Expert Analysis
Content posted in March 2012
<<   <   Page 2 / 4   >   >>
A Rose May Be A Rose But Dedupe Is Not Necessarily Dedupe
Commentary  |  3/22/2012  | 
Today just about every vendor in the storage market has data deduplication as a feature in one or more of their products. While those of us that work with multiple deduplication products on a regular basis know there are big differences between the various technologies that vendors call data deduplication many users don’t know how to pick the deduplication solution that will best fit their needs.
Networking In The Cloud
Commentary  |  3/21/2012  | 
In discussing network design with my clients, I talk about how routers, firewalls and other network gear can be interconnected to provide a scalable and redundant IP network. These foundations of network design apply to networks composed of tangible components or the virtualized infrastructure that extends corporate data centers to the cloud. I find that the networking aspects of cloud computing are frequently overlooked or addressed as an afterthought.
EMC Extends Cloud Services, Buys Pivotal Labs
News  |  3/21/2012  | 
Just weeks after EMC unveiled five security and risk management advisory services, driven in part by the need to 'provide its customers with end-to-end solutions', the storage giant's consulting arm is at it again, with a new set of service offerings. The company says the new additions to its cloud services portfolio will accelerate the adoption, consumption, optimization, and management of cloud computing, and will align to such critical IT-as-a-Service (ITaaS) elements as cloud infrastructure,
3 Big Security Themes At Black Hat Europe
News  |  3/21/2012  | 
Security's big thinkers debated cloud computing security, user mistakes that won't die, and the information security perfectionist complex.
The Security Profession Is A Mess
Commentary  |  3/21/2012  | 
I've been considering how to build a network security plan for a small data center with an online presence. To put the proposal together I needed to develop some sort of structure in the security space so that I could research products and vendors. What I found is that implementing firewalls and IDSes is simple. Finding competent security professionals is not.
Job Seekers Asked For Facebook Passwords: Debate Roars
Commentary  |  3/21/2012  | 
As part of the vetting process, some companies are asking job candidates to provide their Facebook credentials. Would you? Should you?
Report From The Tape Summit
Commentary  |  3/21/2012  | 
This week I spent two busy days in San Francisco at the second annual Tape Summit. While some may wonder if there’s enough life left in tape to have a summit I know tape has taken a bad rap over the past few years. In this post I’ll reflect on a few key facts that came out at the summit and expose some fallacies about tape. To start Gartner never said “71% of all attempts to restore from tape fail”.
Ping Pitches Cloud-Based SSO
News  |  3/21/2012  | 
Ping Identity has announced PingOne, which it calls a cloud-based multiplexed identity switch that provides single single-on (SSO) access to cloud applications. It uses standards-based, federated SSO protocols such as Security Assertion Markup Language, OAuth, and OpenID. In addition to providing SSO for users, the product also gives IT staff the ability to manage access to cloud applications in a central user directory, such as Microsoft’s Active Directory, which means there needs to be o
Akamai Boosts Web, Mobile App Performance
News  |  3/21/2012  | 
Akamai is adding two new products to its Terra Enterprise Solutions portfolio to use the cloud to improve IT performance in a number of areas, including application delivery, video streaming, security, Web site acceleration and more. On a Webcast Tuesday, Akamai executives introduced a new product that dramatically improves Web application performance and another that lets applications and Web sites open on mobile devices as quickly as they do on desktop computers.
March Madness Has Lessons For Social Marketing
Commentary  |  3/20/2012  | 
Sports teams, fans, and sports marketing pros have many lessons for social marketing. Just ask legendary sports broadcaster Butch Stearns.
60 Years Ago: IBM Invents The Hard Drive
News  |  3/20/2012  | 
A short promotional movie by IBM back in the 50's recounts, in the finest propaganda styles of the day, the project that brought us random access mass storage.
Is Storage A SharePoint Killer?
News  |  3/20/2012  | 
Unstructured data is becoming an IT buzz word these days, and it’s something organizations are grappling with: how to get a handle on email, Office documents and PDFs, among other data-clogging sources. Microsoft’s SharePoint document repository was built to provide content collaboration and version control. But as user adoption increases, so does the amount of data that is stored in SharePoint, which critics say can wreak havoc on its infrastructure and lead to poor performance, alo
Big Switch Unveils 'Open' SDN Architecture
News  |  3/20/2012  | 
Big Switch Networks, which is considered an early leader in the push for software-defined networking (SDN) based on the Open Flow protocol, is putting its own stake in the ground, declaring its commitment to open standards in developing new technology to bring virtualization to networking environments. This week, to mark its second anniversary, the company announced its Open SDN (a trademarked term) architecture based on 'three pillars' of open standards, open APIs and open source.
Citrix Eases Cloud-Provisioning Management
News  |  3/20/2012  | 
Citrix has introduced the Cloud Provider Pack, a set of software intended for its Citrix Service Providers (CSPs) to provide to its own hosted shared desktop customers, which makes it easier for the CSPs to deliver cloud-hosted applications and desktops. This is particularly true for mobile devices because the services are optimized for them. The software has three main components – app orchestration technology, which lets CSPs provide packaged offerings of software and other services; the
How WWE Wrestling, USA Networks Characters Go Social
News  |  3/19/2012  | 
Social TV lets characters shine for WWE, USA Networks.
Emotion Vs. Logic: The Modern Role Of Tape
Commentary  |  3/19/2012  | 
People love to hate tape. But tape today provides highly cost-effective and reliable answers to certain data storage challenges.
Are Storage Controllers Overworked?
Commentary  |  3/19/2012  | 
In many virtualized server infrastructures, demands push storage controllers beyond their limits. Here are some possible solutions.
Next-Gen Networking Drives IT Budgets
News  |  3/18/2012  | 
Vice President Joe Biden once said, "Don't tell me your values, show me your budget and I'll tell you your values." If the vice president saw the enterprise IT spending budgets, he would rightly conclude that they place an increasingly higher value on their networks as the critical circulation system for all of their IT assets. As demands are placed on networks to handle more video traffic, migrate to 10GbE connectivity, connect mobile and wireless devices, and handle the increase in data traffi
WOCs Address Soaring Bandwidth Demand
News  |  3/18/2012  | 
The wide area network (WAN) optimization market is expected to grow almost 60% over the next five years, with sales predicted to reach $1.65 billion in 2016, from $1.05 billion in 2011. WAN optimization controllers (WOC), as they’re called, not only speed up network traffic and improve the performance of applications, they also help enterprises avoid costly upgrades to bandwidth capacity.
Ruckus Seeks To Re-Invent Muni-Wireless
Commentary  |  3/18/2012  | 
Around 2005, several US cities tried to make a go of metropolitan wireless networking. Many of the initiatives were costly failures, and just as many morphed into shadows of their intended scales and uses. But in IT, sometimes old ideas come back with new teeth. In a recent announcement, Ruckus Wireless announced a new urban wireless project, and in the most curious of locations. It will be interesting to see how this one pans out, and for multiple reasons.
Security's New Reality: Assume The Worst
News  |  3/16/2012  | 
A more fatalistic view that attackers have already infiltrated the organization presents a different way of looking at--and marketing--security.
Don't Burn Bridges, And Don't Be A Jerk
Commentary  |  3/16/2012  | 
These two simple rules of life can help ensure you thrive on social networks.
5 Social Lessons From The Rush Limbaugh Imbroglio
Commentary  |  3/16/2012  | 
In the real-time world, reaction is immediate and dictated by social groups. Consider these crisis communications tips for social marketers.
Cloud Focus For Alcatel-Lucent Upgrades
News  |  3/16/2012  | 
Network equipment vendor Alcatel-Lucent Enterprise is introducing new switches and other feature enhancements to a collection of technologies it calls the “Application Fluency” network. This network platform recognizes the device seeking access to the network, authenticates a particular user and identifies the application they are running, and provides the appropriate degree of connectivity required. The company says these innovations are designed to enable enterprises to deliver clo
Evaluating Cloud-Based ID Management Solutions
News  |  3/16/2012  | 
The process of managing identity for enterprise applications and services is hard to begin with, but a lack of identity standards across cloud-based applications means that organizations looking to manage employee access to those applications will find it doubly hard.
Finding Fault With App Management
News  |  3/16/2012  | 
According to the Fifth Annual State of the Network Study released by Network Instruments, 83% of IT professionals surveyed said problem number one with application management is “determining whether problems are caused by the network, the system or the application.”
Packetpig Promises Free Big Data Security Analytics
News  |  3/15/2012  | 
Open source tool introduced at Black Hat Europe handles terabytes of packet captures to help businesses understand if and how they've been attacked.
Capturing the Hidden ROI in Applications
News  |  3/15/2012  | 
When ROI (return on investment) is used in an IT context, it invariably boils down to how quickly a company can realize a return on hardware, software licensing and the day-to-day expenses of running a data center. Enterprises’ results in this area have been impressive, with many companies realizing cost-savings benefits in the tens of millions of dollars.
Adaptive Enhances HPC Scalability, Integration
News  |  3/15/2012  | 
For companies struggling with the complexity involved in using high-performance computing tools, Adaptive Computing is offering new releases – version 7.0 – of its Moab Cloud and Moab HPC product suites. The enhanced scalability and ease of integration, the company hopes, will enable more organizations to “gain the benefits of HPC,” and “expand the market,” especially as they move to the cloud, says Adaptive CEO Robert Clyde.
IBM Pulse 2012: A New Storage Hypervisor
Commentary  |  3/15/2012  | 
IBM is promulgating a storage management concept that it calls a “storage hypervisor” though the final product name has not been determined. The company claims the technology will offer benefits – such as better storage utilization – leading to better storage cost economics, and data mobility – leading to increased flexibility, such as non-disruptive storage refreshes – and parallels the acceptance of server hypervisors and virtualization. But there are also b
6 Social Sites Sitting On The Cutting Edge
Slideshows  |  3/14/2012  | 
Your company's Facebook and Twitter presence are established, but don't rest there. Consider these other social sites--some familiar, some less so--that you need to have in your sights.
Cloud Enthusiasts Worry About Data Security
News  |  3/14/2012  | 
IT professionals at companies around the world are all in for cloud computing, but they still worry about the risks the technology may present to their organizations, according to a new survey. The study shows that top challenges to adoption of cloud computing include security, compliance issues, bandwidth capacity and a lack of interoperability with existing applications.
Dell's SonicWall Acquisition Follows Cheap 'n Easy Blueprint
Commentary  |  3/14/2012  | 
Dell's Sonicwall acquisition makes sense. Dell's strategy is to sell low-cost desktops, laptops, and servers that are cheap and easy to use to everyone from small companies up to mid-size enterprises with the occasional large enterprise in the mix. Dell is going to do with security what they did with storage and are doing with networking. Remove complexity, bring important features to the surface, and make the resulting products available to the largely under served SMB/SME market.
Internet Crime Focus Of Black Hat Europe
News  |  3/14/2012  | 
Security and cryptography experts at Amsterdam conference consider the enormity of securing a world where everything--from smartphones to power plants to cars--is connected to the Internet.
Bandwidth Dominates Videoconferencing Concerns
News  |  3/14/2012  | 
A new study shows that companies are expanding their use of videoconferencing, but many worry that they may not be able to keep up with the network bandwidth demands of the technology. The concerns are documented in a survey that looks at three networking-related issues: video, cloud computing and application management. In the first of a three-part series, Network Computing looks at videoconferencing and the network.
Dell Acquires Security Specialist SonicWall
News  |  3/13/2012  | 
Dell on Tuesday said it reached a deal to acquire SonicWall with an eye to expanding its presence in the market for systems that help businesses fend off a wide range of cyber-attacks. Privately-held SonicWall specializes in so-called Unified Threat Management platforms, which combine multiple security systems into a single appliance.
How To Make Backup And Recovery Foolproof
Commentary  |  3/13/2012  | 
Nobody wants the nerve-wracking job of backup guy. But there's good news: Intelligent disk-based backup, virtualization, and lots of practice recoveries can make it safe to be in charge of the backup process.
Your IT Is Broken
Commentary  |  3/13/2012  | 
Right this minute your data center(s) are broken. You, monitoring systems or NOC may or may not know it. All of the blinky lights may be green, all systems reporting normal, but the data center is broken, and it’s costing you money and business agility.
Training, Network Bandwidth Top Videoconferencing Concerns
News  |  3/13/2012  | 
More than 70% of companies expect to have active videoconferencing capabilities within a year, despite IT challenges, survey finds.
IT Buyers Seek Flexible Pricing
News  |  3/13/2012  | 
Capital spending by businesses took a beating during the recent recession, but IT spending held up pretty well by comparison. Still, as the economy slowly recovers from the downturn, businesses are keeping tight control of their capital budgets and are looking for flexible pricing on IT products and services, industry analysts say.
SXSW: Social Login Is Magical But Tricky
News  |  3/12/2012  | 
Speakers from Facebook, Twitter, and Google explore the cutting edge and complexities of using one account to log into another.
SXSW: How NetBase Knows What Women Want
News  |  3/12/2012  | 
Social media analytics platform positions itself as a "consumer-to-business" pioneer, plays up SAP partnership, new dashboards at SXSW conference.
<<   <   Page 2 / 4   >   >>

White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Twitter Feed