IT Owns E-Discovery
Organizations are realizing technological expertise is just as essential as sharp legal analysis when it comes to e-discovery.
Email Archiving And How To Sell It?
Even with under 50 percent penetration, the Email archiving market is starting to shake out. Two vendors are trying to build new identities for themselves, to establish new market niches and change from being the number 8 product in a 22 player field and be thought of as first, second or third in the market they define for themselves. Metalogix went the value route, reducing the price of their Professional Archive Manager for Exchange (PAM) to $15/user while releasing a new version. ZL Technolo
Ten Ways The Cloud Will Reshape Voice
There is considerable discussion about the oncoming impacts of cloud computing and how it will reshape (or eliminate) the enterprise data center. But until recently, there has been relatively little discussion about how cloud technologies will impact telecommunications, or specifically enterprise voice.
Understanding Private Cloud Storage
Mention cloud storage to most IT professionals and they think of Internet services like Amazon S3 and Nirvanix that store your data in their data centers. But a storage cloud doesn't have to be public. A wide range of private cloud storage products have been introduced by vendors, including name-brand companies such as EMC, with its Atmos line, and smaller players like ParaScale and Bycast. Other vendors are slapping the "cloud" label on existing product lines. Given the amorphous definitions su
BLADE: Juniper Networks' Trojan Horse
While many are delighted by the availability of products from Juniper, a frontal assault on the biggest data center switch opportunities can bring together the corporate networking team and incumbent vendors to fortify their defenses against the barbarian. In these accounts Juniper now has a stealthy and powerful new weapon for penetrating data center networks, and for standing out in a crowded switch market: Ethernet blade server switches designed by BLADE and running Junos.
Q&A: Intel CTO Justin Rattner
In the unexpurgated version of my InformationWeek interview with the chip giant's chief technology officer, Rattner dishes on multicore processors as data-center-class solutions, Internet-wide subnets for cloud security, HPC trickle-down, and building Gigabit-class routers out of standard parts.
Will They Make It? Examining The Team
We have all been there. Sitting across the table are representatives from a new company that until five minutes ago you never heard of. They are talking to you about a new product and technology that solves a definite problem that you have and you are trying to decide if it is worth the risk investing the time and money in their solution. Assuming that the technology is almost as good as the vendor says it is (it's never really as good as they say it is), and it solves a problem that you are str
Strengthen Your Security With The Fortify 360
Source code analysis is a fundamental part of a complete application security process. It finds flaws and vulnerabilities in application code that could be exploited by attackers. A critical component of source code analysis is tracking and remediating the flaws and vulnerabilities uncovered during analysis. Fortify's 360 Server is a repository for all the results and remediation activities that accompany an analysis of source code. While the 360 Server doesn't perform the source code analysis,
Spectra Logic: Taking Tape To Infinity
Many would agree with the following assertions: the IT hardware business is not a good one to be in especially during trying economic times; tape is dead; and only large vendors can be successful in the enterprise-class space, especially at the very high-end. Spectra Logic is a counter example to the first two assertions and, as we will see, is very likely to be a counter example to the third.
Drobo Elite - Ready For The Server Room If Not The Data Center
Ever since Data Robotics came out with the Drobo it's been the darling of some in the storage blogosphere. While I found the original 4-slot Drobo cute, I didn't understand why serious storage guys like Curtis Preston and my friend Stephen Foskett were so excited about a consumer product. The Drobo Pro, an 8-port DAS array with an iSCSI interface didn't make any more sense. The new Drobo Elite on the other hand seems like a great first SAN array for the SMB market.
eDiscovery And The Law Firm
Outside law firms are uncomfortably aware that their eDiscovery clients are making tracks and taking their pocketbooks with them. The trick is for traditionally tech-averse law firms to change, and fast.
Netlist Ramps Up For HyperCloud
Beginning early 2010, Netlist will offer a new RDIMM technology that will double the per-CPU memory capacity to 384GB while costing far less than double the spot price of RAM. Netlist was demonstrating the new 16GB DDR3 RDIMM parts at the Supercomputing 09 conference last week in Oregon. Samples are due next month, and it ships in production quantities in the first quarter of 2010.
WAN Optimization On Cell Phones? Why Not?
Innovation doesn't have to come in big paradigm shifts. Innovation can be small in scale, something that that makes life easier, simpler, or better. Last week at the Riverbed launch, I was talking to Apurva Daveacute about WAN optimization and where the pain points are. It's one of those conversations I often have with vendors about big sky stuff. But I got a Droid last week, so my interest in mobile computing is piqued. "When are you [Riverbed] going to make a client for the Android?" I
Integrated Network Management Is A Critical Asset
It seems almost too basic to state, but managing a network begins with understanding the traffic and activity moving across the network. When the company's business includes managing networks for hundreds of other companies, the monitoring functions become more critical and far more complicated.
SaaS Approach Not A Fit For Enterprise Search
An accurate way to describe Software as a Service's (SaaS) impact on the enterprise software market would be "all the rage." Buoyed by high profile success stories, such as Salesforce.com and Google's Gmail, vendors have been quickly moving to adopt this computing model, with one very notable exception: enterprise search. "The SaaS approach has had little impact on the enterprise search market to date," stated Paul Sonderegger, chief strategist at Endeca.
Is ILM Finally Ready For Prime Time?
It's an undeniable fact that most organizations are drowning in unstructured data. Yet despite the general acceptance of the concept that files should be stored in ways commensurate with their changing value over time, few organizations really manage their files well. Vendors have made several attempts at making a buck with tools that automagically manage unstructured data, calling it HSM then ILM, with little acceptance and even less profit.
Just Say No To Proprietary Cryptographic Algorithms
I was eavesdropping on the conversation while scanning email and I heard Smail say the product uses a proprietary polymorphic algorithm. Sorry, you lost me at proprietary, and I blurted out "It isn't secure," which completely derailed the conversation.
Interop: Cloud Computing's Portability Gotcha
There were a couple "aha" moments for me at Interop's Enterprise Cloud Summit. The first was that some companies are already storing hundreds of terabytes of data in the cloud. The second was that it can be a slow and expensive process to move that data from one service provider to another.
Opera Mobile 10 Hits Windows Mobile
Windows Mobile users have a new way to surf the Web, as Opera Software has released a beta version of Opera Mobile 10 for Microsoft's mobile platform. The product is Opera's higher-end version of Opera Mini, and it also features server-side compression technology that minimizes bandwidth and hardware requirements. The mobile browser is built with the Opera Turbo technology, which can compress Web traffic by up to 80% while still offering support for Web technologies like Ajax and Flash.
Encryption Is Cloud Computing Security Savior
I'm beginning to think that fears about cloud security are overblown. The reason: an intellectual framework is already in place for protecting data, applications, and connections. It's called encryption. What's evolving now, and isn't anywhere near fully baked, is a set of agreed-upon implementations and best practices. Today's post talks about some relevant and interesting work from Trend Micro and from IBM.
Cisco Collaboration Vision: New Launch Enhances Market Position
Cisco's recent Tandberg acquisition announcement further underscored the company's evolving strategic focus on a communications medium that demands higher bandwidth and more applications-focused networks. Cisco announced its "medianet" strategy and concept late last year. It included a new suite of technologies designed for advanced communications, collaboration and entertainment through video and rich media-optimized service provider, business and home networks.
The First Mover Disadvantage
There is always an advantage to being first to market with a new product or technology, except it seems, in storage and networking. It seems companies that are the first in the space have the most difficult time staying viable. Certainly there are exceptions but it seems that there is a first mover disadvantage in technology.
Interop 2009 Day 1: Vendors, Vendors And More Vendors
One of the main reasons I come to shows it is to get some face time with people I have spoken with on the phone and then catch up with new vendors not yet on my radar. Yesterday, I spent the day in a room meeting a stream of vendors. It was like speed dating, but more fun. There are definitely some interesting products coming out of large and small vendors alike.
Microsoft Windows HPC Beta On Par with Linux
Microsoft might be yielding slivers of ground to Linux in the desktop arena, but according to the company, it has made strides in the realm of high performance computing. On Monday, Microsoft unveiled the first beta of Windows HPC Server 2008 and released benchmarks showing performance parity with Linux in HPC systems.
HP's Vision: Virtual Resource Pools In Its Converged Infrastructure
The vision thing is "in" among IT vendors. Recently, HP made a big splash with its Converged Infrastructure announcements just a day after Cisco, EMC and VMware launched their Virtual Computing Environment (VCE) coalition. Meanwhile, IBM's Smarter Planet through Dynamic Infrastructure pervades radio and TV, as well as the online and print media. Is this flood of visions a good thing? Optimism is warranted, but some skepticism is justifiable since saying is easy but doing is hard, especially over
Prism Adds Much-Needed Monitoring
Server virtualization is one of the most complex operational projects most large organizations are undertaking. Unfortunately for those involved in the monitoring of these servers, traditional techniques don't work. Prism Microsystems will release an impressive update before the year's end that will make up for some of its historical shortcomings.
AT&T Still Cloudy On CaaS
In spite of some significant failures, cloud computing for the enterprise continues to interest CIOs and executives. AT&T says that it was only after feedback from its User Advisory Councils, some of which comprise Fortune 100 CIOs, that it moved into the technology. Enterprises indicated that the technology has emerged from being a niche offer to one that could be used to extend existing compute resources.
Riverbed Expands Support In The Cloud
Riverbed pulled out the stops at the Chelsea Pier in NYC today, before Interop NY 2009 gets going, with a late day announcement that in 2010, the company will ship a virtual Steelhead appliance for cloud environments. Also next year, Riverbed is promising to optimize iSCSI traffic. Both product announcements will expand Riverbed's feature set and is another step forward in WAN optimization.
A True Datacenter In A Box
While there's no doubt that virtualization has changed the way data centers are managed, bare metal configuration of systems can still take a lot of time. And in some highly dynamic environments, moves, adds and changes account for a substantial portion of data center management costs.
F5 Highlights New Security Features In BIG-IP 10.1
Application Delivery Network vendor F5 has rolled out a number of security functionality features on their BIG-IP appliances. Along with enhanced protection against automated scanners and bots, the 10.1 release also delivers DNSSEC compliance, expanded IP geolocation and improved reporting.