Hybrid Cloud & Infrastructure Management – Making the Switch

Hybrid Cloud & Infrastructure Management – Making the Switch

The New Year is always a good time for new beginnings, and 2015 is no exception.  With the start of 2015, my coverage focus at EMA is shifting and evolving.  After 22+ years in the network management space, including over six years as an industry analyst, I am starting a new chapter by shifting my area of research to unified infrastructure management including cloud and on-prem environments. While it might seem an unusual change, this is actually quite a natural transition.  Throughout my years in network management, I’ve always kept an eye on the context of where networks fit into the ...

Read More

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application discovery and availability monitoring Service dependency mapping Change design and workflow automation Network topology and policy analysis Policy optimization and violation guidance Policy violation notification Take a look at it.  

Read More

Flash or HDD for the Best Price/Performance?

Flash or HDD for the Best Price/Performance?

Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server virtualization has further contributed to this situation. Server virtualization has been deployed in most enterprises and has delivered great benefits, including environmental and footprint savings, more efficient server utilization, and longer life for legacy applications. When the overall workload density increases on a single physical ...

Read More

posted by Torsten Volk   | May 8, 2013 | 0 Comments

Emerging monarch

Breaking News: Dell Acquires Enstratius to Further Complete Its Cloud Story Today, on May 6, 2013, Dell acquired Enstratius, a company aimed at deploying, automating and managing applications in complex hybrid cloud environments. Enstratius enforces governance and security in the cloud, offering automated scaling, disaster recovery and cloud bursting. The Enstratius solution supports all popular...

Read More »



posted by Jim Frey   | May 7, 2013 | 0 Comments

CAWorld_2013_300x190px

This year’s theme for CAWorld 2013 was “Go Big: IT with Impact.”  So I thought what the heck – let’s go big.  I stepped back and took a much broader look across the CA Technologies portfolio than I normally would.  Usually, I focus on the network management solutions, which live primarily within CA’s Service Assurance...

Read More »



posted by Tracy Corbo   | May 1, 2013 | 0 Comments

APIs_300x190

Long ago and far away I used to cover programming languages called 4GLs, which have long since been relegated to the technology graveyard. Nice idea, but took way too long to deploy. Since then I have moved over to cover networking, but I often miss the world of programming. I was lucky enough to be...

Read More »



posted by Torsten Volk   | April 22, 2013 | 0 Comments

Revolution_button_300x190

OpenStack’s huge momentum is undeniable. IBM, RedHat, NetApp, Rackspace, HP, Dell, Cisco, Intel and even VMware have committed significant funds and human resources to this project. But why would companies, that are otherwise competing rather fiercely, sit on one table to build an OpenSource cloud platform? The answer is certainly not “altruism”, as this is...

Read More »



posted by Tracy Corbo   | April 12, 2013 | 0 Comments

glass_maze_300x190

In recent months both Cisco and Juniper have been talking about Puppet. In February, Juniper announced an early adopter release of Puppet for Junos OS. At the Network Field Day event, Cisco demonstrated onePK + Puppet. When I hear Puppet, I think sys admin not network operator. Why then the growing buzz around Puppet and...

Read More »



arrows_opposite_directions_300x190px

In my last post, I talked about the frustration that enterprises have with the lack of integration among security tactics – an egregious gap attributable in no small way to the extremely fragmented nature of the IT security industry itself. I offered a few examples of approaches that seek to close these gaps and equip...

Read More »



puzzle_house-300x190

Almost one year into the discussion about the Software Defined Data Center (SDDC), it is time to take inventory of the state of the discipline. As a reminder, the ultimate goal of the SDDC is to abstract and centralize the management of compute, network, storage, operating systems, middleware and applications in order to dynamically place...

Read More »



Rooster

SDN does not spell doom and gloom for traditional networking vendors – that is just a lot of hype drummed up by some who have a different story to tell and who tend to come from datacenter centric mindsets.  Too often when something new and game changing comes along, folks are all too willing to...

Read More »



posted by John Myers   | February 27, 2013 | 0 Comments

Data_Management

As I review my series of #100linesOnBIDW blogs over the last couple of weeks, I found myself looking at the Data Management posting. I covered when to apply schemas, Big Data, and data governance. What I left out was technical implementation concepts for data management systems like row vs. column orientation; in-memory vs. spinning disk...

Read More »



4-puzzle_pieces

It’s that time of year again, when New Year’s prognostications give way to a similar level of noise about what to look for at the RSA Conference.  There are always recurring themes to the latter. There is always much talk of the latest attack, or class of attack, that will drive where security should go....

Read More »



Page 10 of 36« First...«89101112»2030...Last »