Content posted in March 2012
Innovation Reigns at Wireless Expo
Commentary  |  3/30/2012  | 
This year’s Unwired Innovation Expo (UIE) in Clovis, New Mexico was simply amazing. By now, we’re all a bit desensitized to the wonder of wireless technology, and easily forget that under the hood of our WLAN environments lives some impressive core technology. It takes an event like the UIE to really remind us of just how empowering the wireless industry is to innovative products, and the minor miracles that are possible when our wireless engine is running right. Here’s a look
Do We Need World Backup Day?
Commentary  |  3/29/2012  | 
March 31 is World Backup Day. Do we really need a day devoted to something that we should be doing every day? If we do, we should have a World Test Recovery Day, too.
Why Apple Must Enable FaceTime On LTE
Commentary  |  3/27/2012  | 
Video calling is a sci-fi staple, from Star Trek to The Jetsons. But to bring it mainstream, Apple must allow FaceTime on LTE.
Saving The SAN
Commentary  |  3/27/2012  | 
You don't have to turn your storage area network upside down, with performance-sensitive data moved into the server on a flash-memory device. If you can fix its performance issues, the SAN has distinct advantages over server-side caching.
Data Caps And Treating Employees Like Adults
Commentary  |  3/27/2012  | 
Carriers like AT&T and Verizon Wireless are using data caps to manage the explosive growth in 3G/4G data consumption. Hey, kids--the 1990s called and wants its bandwidth management strategy back. As Lee Badman points out in "4G? No, It's More Like 4Gee!" the data rates available to wireless consumers are growing rapidly and our demand is keeping pace. When you have high demand and data caps, the chance of overages is very likely, and the last thing anyone wants is out-of-control telecom costs. C
Facebook Password Debate Stirs Deep Social Fears
Commentary  |  3/27/2012  | 
Recent controversy over prospective employers requesting Facebook credentials has dredged up some big social questions.
Synchronizing Custom Dictionaries With The Cloud
Commentary  |  3/27/2012  | 
Everyone I know who writes about technology has developed an extensive custom dictionary file for Microsoft Office. Sometimes it seems every third word I write is a company, product name or some piece of tech jargon that Word doesn't recognize. Since I work on several different computers, I use SugarSync to keep my custom dictionary up to date.
Zero to Private Cloud in 8 Steps
Commentary  |  3/27/2012  | 
Here are eight steps for going from zero to private cloud. Note that I didn’t say eight "easy" steps. But don’t let that bother you--nothing that’s easy is ever worth doing anyway.
4G? No, It’s More Like 4Gee!
Commentary  |  3/26/2012  | 
Have you actually held a 4G device in your hands while it does a speed test? Has your brain struggled to reconcile the numbers displayed at the end of the test with the fact that you’re connected to a mobile network and not Wi-Fi? Have you felt your reality get pleasantly rocked in a way that left you a bit confounded over the numbers that your device was showing you? This 4G stuff is simply amazing.
Social Phishing Spikes As Spam Declines, IBM Finds
Commentary  |  3/23/2012  | 
Improved Web application security leads attackers to be creative, reports IBM's X-Force Internet security team.
The Upside-Down SAN
Commentary  |  3/23/2012  | 
Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground.
WWPass: Only The Just May Pass the Authentication Test
Commentary  |  3/22/2012  | 
Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.
A Rose May Be A Rose But Dedupe Is Not Necessarily Dedupe
Commentary  |  3/22/2012  | 
Today just about every vendor in the storage market has data deduplication as a feature in one or more of their products. While those of us that work with multiple deduplication products on a regular basis know there are big differences between the various technologies that vendors call data deduplication many users don’t know how to pick the deduplication solution that will best fit their needs.
Networking In The Cloud
Commentary  |  3/21/2012  | 
In discussing network design with my clients, I talk about how routers, firewalls and other network gear can be interconnected to provide a scalable and redundant IP network. These foundations of network design apply to networks composed of tangible components or the virtualized infrastructure that extends corporate data centers to the cloud. I find that the networking aspects of cloud computing are frequently overlooked or addressed as an afterthought.
The Security Profession Is A Mess
Commentary  |  3/21/2012  | 
I've been considering how to build a network security plan for a small data center with an online presence. To put the proposal together I needed to develop some sort of structure in the security space so that I could research products and vendors. What I found is that implementing firewalls and IDSes is simple. Finding competent security professionals is not.
Job Seekers Asked For Facebook Passwords: Debate Roars
Commentary  |  3/21/2012  | 
As part of the vetting process, some companies are asking job candidates to provide their Facebook credentials. Would you? Should you?
Report From The Tape Summit
Commentary  |  3/21/2012  | 
This week I spent two busy days in San Francisco at the second annual Tape Summit. While some may wonder if there’s enough life left in tape to have a summit I know tape has taken a bad rap over the past few years. In this post I’ll reflect on a few key facts that came out at the summit and expose some fallacies about tape. To start Gartner never said “71% of all attempts to restore from tape fail”.
March Madness Has Lessons For Social Marketing
Commentary  |  3/20/2012  | 
Sports teams, fans, and sports marketing pros have many lessons for social marketing. Just ask legendary sports broadcaster Butch Stearns.
Emotion Vs. Logic: The Modern Role Of Tape
Commentary  |  3/19/2012  | 
People love to hate tape. But tape today provides highly cost-effective and reliable answers to certain data storage challenges.
Are Storage Controllers Overworked?
Commentary  |  3/19/2012  | 
In many virtualized server infrastructures, demands push storage controllers beyond their limits. Here are some possible solutions.
Ruckus Seeks To Re-Invent Muni-Wireless
Commentary  |  3/18/2012  | 
Around 2005, several US cities tried to make a go of metropolitan wireless networking. Many of the initiatives were costly failures, and just as many morphed into shadows of their intended scales and uses. But in IT, sometimes old ideas come back with new teeth. In a recent announcement, Ruckus Wireless announced a new urban wireless project, and in the most curious of locations. It will be interesting to see how this one pans out, and for multiple reasons.
Don't Burn Bridges, And Don't Be A Jerk
Commentary  |  3/16/2012  | 
These two simple rules of life can help ensure you thrive on social networks.
5 Social Lessons From The Rush Limbaugh Imbroglio
Commentary  |  3/16/2012  | 
In the real-time world, reaction is immediate and dictated by social groups. Consider these crisis communications tips for social marketers.
IBM Pulse 2012: A New Storage Hypervisor
Commentary  |  3/15/2012  | 
IBM is promulgating a storage management concept that it calls a “storage hypervisor” though the final product name has not been determined. The company claims the technology will offer benefits – such as better storage utilization – leading to better storage cost economics, and data mobility – leading to increased flexibility, such as non-disruptive storage refreshes – and parallels the acceptance of server hypervisors and virtualization. But there are also b
Dell's SonicWall Acquisition Follows Cheap 'n Easy Blueprint
Commentary  |  3/14/2012  | 
Dell's Sonicwall acquisition makes sense. Dell's strategy is to sell low-cost desktops, laptops, and servers that are cheap and easy to use to everyone from small companies up to mid-size enterprises with the occasional large enterprise in the mix. Dell is going to do with security what they did with storage and are doing with networking. Remove complexity, bring important features to the surface, and make the resulting products available to the largely under served SMB/SME market.
How To Make Backup And Recovery Foolproof
Commentary  |  3/13/2012  | 
Nobody wants the nerve-wracking job of backup guy. But there's good news: Intelligent disk-based backup, virtualization, and lots of practice recoveries can make it safe to be in charge of the backup process.
Your IT Is Broken
Commentary  |  3/13/2012  | 
Right this minute your data center(s) are broken. You, monitoring systems or NOC may or may not know it. All of the blinky lights may be green, all systems reporting normal, but the data center is broken, and it’s costing you money and business agility.
Private Cloud Lessons You Can't Learn From Amazon, Google, Etc
Commentary  |  3/12/2012  | 
Very little of what the large public cloud providers do is actually applicable to a private cloud. The reason for this is twofold: scale and application.
Kaminario’s K2 Climbs the SSD Storage Performance Mountain
Commentary  |  3/9/2012  | 
One of the most exciting development areas for the ICT (information and communications technology) industry is in the attempt to address the I/O gap challenge, whereby servers are often frustrated in their attempts to read and write data as fast as they would like from traditional storage. Various approaches using solid-state devices (SSDs) are targeting the problem. Innumerable smaller companies have been attempting to address the I/O gap, and more recently large IT vendors--notably, EMC with i
Taming Apple's Bonjour
Commentary  |  3/8/2012  | 
By now we know that iPhones and iPads (and a few of those Android things) have infiltrated the enterprise, but much of Apple's approach to networking and interdevice functionality is still a bit, well, consumer-oriented, which has IT scrambling to deal with protocols that often conflict with enterprise IT's goals.
New iPad May Boost Cloud Storage Needs 10-Fold
Commentary  |  3/8/2012  | 
Apple's new iPad means users will send more data in larger files and at faster speeds more often to cloud storage providers, forcing them to substantially boost their capacity.
Scale-up, Scale-Out Nexsan Blurs the Line
Commentary  |  3/7/2012  | 
In the beginning, or at least the 20th century, modular scale-up storage systems dominated the market for midrange storage. More recently, the vendors of scale-out systems for NAS and iSCSI have touted the way their systems add controller horsepower and cache as they add capacity. Nexsan's new NST line of unified storage systems combines attributes of both architectures, hoping to leverage the best of both worlds.
Dell Adds AppAssure to Its Storage Portfolio
Commentary  |  3/4/2012  | 
Dell recently announced the acquisition of AppAssure, which it describes as a next-generation data protection solution because it deals not only with physical IT assets, but also with virtual and cloud environments. Dell plans to integrate the AppAssure software product with its Fluid Data architecture. AppAssure is the first acquisition that Dell has made since the creation of its new Software Group and will be part of its enterprise storage and software portfolio. This acquisition is another s
Trying To Stay Sane In A Crazy Wireless World
Commentary  |  3/4/2012  | 
I'm here to tell you, supporting wireless and mobile clients is nothing like keeping our Ethernet-tethered users happy. In the wired network world, you either get the speed that you're supposed to, or some counter or log somewhere points you to what's wrong. In the wireless realm, the variables are almost infinite. It's way more complicated, and getting worse. A lot worse.
Will Tape Replace The Hard Drive?
Commentary  |  3/2/2012  | 
Tape isn't dead. Here's why it might actually grow in importance and eventually replace many hard disk drives.
Two More Stealthy Solid-State Storage Startups
Commentary  |  3/1/2012  | 
My last post discussed, or at least mentioned, all the startups, and re-startups, building storage systems designed around flash memory that have made public announcements. Most startups spend the time they're developing Version 1.0 of their products in stealth mode so they can pop up fully formed like Athena from the skull of Zeus. We at DeepStorage have developed our own startup detection system that ferrets out those flying under the radar. In this column we'll look at a pair of stealth start

White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Twitter Feed