Simplify with Software Defined Storage

Simplify with Software Defined Storage

There was a time at the height of my home video and audio craze that the number of devices I needed to watch a movie could no longer be counted on one hand. Amplifier, preamplifier, tuner, CD player, DVD player, TV, cable box . . .you get the idea. As I organized my vast array of remote controls on the coffee table, I was blissfully unaware of any issues. That was the case until my wife just wanted to watch a movie one night while I was gone, and she had a conniption fit trying to figure everything out. There ...

Read More

F5 Takes on Policy Orchestration, SDN

F5 Takes on Policy Orchestration, SDN

Jim Frey contributed to this blog post. On Wednesday, August 6, 2014, F5 Networks held an analyst summit at the company’s tech center in NYC. It was a great opportunity to catch up and see what was new and where the company is headed. The company appears to be enjoying a bit of a renaissance, looking to redefine its role in the data center as virtualization makes headway into the network domain under the banner of SDN. While true production SDN remains in its infancy, with no single approach emerging to solve all the ills of the network world, there is ...

Read More

Return on Investment (ROI) of Data Science as a Service

Return on Investment (ROI) of Data Science as a Service

In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes are very fun to experience, and you can mitigate the risks with preparation, practice, and a really good skiing helmet. Data science is one of those “high risk/high reward” concepts in technology. An organization can gain huge financial rewards by being able to create competitive advantage ...

Read More

posted by Torsten Volk   | February 8, 2012 | 0 Comments

iStock_000015096562XSmall-300x261

Why pay $1,500 per virtual desktop, if you can have a physical machine of the same performance-level at half the cost. While the functional and maintenance advantages of virtual desktop computing are evident, the per machine CAPEX often is the key stumbling block for this type of project. It is very hard to convince your...

Read More »



Legal-Tech-New-York-2012-287x300

My introduction to LegalTech New York 2012 (LTNY) began not with last Monday morning’s keynote session but with a chance meeting, over the paper recycling bin, with a recently hired CIO of a mid-size national law firm who, like me, was unburdening himself of extraneous event announcements and other unwanted sheaves of written materials prior...

Read More »



posted by Tracy Corbo   | February 7, 2012 | 0 Comments
On September 6, Nicira, a startup network virtualization company, unveiled its Network Virtualization Platform (NVP). NVP is a software-based system that creates a distributed virtual network infrastructure in cloud data centers that is completely decoupled and independent from physical network hardware. Nicira has announced that well known entities such as AT&T, eBay, Fidelity Investments, NTT...

Read More »



posted by Shawn Rogers   | February 6, 2012 | 0 Comments

Virtual_Data

As we move into 2012 analytics and business intelligence continue to be top of mind for C-level executives. Discovering new ways to leverage our existing systems coupled with the need to access new and dynamic data sources has exposed a lack of flexibility in traditional data management infrastructures. This lack of agility curtails innovation and...

Read More »



Another report of a breach at a technology vendor much of the industry depends upon for security and trust; this time, Verisign. The most immediate concern about this incident was that the attacks in question occurred in 2010, and were not widely known until Reuters discovered the disclosure in the company’s reporting as required to...

Read More »



posted by Scott Crawford   | February 2, 2012 | 0 Comments

NoSharkJumping

There’s no question that the intersections of Big Data and security have grabbed a lot of attention in the year-plus since I’ve been blogging on this topic. Indeed, it seems that Big Data will be one of the major focus areas at the RSA Conference a month hence: I count at least three sessions and...

Read More »



posted by    | February 2, 2012 | 0 Comments

ManClipboard-cropped

So, I’ve implemented a couple CMDBs. One even before I’d heard of ITIL. We called it a metadata repository, but it was essentially a CMDB. Making the business case for such systems is never easy. ITIL and the various CMDB authors provide a number of what I call “motherhood and apple pie” justifications: Reduce downtime...

Read More »



posted by Tracy Corbo   | February 2, 2012 | 0 Comments
There is no question WAN optimization technology was a game changer. It took away a major pain point for the most popular and common protocols that suffered noticeable performance degradation over WAN connections. While the technology has been very successful in optimizing specific traffic types, there are others that have remained underserved, most notable are...

Read More »



posted by    | January 31, 2012 | 0 Comments
I’ve been reading Mastering the Unpredictable: How Adaptive Case Management will Revolutionize the Way That Knowledge Workers Get Things Done. This interesting book brings several current topics together, including complexity theory, business process management (BPM), and the evolving practices around knowledge work. Adaptive Case Management (ACM) argues that in knowledge work, processes need to be...

Read More »



iStock_000018680764XSmaller

At the beginning of this month, EMA analysts were asked for their predictions about what 2012 might bring. Responses spanned management solutions across applications, systems, network, security, services, assets, desktops, and mobile devices, as well as business intelligence and content management. The results were surprisingly cohesive, and as a whole reflected core requirements in analytics,...

Read More »



Page 17 of 34« First...10«1516171819»2030...Last »