Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • June 30, 2015

    Open Networking Summit 2015 video

    In addition to my recent recap blog on the Open Networking Summit 2015, I recorded a brief video with my thoughts on the event. In the video, I describe some of the unexpected patterns I saw, such as the importance of services in the SD-WAN session I chaired or of network automation in the data center SDN session.

    Learn More


  • June 30, 2015

    SDS Was Already Here To Stay!

    Software-defined Storage (SDS) is an inescapable term right now...and looks to become an inescapable reality soon. That is, of course, if you buy into it as being something that's brand new and not already all around us. I just posted what I hope is a fun, insightful, and intentionally somewhat provocative ESG Video Capsule on just this contention. Please take a look—as with all our Video Capsules, it's under 140 seconds:

    Learn More


  • June 29, 2015

    Open Networking Summit 2015 recap

    I recently attended the Open Networking Summit in Santa Clara, CA. While there, I took part in several sessions, and below are the common themes I encountered in those sessions and how they may all fit together into a single narrative.

    Learn More


  • June 29, 2015

    NexGen to the Nth Degree (includes video)

    In thinking about when the founders of NexGen decided on their new company's name, one wonders whether, at the time, it was something of a placeholder—unless they were fortune-tellers as well as successful storage dudes that is! Since its founding in 2011, the company itself is on its fourth generation in as many years; and now, once more independent, finds itself well placed in what can be more generically called the next generation of storage arrays.

    Learn More


  • June 26, 2015

    Can Cisco's Intercloud Offering Deliver On Fast IT?

    Aesop, an ancient Greek storyteller, is credited with coining the expression, “slow but steady wins the race”. That ancient wisdom rings hollow in the present-day digital age, where the need for speed is essential to business survival.

    Learn More


  • June 22, 2015

    Group-based policy

    I've written an ESG brief on the Group-based policy, a open source project within OpenStack and OpenDaylight project that enables high level abstractions for controlling networks, although it can be generalized for compute, security, and storage. The brief is available to ESG subscription clients only, but I have summarized a few points below.

    Learn More


  • June 25, 2015

    Enterprises Need Advanced Incident Prevention

    Given the booming state of the cybersecurity market, industry rhetoric is at an all-time high. One of the more nonsensical infosec banalities goes something like this: Cybersecurity has always been anchored by incident prevention technologies like AV software, firewalls, and IDS/IPS systems, but sophisticated cyber-adversaries have become extremely adept at circumventing status quo security controls. Therefore, organizations should give up on prevention and focus all their attention on incident detection and response.

    Learn More


  • June 23, 2015

    Network Automation: More Than Scripting

    Automating rote network tasks isn't all script-driven. Network automation also can mean intelligent control and policy-based networking.

    Learn More


  • June 22, 2015

    Malware? Cyber-crime? Call the ICOPs!

    To fully understand the state of cybersecurity at enterprise organizations, it’s worthwhile to review a bit of history. In the early days of Internet connectivity, information security was viewed as a necessary evil, so enterprise security budgets tended to be pretty stingy. CEOs didn’t want good security, they wanted “good enough” security, so they were only willing to provide minimal funding.

    Learn More


  • June 19, 2015

    A More Focused Hadoop Summit

    Last week 4,000 fine people gathered in San Jose for the Hadoop Summit. Hosted by Hortonworks, but largely non-denominational, the event showcased the broader ecosystem of Hadoop, big data, and analytics. Despite the wide variety of approaches, the attendees were clearly focused on finding the value and learning practical techniques to be successful. Less hype, more tech.

    Learn More



More Results: