Welcome!


Latest Blogs from Virtualization Journal
We provide the software that you need to manage a busy release schedule. Without Plutora you are forced to use manual methods to orchestrate releases and manage resources, and the analogy that connects with most of our customers is that Plutora is the necessary "Air Traffic Control" f...
Apache Drill is an open source, schema-free SQL query engine—that enables a business to extract the most value possible from data stored in Hadoop. Apache Drill does this by breaking down many of the technical barriers that had restricted the ways that analysts could work with data, an...
SDNs, or more specifically provisioning automation platforms service provider interconnections, and have crept into nearly all marketing materials and elevator pitches in discussions with submarine cable operators, networks, Internet Exchange Points, and carrier hotels. While some of ...
If you're part of the decision making process in how to get started with Big Data then you've probably already discovered that open source Apache Hadoop has a big lead. You also know that unless you've got a particularly deep NoSQL team or want to write your own proprietary code that t...
You are a hobbyist; curious student or a developer-entrepreneur then you must get this kit to jump start your IoT development. This is still in Beta but it has everything you need in terms of hardware, software, tools and forums to guide you through. IoT dev kit is a subset of In...
AWS was in the premier position having had a head start of more than 4 years in the cloud related business. The lowering of prices by Microsoft; a new CEO; an emphasized bet on the cloud have all contributed to Microsoft Azure's adoption by the enterprises. One of the reasons for this ...
Axios Systems on Tuesday announced it has selected CenturyLink Cloud as the hosting platform for Axios Systems’ IT Service Management (ITSM) solutions in Canada. CenturyLink, a global provider of communications and IT services, joins other leading technology providers across North Amer...
When a CIO or a CTO thinks of the applications they support it is almost always in terms of a "portfolio" When a research company named Gleanster poll executives about agile data management they discovered an interesting trend. Companies are reporting an increase in portfolio sizes wi...
After reading Sean Michael Kerner’s article in Enterprise Networking Planet earlier this month, I thought I’d add a few thoughts of my own to what he wrote. He discusses SDN and IPv6. Here’s my take on Software Defined Networking (SDN) in 2015: Given the ongoing hype and the rang...
When meeting with potential new customers, I’m frequently asked “do you have customized polling?” As we all learned in life, the question is often less telling than WHY the question was asked. I answer: “Of course, we have customized polling – what enterprise class solution (or even ...
Some of the network gear vendors cast a wary look at network management vendors, particularly those who do continual, automatic discovery of the network inventory and connectivity. Why? We know what’s actually out there, and what’s actually being used. We had one customer in the i...
While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of c...
In Part 1, I shared my thoughts on SDN in 2015, after reading Sean Michael Kerner’s article in Enterprise Networking Planet. This post will cover a few of my thoughts on IPv6. Once the initial scares surrounding IPv4 address exhaustion passed, enterprises have taken a relaxed attitud...
SYS-CON Media announced that Cisco, a worldwide leader in IT that helps companies seize the opportunities of tomorrow, has launched a new ad campaign in Cloud Computing Journal. The ad campaign, a webcast titled 'Is Your Data Center Ready for the Application Economy?', focuses on the ...
With every New Year it is time to look back at the industry events of the past 12 months, and use our expertise to predict what lies ahead, in order to be more prepared. With regards to DDoS attacks, here is a short list of what to expect in 2015. We expect to see an increase in DDoS...
Here’s a short anecdote: a QA team maintained a test environment separate from their production environment, but they had gone through great lengths to ensure it matched what was in production in every respect. It was filled with the same hardware, and all the software was identical do...
Many years ago Gartner introduced their technology Hype Cycle, which maps visibility against maturity for new technology. The Hype Cycle in essence states that many new technologies get a large amount of visibility early in their maturity cycle. The visibility and enthusiasm drops sign...
Xero small business accounting software believes SaaS (software as a service) and especially mobile accounting software is the way to empower small business in a way that can influence whole countries' gross domestic products (GDP.) Xero's U.S. President Jamie Sutherland explains how t...
SYS-CON Events announced today that Cisco, the worldwide leader in IT that transforms how people connect, communicate and collaborate, has been named “Gold Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York C...
I had a very interesting discussion with a retail customer recently. I guess the retail business experiences employee turnover more than other areas, and the IT department is no exception. A key issue to them was expertise. They look for technologies that can be quickly learned by t...
Is there an emerging market for OEM-ed Hadoop? Altoros Founder and CEO Renat Khasanshyn (pitured below) saw initial evidence of this recently, at a meetup he organized in San Ramon, CA.The meetup was ostensibly about Cloud Foundry and Docker, and featured speakers discussing the use of...
Technology was dominated by several prevalent trends in 2014 – from the Internet of Things (IoT) and big data to the cloud and cyber security, it seems like there was barely a day without one of these trends creeping up in the news. Now we have entered 2015, these trends are still at t...
While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking al...
Cloudian, Inc., on Wednesday announced availability of Cloudian HyperStore 5.1 software. HyperStore 5.1 is an enhanced Amazon S3-compliant, plug-and-play hybrid cloud software solution that now features full Apache Hadoop integration. Enterprises can now transform Big Data into smart d...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the d...
Ninety-percent of your users want your site to perform well during peak periods, like the last month or so. That's according to a study by Compuware, in which they also found that most dissatisfied users will throw you under a bus if your app or site performs poorly while they're despe...
It is important that operations be in the loop when it comes to planning any software deployment. They need to know when the project starts, not at the last minute about your new deployment. Ensure that operations is aware of any infrastructure changes needed well in advance. If the op...
According to a Greer Institute Workforce and Talent study, the 2020 workforce is both "the most educated and culturally diverse of any generation" and "notorious job-hoppers who dislike bureaucracy and distrust traditional hierarchies." Given this, it is crucial for leaders to understa...
SYS-CON Events announced today that Cloudian, Inc., the leading provider of hybrid cloud storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud E...
Redis has quickly become one of the top open source key value stores around. We at Stackify have been using Windows Azure's Managed Cache but have had a long history of intermittent problems with it. So we decided it was time to bite the bullet and give Redis a try, which Azure now sup...
Virtualized environments are demanding when it comes to storage. Tier-1 virtualized applications require always-on, fast, available access to data. One of the ways that today’s virtualization vendors are increasing the stability and speed of storage access in virtualized environments i...
Is there a point where business can safely assume they have hit the limit of what traditional IT organizations have to offer? In an Internet and data driven world, does IT simply lack the agility and depth needed to fulfill business requirements and need for innovation? Parts of clou...
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networkin...
Once again after a couple weeks off and the calendar odometer flipping another year, I’m sitting here with a blinking curser wondering what to write about. And the thing that pops into my head are Things. The Everythings. While 2014 was the hype year for the Internet of Things (IoT), a...
Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is e...
One of the neat things about microservices is the ability to segment functional actions into scalability domains. Login, browsing, and checkout are separate functional domains that can each be scaled according to demand. While one hopes that checkout is similarly in demand, it is unlik...
What do we know so far about cloud computing? Well, first the hype-cycle slowed down and we started realizing that hybrid cloud (as a combination of public and private resources) was a relatively sensible idea, i.e., from both an expenditure (public) and security (private) perspective....
One way or another, all data center networks exhibit at least 6 different functional areas that their operators need to engineer, implement, and operate with a differing set of needs and requirements. Similarly, in one way or another, most of the available SDN and virtualized network s...
Tis’ the season – the season where I look back at predictions I made last year, the season where I evaluate and take a deep dive into the breach landscape and the season where I look into where 2015 is headed. In a March 2014 blog post, I discussed how the sheer amount of data breaches...
Storing data of any kind on the cloud can be a risk, but there are ways to mitigate the risks. With such an abundance of cloud providers, there are plenty of options for you to choose from for security purposes. Finding a vendor that encrypts data in motion as well as data at rest is a...