Innovation Reigns at Wireless Expo
This year’s Unwired Innovation Expo (UIE) in Clovis, New Mexico was simply amazing. By now, we’re all a bit desensitized to the wonder of wireless technology, and easily forget that under the hood of our WLAN environments lives some impressive core technology. It takes an event like the UIE to really remind us of just how empowering the wireless industry is to innovative products, and the minor miracles that are possible when our wireless engine is running right. Here’s a look
Do We Need World Backup Day?
March 31 is World Backup Day. Do we really need a day devoted to something that we should be doing every day? If we do, we should have a World Test Recovery Day, too.
Saving The SAN
You don't have to turn your storage area network upside down, with performance-sensitive data moved into the server on a flash-memory device. If you can fix its performance issues, the SAN has distinct advantages over server-side caching.
Data Caps And Treating Employees Like Adults
Carriers like AT&T and Verizon Wireless are using data caps to manage the explosive growth in 3G/4G data consumption. Hey, kids--the 1990s called and wants its bandwidth management strategy back. As Lee Badman points out in "4G? No, It's More Like 4Gee!" the data rates available to wireless consumers are growing rapidly and our demand is keeping pace. When you have high demand and data caps, the chance of overages is very likely, and the last thing anyone wants is out-of-control telecom costs. C
Synchronizing Custom Dictionaries With The Cloud
Everyone I know who writes about technology has developed an extensive custom dictionary file for Microsoft Office. Sometimes it seems every third word I write is a company, product name or some piece of tech jargon that Word doesn't recognize. Since I work on several different computers, I use SugarSync to keep my custom dictionary up to date.
Zero to Private Cloud in 8 Steps
Here are eight steps for going from zero to private cloud. Note that I didn’t say eight "easy" steps. But don’t let that bother you--nothing that’s easy is ever worth doing anyway.
4G? No, It’s More Like 4Gee!
Have you actually held a 4G device in your hands while it does a speed test? Has your brain struggled to reconcile the numbers displayed at the end of the test with the fact that you’re connected to a mobile network and not Wi-Fi? Have you felt your reality get pleasantly rocked in a way that left you a bit confounded over the numbers that your device was showing you? This 4G stuff is simply amazing.
The Upside-Down SAN
Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground.
WWPass: Only The Just May Pass the Authentication Test
Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.
A Rose May Be A Rose But Dedupe Is Not Necessarily Dedupe
Today just about every vendor in the storage market has data deduplication as a feature in one or more of their products. While those of us that work with multiple deduplication products on a regular basis know there are big differences between the various technologies that vendors call data deduplication many users don’t know how to pick the deduplication solution that will best fit their needs.
Networking In The Cloud
In discussing network design with my clients, I talk about how routers, firewalls and other network gear can be interconnected to provide a scalable and redundant IP network. These foundations of network design apply to networks composed of tangible components or the virtualized infrastructure that extends corporate data centers to the cloud. I find that the networking aspects of cloud computing are frequently overlooked or addressed as an afterthought.
The Security Profession Is A Mess
I've been considering how to build a network security plan for a small data center with an online presence. To put the proposal together I needed to develop some sort of structure in the security space so that I could research products and vendors. What I found is that implementing firewalls and IDSes is simple. Finding competent security professionals is not.
Report From The Tape Summit
This week I spent two busy days in San Francisco at the second annual Tape Summit. While some may wonder if there’s enough life left in tape to have a summit I know tape has taken a bad rap over the past few years. In this post I’ll reflect on a few key facts that came out at the summit and expose some fallacies about tape. To start Gartner never said “71% of all attempts to restore from tape fail”.
Ruckus Seeks To Re-Invent Muni-Wireless
Around 2005, several US cities tried to make a go of metropolitan wireless networking. Many of the initiatives were costly failures, and just as many morphed into shadows of their intended scales and uses. But in IT, sometimes old ideas come back with new teeth. In a recent announcement, Ruckus Wireless announced a new urban wireless project, and in the most curious of locations. It will be interesting to see how this one pans out, and for multiple reasons.
IBM Pulse 2012: A New Storage Hypervisor
IBM is promulgating a storage management concept that it calls a “storage hypervisor” though the final product name has not been determined. The company claims the technology will offer benefits – such as better storage utilization – leading to better storage cost economics, and data mobility – leading to increased flexibility, such as non-disruptive storage refreshes – and parallels the acceptance of server hypervisors and virtualization. But there are also b
Dell's SonicWall Acquisition Follows Cheap 'n Easy Blueprint
Dell's Sonicwall acquisition makes sense. Dell's strategy is to sell low-cost desktops, laptops, and servers that are cheap and easy to use to everyone from small companies up to mid-size enterprises with the occasional large enterprise in the mix. Dell is going to do with security what they did with storage and are doing with networking. Remove complexity, bring important features to the surface, and make the resulting products available to the largely under served SMB/SME market.
How To Make Backup And Recovery Foolproof
Nobody wants the nerve-wracking job of backup guy. But there's good news: Intelligent disk-based backup, virtualization, and lots of practice recoveries can make it safe to be in charge of the backup process.
Your IT Is Broken
Right this minute your data center(s) are broken. You, monitoring systems or NOC may or may not know it. All of the blinky lights may be green, all systems reporting normal, but the data center is broken, and it’s costing you money and business agility.
Kaminario’s K2 Climbs the SSD Storage Performance Mountain
One of the most exciting development areas for the ICT (information and communications technology) industry is in the attempt to address the I/O gap challenge, whereby servers are often frustrated in their attempts to read and write data as fast as they would like from traditional storage. Various approaches using solid-state devices (SSDs) are targeting the problem. Innumerable smaller companies have been attempting to address the I/O gap, and more recently large IT vendors--notably, EMC with i
Taming Apple's Bonjour
By now we know that iPhones and iPads (and a few of those Android things) have infiltrated the enterprise, but much of Apple's approach to networking and interdevice functionality is still a bit, well, consumer-oriented, which has IT scrambling to deal with protocols that often conflict with enterprise IT's goals.
Scale-up, Scale-Out Nexsan Blurs the Line
In the beginning, or at least the 20th century, modular scale-up storage systems dominated the market for midrange storage. More recently, the vendors of scale-out systems for NAS and iSCSI have touted the way their systems add controller horsepower and cache as they add capacity. Nexsan's new NST line of unified storage systems combines attributes of both architectures, hoping to leverage the best of both worlds.
Dell Adds AppAssure to Its Storage Portfolio
Dell recently announced the acquisition of AppAssure, which it describes as a next-generation data protection solution because it deals not only with physical IT assets, but also with virtual and cloud environments. Dell plans to integrate the AppAssure software product with its Fluid Data architecture. AppAssure is the first acquisition that Dell has made since the creation of its new Software Group and will be part of its enterprise storage and software portfolio. This acquisition is another s
Trying To Stay Sane In A Crazy Wireless World
I'm here to tell you, supporting wireless and mobile clients is nothing like keeping our Ethernet-tethered users happy. In the wired network world, you either get the speed that you're supposed to, or some counter or log somewhere points you to what's wrong. In the wireless realm, the variables are almost infinite. It's way more complicated, and getting worse. A lot worse.
Two More Stealthy Solid-State Storage Startups
My last post discussed, or at least mentioned, all the startups, and re-startups, building storage systems designed around flash memory that have made public announcements. Most startups spend the time they're developing Version 1.0 of their products in stealth mode so they can pop up fully formed like Athena from the skull of Zeus. We at DeepStorage have developed our own startup detection system that ferrets out those flying under the radar. In this column we'll look at a pair of stealth start