive leaders are already prepared for the shift to more progressive business technology deployments throughout the enterprise. Open hybrid cloud architectures, big data analytics and mobile applications are high-growth platforms at the center of this shift. In particular, t...
We get quite caught up in high level architectures at times. It is good to read some posts that focus on design and implementation and the practicality of taking higher level architectures to reality. Two of Ivan’s posts caught my eye this week. In the first, he discusses the differenc...
The key message of my presentation was that DDN’s WOS leverages OCP to optimize efficiency for object storage, but at the same time enables the Open Compute Community to build scale-out and more efficient object storage. The NO-FS (no file system) architecture of WOS enables OCP hardwa...
It is time for the 2014 Winter Olympic games in Sochi Russia where competitors including some athletes come together in what has become a mix of sporting and entertainment engaging activities. Some of these activities including real Olympic game events are heavier on sports appeal, so...
Over the holidays I actually spent some time reviewing the newly released "Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c". This book is a step-by-step tutorial filled with practical examples which will show readers how to configure and manage IaaS and ...
Did you hear about Google buying Nest for an incredible amount of money a few weeks back? Be honest: do you have any idea who Nest is or what they do? More specifically – be honest again – do you have any idea what Nest is trying to do or what platform they are built upon? ...
I've been following SSL for a long, long time. Since before the turn of the century, in fact. I devised performance tests back in the day that, on at least one system (back when PCI was still the standard method of enabling SSL hardware acceleration) actually melted circuits on the hos...
There is no such thing as an information recession however there the realities of economic challenges in IT data centers also known as information factories. Likewise, people and data are living longer with increased dependency on information being available and reliable when needed. ...
Welcome to M2M News Weekly, an online newsletter that consists of the most interesting news and articles related to M2M (machine to machine) and embedded mobile devices. I aggregate the information, include the original links and add a synopsis of each article. I also search for the ...
Last week I walked through the packet formats for VXLAN and NVGRE specifically focused on ways by which the overlay packets provide information to the physical network that help the physical network. Some of the initial extreme thoughts that the overlay and physical network can and sho...
The growing rate of hybrid cloud adoption requires particular models of cloud security. Many enterprises are moving some of their workload to a public cloud environment while retaining other workloads in the private cloud. Transitional cloud security strategies are needed that continue...
Have you figured out the new buzzword trend for 2014 that starting ramping up in 2013? Yup, it’s Internet of Things (IoT) and Internet of Devicess (IoD) Assuming that IoT, IoD and other variations catch on which looks like they will, this could bring relief and rest for the over-work...
Why is it that the definition of SDN continues to get debated? I think the definition of SDN remains a bit squishy. And while I am not entirely certain that it matters (people shouldn’t be buying SDN; they should be building networks), it is an interesting phenomenon, and understand...
That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to engage security professionals attention while the real target - an application - is attacked. Even when this is not the case,...
Step 1 Create a project based on my blog “UPDATED Setting up a JEE 6 Web Profile Maven Project in Eclipse using TomEE”. Step 2 Eclipse reveals its special capabilities such as specialized editors based on the project’s facet. As … Co...
With a growing number of software developers and computer applications, computers systems are revised and renewed every day. Computer systems can become so large that they will need the expertise of a computerized Service Desk, which will help integrate a growing organization to get ma...
Although it has been a couple of months since the hysteria of re:Invent, there has been a great deal of consternation by hoards of people in enterprise IT over the emergence of Amazon AWS. The fear is that AWS and it's main competitors will substantially disrupt the market for enterpri...