Welcome!


From the Blogosphere

When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potentia...
The cloud’s massive success and the growing desire for Big Data analytics are just two of the factors that are making traditional storage architectures obsolete. Organizations cannot afford to scale bygone storage appliances. Even if they could, the time it would take is unacceptable i...
In his general session at 20th Cloud Expo, Don Demcsak, a DevOps and Cloud Native Modernization Principal for Dell EMC, showed how to create the continuous delivery culture and eight accelerators for leading the change. Don Demcsak is a DevOps and Cloud Native Modernization Principal f...
Making informed network investment decisions about emerging technologies such as network function virtualization (NFV) and software-defined networking (SDN) can help evolve the network to keep pace with the innovations of the devices and people it’s connecting. As you work with busines...
Accessing files using traditional VPN software comes at a great cost. In this article we quantify true costs of supporting VPN's for remote access. Businesses of all types utilize VPN software solutions to provide remote access to their employees. How do we quantify the true Total Co...
The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through s...
Today’s hyper-connectivity of both people and things has led to an enormous jump in network traffic. Global IP traffic will increase nearly threefold over the next five years. It’s not going to lessen, nor is it going to get slower. These factors create a need for high-speed networks t...
Targeted attacks on the network of a business can be big trouble. A business should know where to look and what to look for to stop the attacks. Businesses are aware of the dangers of hackers. They know that a hacker can steal private information that hey store on their computer netwo...
Digital transformation can be exciting, but it also can be painful. Organizations are trying to better support a growing mobile workforce that needs the flexibility to work from anywhere on any device. The ability to do so offers a distinct competitive advantage, as productivity soars....
Over the last several months, intent-based networking (IBNS) has gained momentum as a newly viable technology that aims to further automate traditional network management. Although IBNS has existed for a few years now as a general concept, it was more buzz than reality until Cisco® lau...
Because not everything the internet offers is suitable for all users, organizations use web filters to block unwanted content. However, filtering content becomes challenging as networks speeds increase. Two filtering architectures are explored below, along with criteria to help you dec...
WAN infrastructures are highly persistent due to typically enormous investments in their dedicated hardware and management tools. WAN services like MPLS have undoubtedly been beneficial and enduring, but enterprises and IT departments require more flexible and economical solutions to p...
Over the years, many enterprises have achieved tremendous cost reductions and management simplicity through virtualizing their IT infrastructure. According to Gartner, while some firms have virtualized over 90% of their servers, on an average, most firms have over 75% of their servers ...
A common development challenge is accurately scoping the amount of effort required when creating new applications. This can occur when an application’s requirements are first being designed, or even before. Since one of the most frequently-overlooked capabilities of service virtualizat...
Let’s rewind the clock a bit. A few years ago, object storage was the new technology that promised to replace file system in the secondary storage market. It would scale beyond the limits of file systems and deliver better costs. The trade-off would be lower ease-of-use with new protoc...
This past week HPE continued buying into server storage I/O data infrastructure technologies announcing an all cash (e.g. no stock) acquisition of Nimble Storage (NMBL). The cash acquisition for a little over $1B USD amounts to $12.50 USD per Nimble share, double what it had traded at....
The visual model to declarative metadata representation to immutable deployment vision is in essence what SD is all about. The secret to making this approach practical, and thus the key to understanding why SD approaches have become so prevalent, is the word immutable. Once we ge...
As today’s businesses increasingly turn to the cloud to run their operations, seasoned enterprise technology professionals may recognize a familiar pattern. Years ago, virtualization emerged as a transformational technology with a similar pattern of business drivers; initially the prom...
When it comes to wide area networking, large global enterprises have some unique challenges to ensure that networking capabilities keep up with their complex business requirements. The most obvious challenge is the sheer scale of WAN operations. A very large enterprise could have hundr...
Recently an analysis was completed by SmartBear to gauge the sense of what software professionals believe is the core value provided by API virtualization. It was concluded that software professionals, including developers, testers, managers and architects believe that the biggest bene...
BYOD. IoT. Cloud computing. DevOps. IT professionals today have more demands (and more acronyms) on their time than ever. Application development and delivery are changing rapidly and increasing in complexity, revealing the limitations of traditional DNS approaches in achieving modern ...
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model, and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. In part two, we talked about...
A few years ago a popular industry buzzword term theme included server less and hardware less. It turns out, serverless BS (SLBS) and hardware less are still trendy, and while some might view the cloud or software-defined data center (SDDC) virtualization, or IoT folks as the culprits,...
The network is at the core of every business, yet the majority of today’s networks were not designed to handle the next generation of business requirements. More than two decades ago the world standardized on the Transmission Control Protocol (TCP) / Internet Protocol (IP) stack and li...
Welcome to the Cloud, Big Data, Software Defined, Bulk and Object Storage fundamentals page part of the objectstoragecenter.com micro site collection of resources. Software defined, Bulk, Cloud and Object Storage exist to support expanding and diverse application data demands. There ar...
In the last year or so, we have seen burgeoning trends like software-defined networking (SDN), open source-based automation, the Internet of Things (IoT), and the continuing rise of hybrid IT dramatically impact traditional networking. Long gone are the days of being a router jockey. W...
Data Infrastructure server storage I/O network and associated tradecraft are your skills, experiences, insight as well as tricks of the trade, profession and job function (read more about what is a data infrastructure here). This is the first of a two-part series exploring data infrast...
Software-defined infrastructure (SDI) is one of the most popular and ongoing trends within datacenters and cloud environments leading to better infrastructure flexibility by developing the infrastructure based on scripts respectively source code. However, SDIs are more and more becomin...
Recently I found in my inbox a link to a piece 6 Dashboards for Managing Every Modern Data Center that caught my attention. I was hoping to see who the six different dashboard solutions were instead of finding list of dashboard considerations for modern data centers and data infrastruc...
Service desk managers and CIOs are key decision makers who need insight from their data to formulate better strategies. For instance, by tracking including technician performance, service desk responsiveness, IT user preferences, customer satisfaction, SLA violation rate, and other cri...
Each enterprise - and perhaps even units within each enterprise - is determining the path to a proper mix of public and private cloud. Implementing such a services-attuned architecture may be the most viable means to dynamically apportion applications and data support among and betwee...
Server Virtualization has transformed the way we manage server workloads but virtualization hypervisors were not the endgame of datacenter management. What is the role of server virtualization and hypervisors in the new age of cloud, containers, and more importantly, hyperconvergence? ...
Almost three years ago, VMware introduced the world to its virtual SAN. This new solution enabled customers to use storage within ESXi servers without the need for external storage – an exciting promise for organizations that wanted to quickly scale their virtual storage. Now, it’s tim...
Large enterprises today are juggling an enormous variety of network equipment. Business users are asking for specific network throughput guarantees when it comes to their critical applications, legal departments require compliance with mandated regulatory frameworks, and operations are...
Enabling patient-doctor trust goes a long way in a provider’s ability to provide care. Trust is also critical for enabling network connections that are safe, to help secure health networks. The healthcare industry is scrambling to shore up defenses as cyberattacks and breaches increas...
You’ve probably heard a multitude of things around hyperconvergence or hyperconverged infrastructure as these are becoming hot new industry buzzwords, but what do these terms really mean? Are vendors that say they have hyperconverged infrastructure really living up to the promises of t...
They say insanity is doing the same thing over and over and expecting a different result. Sometimes doing the same thing over and over while expecting the same results can be insane too. Find out how to change your expectations of IT infrastructure. Have you ever wondered if you are s...
IT planning is an imprecise science that allows IT experts to increase the flexibility and agility of IT environments while reducing the bottom line. In an ideal world, where time and budget are not limiting factors, upgrading an organization's infrastructure happens on an ongoing, as-...
Bridging the divide between legacy storage and new data management platforms could constrain IT organizations and budgets and could prevent the utilization of cost-effective scalable storage infrastructures. But, businesses can avoid some of these constrains by evaluating their storage...
To achieve "quality @ speed", it's essential to have unrestrained access to a trustworthy and realistic test environment. It is important to recognize that a complete test environment includes the application under test (AUT) and all of its dependent components (e.g., APIs, 3rd-party s...