Welcome!


From the Blogosphere

Don’t emphasize network security at the cost of endpoint security; the two can be integrated and work hand in hand. The result is a safer, more secure business ready for the challenges of the future.
When I took my operating systems fundamentals course in college I was taught that an operating system provides very specific capabilities that provides users with access compute resources for building and running applications. Over time as networking capabilities and bandwidth increase...
Bitium, based in Santa Monica, CA, works in the cloud to provide secure management of an enterprise's applications, users, and passwords in one place. We asked company Co-founder and CEO Scott Kriz a few questions about the company's vision and strategy. Cloud Computing Journal: Wh...
For the third year in a row, we worked together with Pacific Crest Securities, an investment banking firm with a specific focus on SaaS, to survey 306 SaaS companies. This represents nearly double the # of respondents from last year, giving us deeper benchmarking data and insights to s...
Appcore aims to simplify private cloud through Apache CloudStack solutions. Nate Gordon serves as the Des Moines, IA-based company's Director of Technology, in its effort to enhance Apache CloudStack and Citrix CloudPlatform for its customers. We had a few questions for him, and this i...
I ran across this quote a while back, and was awestruck at its profundity. I keep it on a list of quotes that I look to for inspiration. To think that the guy who invented the theory of relativity views the world in this way, trying to distill extremely complex ideas down to their simp...
Logging as part of the continuous delivery process can help your teams move faster and build a product that your customers really love. Over the last years Continuous Delivery has gained a massive following with many development teams embracing the style. Companies have chosen (as wit...
To say that Operations and DevOps will have a new set of challenges in the coming year is a bit redundant, as their entire job is based on solving problems and facing challenges. However the current and future landscape of tools, technologies, and processes is changing dramatically....
If you're an executive that's concerned about the high-cost of proprietary software, you're not alone. If your IT team pushes back whenever Line of Business leaders ask them for feature enhancements that goes beyond the limits of the commercial software packages they've licensed, then ...
When SDN made its mainstream debut at Interop in 2012, there was quite a bit of excitement tempered by the reality apparent to some folks that technical limitations would impact its applicability above layer 2-3 and, perhaps even at layers 2-3 depending on the network. But even then w...
While some might still be focused on SDN with an OpenFlow-style twist, 30% of the organizations in our survey this summer (report forth coming, I promise!) were looking at SDN to improve time to market. Of those, 73% considered an API-enabled infrastructure to be important to very impo...

#SSL #webperf #infosec 

Now your services can take advantage of hardware acceleration even when they're deployed on virtual machines

Way back in the day, when SSL offlo...

This is important for project managers. It’s important for Agile development organizations. It’s important to the business. If the adage that “what cannot be measured, cannot be managed” is true, then there is an implied responsibility for management to carefully define what must be me...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potentia...

Docker for Smarties (e.g. non-dummies) from VMworld 2014

By Greg Schulz

Docker for Smarties (e.g. non-dummies) from VMworld 2014

Oct. 7, 2014 10:00 AM EDT  Reads: 2,148

Software-defined networking is fundamentally about two things: the centralization of network intelligence to make smarter decisions, and the creation of a single (or smaller number of) administrative touch points to allow for streamlined operations and to promote workflow automation. T...
Skytap recently announced the availability of a Docker template in the Skytap Cloud Public Template Library. Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. This new template allows you to easily experiment with or deploy Docke...
An intermediary brokerage can help companies and government agencies make the best use of commodity and targeted IaaS clouds, and not fall prey to replacing an on-premises integration problem with a cloud complexity problem. To learn more about the role and value of the specialist c...
Silver shows that predictions in areas such as economics have been less successful, e.g. he examines why many economists missed the recession, and why supposedly expert forecasters get election predictions wrong so often. For example, before the recession of 2008, the assumption was ma...
With so much versatility – not to mention so many data analytics companies – it’s understandable for businesses to feel a bit of confusion during the buying process. BI buyers need resources that better illuminate what’s happening in the market, and how to choose the correct BI softwar...
The big picture is building a culture of innovation. Changing our organizations so fundamentally, however, is inherently risky. Innovation requires disruption, and thus companies risk devolving into chaos as they follow the path to innovativeness. But good executives (the ones who ...
Certainly, enterprises feel the pressure to transition their networks to next generation architectures like SDN to brace the coming storm that is an app economy. Service providers could provide valuable advice to them on how to do that, if they could yell loud enough over the thunderou...
Executives charged with building business-driven applications have an extremely challenging task ahead of them. However, the cavalry has arrived with useful tools and strategies built specifically to keep modern applications working efficiently. We partnered with Gigaom Research to ca...
Inarguably, the pressure is on "the network" to get in gear, so to speak, and address how fast its services can be up and running. Software-defined architectures like cloud and SDN have arisen in response to this pressure, attempting to provide the means by which critical network servi...
Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
It was great catching up with Brian at VMworld, even if it was in the Tea Garden.  We go back a ways.  This 6 minute video clip discusses who will win the cloud wars and how CloudVelox differentiates from a dozen or so early cloud migration and DR tools.  
Encrypting cloud storage is now in the mainstream, the accepted best practice and a business imperative. Across the world and all industries, enterprises need to encrypt cloud data to stay compliant, safe and competitive. There are several offerings of encrypted cloud storage for ente...
This post is the first in a multi-part series of posts on the many options for collecting and forwarding log data from different platforms and the pros and cons of each. In this first post we will focus on Syslog, and will provide background on the protocol. Syslog has been around for...
One funny thing about DevOps is that it is often touted that constant, on-the-fly changes are the way of the future in operations, and DevOps enables those changes. While this sounds really good, and some organizations are actually doing this type of DevOps, I think it is time that, fo...
The term hybrid is somewhat misleading. In the original sense of the word, it means to bring together two disparate "things" that result in some single new "thing". But technology has adapted the meaning of the word to really mean the bridging of two different technological models. For...
In today’s post in the modernizing your infrastructure with Hybrid Cloud series, I am going to talk about Hyper-V over SMB, which we introduced in Windows Server 2012. It is also important to note that you can use storage spaces to house your SMB share that Hyper-V will leveraged. In...
Regardless if you’ve migrated multiple applications or this is your first migration to a public Infrastructure-as-a-Service (IaaS) you will want to run a small proof-of-concept to make sure that the basic elements of data flow operate as expected and your components will run in the Iaa...
In today’s software-defined business era, uptime and availability are key to the business survival. The application is the business. However, ensuring proper application performance remains a daunting task for their production environments, where do you start? Enter Business Transacti...
Such devices and connected technologies exist today, and the sector is driving the leading edge of the Internet of Things under the label of the “Connected Home” or “Smart Home”. Fact is, some pretty traditional low-tech concepts are becoming technology-enabled, such as/including locki...
The Internet of Things is only going to make that even more challenging as businesses turn to new business models and services fueled by a converging digital-physical world. Applications, whether focused on licensing, provisioning, managing or storing data for these "things" will incre...
If you listen to the persistent murmur in the market surrounding the Internet of Things right now, you'd believe that it's all about sensors. Sensors and big data. Sensors that monitor everything from entertainment habits to health status to more mundane environmental data about your h...
Kirk Byers at SDN Central writes frequently on the topic of DevOps as it relates (and applies) to the network and recently introduced a list of seven DevOps principles that are applicable in an article entitled, "DevOps and the Chaos Monkey. " On this list is the notion of reducing var...
There has been a lot of talk in the venture capital industry about automating the home and leveraging Internet-enabled devices for various functions. The first wave of this was the use of the smartphone as a remote control to manage, for instance, a thermostat. The thermostat then begi...