Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Application Development & Deployment Truths||The Bigger Truth||Insecure About Security|
|Cloud Computing Truths||Big Data, the Universe, and Everything||IT Artillery|
|Data Management & Analytics Truths||The Business of Storage||IT Depends|
|Data Protection Truths||Channeling IT||Liquefying IT|
|Information Security Truths||Decoding Development and Developers||Technical Optimist|
|Networking Truths||ESG Lab Blog|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
Here’s a scenario we’ve all encountered: You go to a nice restaurant to enjoy a meal and the whole experience turns sour. The service is terrible, your entrée arrives before your salad, and your food is overcooked and virtually inedible.
The 2015 edition of IBM’s Edge conference recently took place in Las Vegas. While it lacked some of the showbiz sheen of other big industry events, the feeling of being at a cult reunion was just as strong; and any lack of hype was more than balanced by the focus on links to real world business/societal outcomes that permeated everything.
Have you ever seen the movie, Pacific Rim? As a fan of Guillermo del Toro and of science fiction in general, the movie was right up my alley. And with a 72% from Rotten Tomatoes, I am not alone. But what does this movie have to do with information technology and/or enterprise data storage? Hang on a second and I will get to that, but first let me set the stage for any reader who hasn’t seen the movie.
Earlier this month, Dell announced enhancements to its DR series of deduplication appliances. Deduplication appliances continue to be a common method of improving one’s overall data protection infrastructure since they can typically be added to whatever backup/archive software or method that you already have, while near immediately reducing the storage consumed in secondary copies.
Included with this blog post is fifth in a series of seven videos that talk about the key findings from ESG’s recently published research report, Next-generation Storage Architectures. I collaborated with my colleagues Mark Peters and Scott Sinclair on the research. In this segment, I talk about one of the key, next-generation storage architectures: solid-state storage.
I attended the NFV World Congress, and I found the continuation of the increased intersection between Enterprise and Telecom Carrier Ecosystems. Traditionally, the world of telecom has been about signaling, switching circuits, radios, and the like. The introduction of NFV (network functions virtualization) had nudged the telecom world closer to the land of data center networking and cloud computing.
This weekend, I decided to fully embrace the cloud by getting rid of my last "production IT resource" in my Dallas office—a file server. This is not complicated, right? It is currently a 2TB VM with less than a dozen file shares on it and serving 3-5 users with various permissions to the shares. That is a configuration that anyone who has ever spun up a copy of Windows Server OS could do in less than an hour—but can you do it in the cloud? Not as easily as you might think.
Enterprise organizations benefit by monitoring user activity and improving identity and access management (IAM) processes.
Cybersecurity systems suffer from compartmentalization. Vulnerability management systems know which software revisions are installed on which systems, but have no idea how endpoints and servers are connected together. Similarly, an anti-malware gateway can perform static and dynamic analysis on a suspicious file but doesn’t know if a user downloaded analogous malware when she was connected to the Internet on a public network.
Last week, ESG Senior Analyst Terri McClure and I were at Citrix's Synergy event in Orlando to see the developments and announcements on enterprise mobility. Both of us were active on Twitter throughout the event, so our best recap comes by way of Storify: