PLUMgrid, a provider of software-defined networking for OpenStack, recently announced the availability of CloudApex, an SDN visualization and monitoring platform for its overlay network virtualization system PLUMgrid Open Networking Suite (ONS). PLUMgrid’s focus on usability for operators will help address a gap by providing an easy-to-use management console for OpenStack networking operators. Since it is still in technical preview stage, PLUMgrid can benefit by evolving its user interface through usability testing, but this user interface already helps to demonstrate the benefits of its IO Visor technology in a highly consumable manner.
ESG recently surveyed 202 senior IT decision makers at organizations that currently purchase from Dell and/or EMC Federation companies. This research found that customers are overwhelmingly positive about the possibility of a combined Dell-EMC, with 75% of respondents indicating that they view this pending merger of tech titans as a positive development for their firm.
Under pressure resulting from years (and in some cases decades) of digital capacity growth, many IT organizations are seeking alternatives to manage unstructured data volumes. ESG research reveals that in many cases, IT organizations are looking toward object storage solutions as a potential remedy. What expected benefits are driving this interest and how do organizations expect object storage to impact NAS storage footprints?
Red Hat and Black Duck Software announced in October 2015 that they are collaborating around the delivery of secure, compliance, and certified container images. We see this as a win-win for both vendors. Black Duck gains validation of its automated software solution and visibility across Red Hat’s customer base and ISV ecosystem. Red Hat gains an industrial-strength way to certify open source Docker images from a security, compliance, and operational standpoint. As a next step, both vendors need to move beyond a simple collaboration and create a more seamless way for ISVs, developers, and end-user enterprises to produce and consume images that are trusted, compliant, and certified from an operational standpoint.
IBM recently announced the IBM Bluemix Garage Method, a full lifecycle approach to developing, deploying, and managing applications. The Bluemix Garage Method is a modern comprehensive approach to the software development lifecycle (SDLC) that employs agile methods, is environment independent, and emphasizes the importance of great design and continuous process improvement. This method has been well vetted within IBM but it will be important for IBM to demonstrate adoption across a broad range of enterprises, especially those with a significant investment in legacy IT assets.
VMware offers professional services for operations transformation to augment its traditional technology delivery and strategic advisory services. VMware’s focus on operations transformation is critical for adopting new IT service delivery models. VMware needs to make this model available to its services partners to enable wider reach.
At least four different kinds of data protection appliances (DPAs) exist, with even more “flavor” categories still on the horizon. Some DPAs are meant to be turnkey solutions for providing business and recovery agility. Others are meant to radically improve the efficiency of protection processes that an organization already has in place. All four types have relevance in today’s IT landscape … but there’s an art to figuring out which type is going to be best-suited to satisfying a particular organization’s protection goals.
As the adoption of cloud services continues to grow, and more corporate data is moving off-premises, securing data assets is becoming increasingly challenging. The reality of “shadow IT,” where users take a self-service approach to file sharing, messaging, and other apps, has created a dilemma for corporate IT—how to play the role of enabler, not preventer, while gaining a level of governance by establishing the right security controls to mitigate risk. Organizations seeking a solution to gain visibility into shadow IT apps, connect users with IT-approved apps, and protect those apps and the associated data from compromise may want to investigate IBM Cloud Security Enforcer, which incorporates identity and access management and threat intelligence into a cloud access security broker (CASB) offering.
Dell recently announced new campus and data center network solutions with the C9010 Networking Director and the companion C1048 Rapid Access Node forming the basis of the campus architecture, and the S6100-ON open networking data center switch. Dell Networking continues with its philosophy that is consistent with the rest of the Dell portfolio—and that is to offer choice. In support, Dell provides a variety of port speeds and Open Networking-enabled devices for its on-rack data center switches. Dell needs to continue providing clear guidance about how to get support when deploying these choices.
Despite considerable confusion across the industry around the actual definition of the term software-defined storage (SDS), IT organizations find themselves enticed by the potential benefits the technology offers. Indeed, ESG research reveals that many IT organizations have SDS on their short-term storage architecture roadmaps, especially those with larger and more complex environments. What is driving this early interest—and in some cases, adoption—and how do organizations foresee implementing this alternative approach to traditional storage hardware-based functionality?