Welcome!


From the Blogosphere

Docker for Smarties (e.g. non-dummies) from VMworld 2014

By Greg Schulz

Docker for Smarties (e.g. non-dummies) from VMworld 2014

Sep. 22, 2014 12:00 PM EDT  Reads: 913

Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
It was great catching up with Brian at VMworld, even if it was in the Tea Garden.  We go back a ways.  This 6 minute video clip discusses who will win the cloud wars and how CloudVelox differentiates from a dozen or so early cloud migration and DR tools.  
Encrypting cloud storage is now in the mainstream, the accepted best practice and a business imperative. Across the world and all industries, enterprises need to encrypt cloud data to stay compliant, safe and competitive. There are several offerings of encrypted cloud storage for ente...
This post is the first in a multi-part series of posts on the many options for collecting and forwarding log data from different platforms and the pros and cons of each. In this first post we will focus on Syslog, and will provide background on the protocol. Syslog has been around for...
One funny thing about DevOps is that it is often touted that constant, on-the-fly changes are the way of the future in operations, and DevOps enables those changes. While this sounds really good, and some organizations are actually doing this type of DevOps, I think it is time that, fo...
Skytap recently announced the availability of a Docker template in the Skytap Cloud Public Template Library. Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. This new template allows you to easily experiment with or deploy Docke...
The term hybrid is somewhat misleading. In the original sense of the word, it means to bring together two disparate "things" that result in some single new "thing". But technology has adapted the meaning of the word to really mean the bridging of two different technological models. For...
In today’s post in the modernizing your infrastructure with Hybrid Cloud series, I am going to talk about Hyper-V over SMB, which we introduced in Windows Server 2012. It is also important to note that you can use storage spaces to house your SMB share that Hyper-V will leveraged. In...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
Regardless if you’ve migrated multiple applications or this is your first migration to a public Infrastructure-as-a-Service (IaaS) you will want to run a small proof-of-concept to make sure that the basic elements of data flow operate as expected and your components will run in the Iaa...
In today’s software-defined business era, uptime and availability are key to the business survival. The application is the business. However, ensuring proper application performance remains a daunting task for their production environments, where do you start? Enter Business Transacti...
Such devices and connected technologies exist today, and the sector is driving the leading edge of the Internet of Things under the label of the “Connected Home” or “Smart Home”. Fact is, some pretty traditional low-tech concepts are becoming technology-enabled, such as/including locki...
When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potentia...
The Internet of Things is only going to make that even more challenging as businesses turn to new business models and services fueled by a converging digital-physical world. Applications, whether focused on licensing, provisioning, managing or storing data for these "things" will incre...
If you listen to the persistent murmur in the market surrounding the Internet of Things right now, you'd believe that it's all about sensors. Sensors and big data. Sensors that monitor everything from entertainment habits to health status to more mundane environmental data about your h...
Kirk Byers at SDN Central writes frequently on the topic of DevOps as it relates (and applies) to the network and recently introduced a list of seven DevOps principles that are applicable in an article entitled, "DevOps and the Chaos Monkey. " On this list is the notion of reducing var...
There has been a lot of talk in the venture capital industry about automating the home and leveraging Internet-enabled devices for various functions. The first wave of this was the use of the smartphone as a remote control to manage, for instance, a thermostat. The thermostat then begi...
I love The Internet of Things. You do, too, even if you don’t know exactly what it is yet. Hardly a day goes by where I don’t find a story about some awesome company creating some new awesome gadget that taps into The Internet of Things. Scrolling through these stories is like taking a...
Executives charged with building business-driven applications have an extremely challenging task ahead of them. However, the cavalry has arrived with useful tools and strategies built specifically to keep modern applications working efficiently. We partnered with Gigaom Research to ca...
Inarguably, the pressure is on "the network" to get in gear, so to speak, and address how fast its services can be up and running. Software-defined architectures like cloud and SDN have arisen in response to this pressure, attempting to provide the means by which critical network servi...
Back when we were doing DB2 at IBM, there was an important older product called IMS which brought significant revenue. With another database product coming (based on relational technology), IBM did not want any cannibalization of the existing revenue stream. Hence we coined the phrase ...
What if you could deploy a new IT service shortly after you defined the requirements? And, just imagine the bliss, if your IT spend could directly translate into a competitive advantage. Predicting the ROI would be relatively easy. You would be the envy of your peer group. Unfortuna...
If you’ve been paying close attention lately you’ll know that the “Internet of Things” has become one of the technology industry’s biggest buzz phrases. It’s not hard to figure why. The internet has been around for the last twenty years and it has truly revolutionized our lives, the wa...
You can't truly accelerate the SDLC without a dependable continuous testing process. Evolving from automated to continuous testing requires on-demand access to a complete, realistic test environment. Yet, such access can be extremely difficult to achieve with today's increasingly compl...
Did you see what the NFL is doing this year with sensors? Earlier this month they announced a partnership with Zebra Technologies, a company that provides RFID chips for applications from ‘automotive assembly lines to dairy cows’ milk production.’ This season there will be sensors in t...
User Experience (UX), in networking is a tricky thing. It’s not just about the direct user interaction of a particular feature or of a particular product. Over at Packet Pushers, we see many blog entries reviewing network products. Time and time again, they show us that UX encompass...
Achieving the ultimate ‘Five Nines’ of web site availability (around 5 minutes of downtime a year) has been a goal of many organizations since the beginning of the internet era. There are several ways to accomplish this but essentially a few principles apply. Web applications come in ...
In the five seconds it takes you to read this, 60% of your visitors just abandoned your site. Another 20% were gone before you even hit the first comma, and 30% of all them are purchasing from one of your competitors. That's what Limelight Networks "State of the User Experience" says,...
I like this word re-imagination from Mary Meeker’s Internet Trends presentation. We are seeing so many aspects of our life being transformed by the internet. Take for example, ordering a cab to go somewhere. Either we phone for a yellow cab here in California or if you are in New York...
It's not the first time we've heard the statement that cloud can be too expensive and I doubt it will be the last. This latest episode comes from Alexei Rodriguez, Head of Ops at Evernote by way of Structure 2014: It is important to note that this admission - like those in the past - ...
In a previous article, we talked about “Short T’s.” We talked about how, in network engineering, the “T” is very long: Configuring a network to achieve business goals requires considerable skill and knowledge. While we set up a conceptual model in that post to talk about what “T” me...
Go ahead. Name a cloud environment that doesn't include load balancing as the key enabler of elastic scalability. I've got coffee... so it's good, take your time... Exactly. Load balancing - whether implemented as traditional high availability pairs or clustering - provides the mean...
There’s been a lot of talk recently about the “Internet of Things,” where all kinds of devices – everything from clothing to appliances to vehicles — will be interconnected via the cloud. Sounds enticing, but really not much of a stretch from what’s already happening now via smartph...
Application delivery is always evolving. Initially, applications were delivered out of a physical data center, either dedicated raised floor at the corporate headquarters or from some leased space rented from one of the web hosting vendors during the late 1990’s to early 2000’s or some...
Cisco has been ridding itself of consumer products for some time, which is why it was surprising to see Cisco at the International Consumer Electronics Show this year. According to CEO John Chambers, however, the new IoE (Internet of Everything) plan at Cisco is set to change the traje...
Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavi...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
Much has been published about the Open Compute Project. Initiated by Facebook, it has become an industry effort focused on standardization of many parts and components in the datacenter. Initially focused on racks, power and server design, it has also added storage and now networking t...