Welcome!


From the Blogosphere

I’d love to take a poll (feel free to share your opinion in the comments section below) on whether software should be considered a living organism in the purist biological sense. Sure, software is made up of code instead of cells, and it may have trouble finding a home in the classic t...
Government organizations, utility companies and private individuals are using big data to fight crime, maintain bridges and prepare for natural disasters. Unless you are an IT manager, understanding all of the technical details of how big data technology — such as Hadoop Hive or Apac...
SDN is almost universally associated with disruption; the general consensus being that it is a significant departure from the way networking has been handled for decades. Insofar as SDN marks a major architectural shift, it absolutely should be considered a disruption. But how does dis...
It is human nature to try and relate new information and new ways of doing things to something that we know, something we are familiar with. Often when we talk about the way we fit traffic onto a Plexxi mesh network, the reaction is “I know what you mean, you are doing traffic engineer...
Many IT teams are looking at virtualization in the Cloud where enterprise-level storage is kept in “pools” often hosted by vendors who specialize in virtual storage. Most commonly, the data and additional space is accessed via a web-based API. Coraid offers a unique storage management ...
With the cloud in its sights as a fast-track strategy for growth, SHI International Corp. has partnered with Zetta.net to round out its expanding portfolio with an enterprise-grade cloud backup and disaster recovery (DR) solution. SHI, which has transformed over the years from a $1 mi...
Bellis: "We emerged in 2012 as the first SaaS platform to use big data security analytics to tell a security pro two important things: number one: which vulnerabilities pose the greatest risk to their organization, and number two: their likelihood of experiencing a breach. Our platform...
Estimates based on reports from Google put the number of daily activations of new Android phones at 1.3 Million. Based on reported data from Apple, there are 641 new applications per day added to the App Store. According to Cisco's Visual Networking Index, mobile video now accoun...
After an interesting career in the corporate world and an independent, I am making another change. Starting next month, I will take up the role of Research Manager in the Platform as a Service Practice with International Data Corporation (IDC). After spending 5 years evangelizing clou...

#SDN #Devops #LineRate When you put software into the data path there are some things it better have to make sure it doesn't become a liability

The software-everywhere drumbeat continues to resound across the entire industry. Experts assure us that software can perform as w...

A hybrid cloud may become the solution as the debate between public vs private cloud becomes so 2013. The industry’s experts will debate on when the hybrid clouds are and are not the be all and end all and if the infrastructure supporting the hybrid clouds really matters. As stated by ...
There are a plethora of tactics used to test applications as they move to production. For example, as a developer I've created data and captured data for testing and - my favorite - ignored testing altogether. After all, it worked on my machine. The reason there are so many tactics ...
Has it really been one whole year since my last post? I suspected I was near that milestone, but it’s still surprising to discover it has been so long. Blogs have a natural ebb and flow, governed by the irregular rhythms of the day job. But this was a pretty big ebb—maybe more accurate...
Not entirely unexpected, the optical capabilities in our switch have provoked questions from customers and potential customers on whether the Plexxi solution could be used to create campus, metro or even long distance multi site fabrics. The answer to that question is a resounding yes,...
BYOD may be the word of the day on the street but underlying the "come as you are" approach to computing is a variety of technology that enables organizations to confidently take up the gauntlet thrown down by users to support their demand to use the computing platform of their choice....
It’s not clear to me whether there is really a conclusion to a technology trend. I suppose that one trend begets another and that morphs into another. So in some sense, discussing the SDN end game is really foolish. It seems most likely that we all stop talking about SDN in another yea...
Oracle has sounded extremely optimistic about their future; one that is going to be dominated by the cloud. The company has reported cloud revenue growth of anywhere between 35% and 50% over the past few quarterly financial reports. Safra Catz, the Chief Financial Officer at Oracle is ...
Savvy executive leaders are already prepared for the shift to more progressive business technology deployments throughout the enterprise. Open hybrid cloud architectures, big data analytics and mobile applications are high-growth platforms at the center of this shift. In particular, t...
We get quite caught up in high level architectures at times. It is good to read some posts that focus on design and implementation and the practicality of taking higher level architectures to reality. Two of Ivan’s posts caught my eye this week. In the first, he discusses the differenc...
The key message of my presentation was that DDN’s WOS leverages OCP to optimize efficiency for object storage, but at the same time enables the Open Compute Community to build scale-out and more efficient object storage. The NO-FS (no file system) architecture of WOS enables OCP hardwa...
It is time for the 2014 Winter Olympic games in Sochi Russia where competitors including some athletes come together in what has become a mix of sporting and entertainment engaging activities. Some of these activities including real Olympic game events are heavier on sports appeal, so...
Over the holidays I actually spent some time reviewing the newly released "Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c". This book is a step-by-step tutorial filled with practical examples which will show readers how to configure and manage IaaS and ...
Did you hear about Google buying Nest for an incredible amount of money a few weeks back? Be honest: do you have any idea who Nest is or what they do? More specifically – be honest again – do you have any idea what Nest is trying to do or what platform they are built upon? ...
I've been following SSL for a long, long time. Since before the turn of the century, in fact. I devised performance tests back in the day that, on at least one system (back when PCI was still the standard method of enabling SSL hardware acceleration) actually melted circuits on the hos...
There is no such thing as an information recession however there the realities of economic challenges in IT data centers also known as information factories. Likewise, people and data are living longer with increased dependency on information being available and reliable when needed. ...
Welcome to M2M News Weekly, an online newsletter that consists of the most interesting news and articles related to M2M (machine to machine) and embedded mobile devices. I aggregate the information, include the original links and add a synopsis of each article. I also search for the ...
Last week I walked through the packet formats for VXLAN and NVGRE specifically focused on ways by which the overlay packets provide information to the physical network that help the physical network. Some of the initial extreme thoughts that the overlay and physical network can and sho...
The growing rate of hybrid cloud adoption requires particular models of cloud security. Many enterprises are moving some of their workload to a public cloud environment while retaining other workloads in the private cloud. Transitional cloud security strategies are needed that continue...
Why is it that the definition of SDN continues to get debated? I think the definition of SDN remains a bit squishy. And while I am not entirely certain that it matters (people shouldn’t be buying SDN; they should be building networks), it is an interesting phenomenon, and understand...
That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to engage security professionals attention while the real target - an application - is attacked. Even when this is not the case,...
Step 1 Create a project based on my blog “UPDATED Setting up a JEE 6 Web Profile Maven Project in Eclipse using TomEE”. Step 2 Eclipse reveals its special capabilities such as specialized editors based on the project’s facet. As … Co...
With a growing number of software developers and computer applications, computers systems are revised and renewed every day. Computer systems can become so large that they will need the expertise of a computerized Service Desk, which will help integrate a growing organization to get ma...
Although it has been a couple of months since the hysteria of re:Invent, there has been a great deal of consternation by hoards of people in enterprise IT over the emergence of Amazon AWS. The fear is that AWS and it's main competitors will substantially disrupt the market for enterpri...
Throughout 2013 most senior executives have been exposed to the key emerging business technology trends. During 2014, you're going to see and hear a lot more about the Internet of Things (IoT) -- and the impact will reach just about every industry and all the major markets within the G...
Note that in Information Technology (IT) conversations there are multiple meanings for SMB including Server Message Block aka Microsoft Windows CIFS (Common Internet File System) along with its SAMBA implementation, however for this piece the context is Small Medium Business. A decade...
In this step-by-step guide you will learn how to create Development Virtual Machines for Vagrant with Packer. Sharing a common development environment with everyone on your team is important. It is really hard though to keep the same dependencies, database versions and other systems i...
Continuous Deployment makes software development and your deployment environment safe so anyone can commit code. Read about these and other advantages in this article. I've been wondering for a few years now, why it's so hard to get companies to prioritize the work that I feel is imp...
Sports fan strategists like to throw around the famous Wayne Gretzky quote: I skate to where the puck is going to be, not where it has been. The corporate implications of the quote are self-evident: plot your strategic course to where you think the market is going. Setting your sights ...
Learn how to use the concurrent Ruby Web Server PUMA on Heroku. Over the last couple of months our business grew a lot and Unicorn seemed to take more resources than necessary. We switched to 2X instances and still needed quite a lot of workers. Although larger Heroku bills were part...
Data analytics solutions seem as varied as the data they analyze. However, Expressway users have found tremendous success extending it’s built in API Analytics capabilities with those of Splunk’s – a recognized 2013 Gartner Magic Quadrant Leader for Security Information and Event Manag...