Welcome!


From the Blogosphere

From a cost perspective, the networking dialogue is dominated by CapEx. Acquisition costs for new networking gear have historically been tied to hardware, and despite the relatively recent rise of bare metal switching, networking hardware remains a high-stakes business. But SDN is chan...
Take a moment to consider the things we put up with on a daily basis because they have been understood and accepted as the status quo. Perhaps the old adage, “better the devil you know than the devil you don’t,” rings no truer than for traditional on-premise data storage systems. Sure,...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...
Like moving to IPv6, simply picking up your existing network architecture and moving it to a completely new one is not going to happen overnight. There will undoubtedly still be "traditional" networks hanging around even when SDN adoption is considered mainstream and fully mature. That...
While organizations spend the next few days and weeks patching OpenSSL vulnerabilities, the realization is setting in that we may never know the full extent of the damage caused by Heartbleed. Although Heartbleed was only announced in early April, it has actually been present in OpenS...
Appthority is an app risk management company with a Software-as-a-Service solution that analyzes mobile apps for hidden behaviors that pose privacy and security risks. Our main customers are large organizations and we provide them with the first all-in-one App Risk Management service t...
Last week was a crazy week for information security. That's probably also the understatement of the year. With the public exposure of Heartbleed, everyone was talking about what to do and how to do it to help customers and the Internet, in general, deal with the ramifications of such a...
This past weekend, like many of you, I started getting the blood curdling password resets from a bunch of OpenSSL affected sites. I also got a few emails from sites indicating that I had nothing to worry about. Bad news, good news. Probably the biggest security story thus far for 2014 ...
When I visit clients to talk about DevOps, I usually ask them what their monitoring strategy is. Too often, the answer I hear is "We use Nagios". I think Nagios is a great tool, but it sure is not a strategy. Nagios does a good job of monitoring infrastructure. It will alert you when y...
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
Despite claims that there exists (or will, look out!) a mythical "god box" for the enterprise data center, capable of performing every data center function imaginable, it remains, well, mythical. Efforts to effectively secure the data center and the applications it delivers therefore r...
The selfie that changed the world, or at least Twitter, has been in the news for the past month. On March 2, 2014, the infamous Oscar selfie of Ellen and her celebrity friends broke a record of 2 million retweets before midnight the same night. That record was previously set by Preside...
The industry often talks about how the data center perimeter is expanding,necessarily, due to technological shifts such as cloud and mobility and BYOD. But that isn't really the case. If you look closely, you'll see that the perimeter is actually shrinking, getting tighter and tighter...
The combination of cloud computing and big data is a match made in heaven. Big data requires a flexible compute environment, which can scale quickly and automatically to support massive amounts of data. Infrastructure clouds provide exactly that. But whenever cloud computing is discuss...
I am the CEO and founder of GovCloud Network, LLC. In a consultative role, I help companies develop and execute targeted media strategies via social media channels to over 1.5 million professionals across 20 industry verticals. With a specialty in cloud computing, we and our partners a...
When large enterprises move to a public infrastructure cloud (such as Amazon Web Services or others), it is a gradual, and often times, carefully measured process. Large enterprises strive for 100 percent certainty that the migration process will not impact the business; therefore, the...
"In Greek mythology, Atlas (/ˈætləs/; Ancient Greek: Ἄτλας) was the primordial Titan who held up the celestial sphere. He is also the titan of astronomy and navigation." (Wikipedia, Atlas) How apropos, then, that DNS should be much like the Atlas of the Internet, responsible for guidin...
Cobbling together point solutions provides tools, but doesn't promote the key collaborative intelligence integrated cloud-based unified security offers. Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the ...
Perhaps not as popular as its brothers and sisters I, P and S, Network-As-A-Service or NaaS has slowly started to appear in industry press, articles and presentations. While sometimes associated with a hypervisor based overlay solution, its definition is not very clear, which is not at...
A recent joint study from IDC and the National University of Singapore (NUS) predicts that companies around the globe will spend around $491 billion in 2014 for fixes and recovery from data breaches and malware. The sponsor, Microsoft, also noted that pirated software tweaked with inte...
One of the most common phrases heard when new technology is introduced is that it's going to "bridge the gap" between X and Y. X and Y are almost always one of three IT groups: development, operations and networking. And while that goal is admirable (and indeed there are techno-cultura...
I see and read a lot of IT articles almost demanding that organizations must do certain things to ensure that some piece of their infrastructure is secure, highly available, fault tolerant, agile, flexible, scalable, recoverable, cloud’able, whatever the silo needs or face the dire cir...
As "applications" continue to morph into what we once might have called "mashups" but no longer do because, well, SOA is officially dead, dontcha know, it is increasingly important for a variety of constituents within organizations - from business stakeholders to application owners to ...
What do you look for when you choose a Web hosting provider? These days, it seems difficult to compare the differences between each service, whether you’re talking about supported languages, databases or bandwidth. You might be tempted to pick the cheapest provider and plan in hopes of...
Continuous Testing provides a real-time, objective assessment of the business risks associated with an application under development. Applied uniformly, Continuous Testing allows both business and technical managers to make better trade-off decisions between release scope, time, and qu...
There are a few ‘The ______ of Our Lives’ out there: Days. Time. Moments. Love. They define who we are, where we’ve been and where we are going. And today, many of those days, times, moments and loves interact with applications. Both the apps we tap and the back end applications used t...
Once you learn the definition of shadow IT, it shouldn’t be too shocking to learn how widespread it is at companies large and small all over the world. I hate to assume, but the odds are, that you yourself have used a non-IT approved SaaS option for the same reason as everyone else, m...
It used to be called a business plan. But management-speak and a few decades of PC-fueled innovation changed that simplistic approach. Bill Gates famously entitled his first book The Road Ahead and although this didn’t officially help coin or endorse the phrase “roadmap,” it didn’t do...
Skyhigh Networks releases their second edition of the Cloud Adoption and Risk Report. As with the first edition of the report, the purpose of the report is to provide hard data on the actual use of cloud services within enterprises of all sizes. This report summarizes data from approxi...
Avalanche NEXT combines Spirent Avalanche's performance testing with Spirent Studio's threats and application emulation capabilities. It produces traffic with authentic payloads based on actual usage for realistic security, load and functional testing. It combines Spirent Avalanche's ...
Auconet is the next-generation IT Operations Management company delivering the global-enterprise-grade Business Infrastructure Control Solution – BICS. BICS is well suited for global enterprises with large complex heterogeneous networks. Further, BICS is the only next-generation solu...
Software is increasingly critical to an organization's competitiveness, but the applications being developed consistently meet business stakeholder expectations only 17% of the time. What's the problem...and what's the secret to ensuring that expectations are met?
In my last blog, I discussed how today’s Internet is vastly different than the Internet envisioned at the start of the net neutrality debate. As promised, I’d now like to get into some fictional examples that paint the picture of why this is such a polarizing topic for so many. Exampl...
Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overw...
Disaster recovery is about being able to get your business back up and running as quick as you can after the disaster happens. Throughout this series, my teammates have focused on the Infrastructure side of the house, servers, virtual machines, etc. You can see the full series here: D...
The cable companies and telcos who dominate the U.S. market for Internet access won a victory when they succeeded in having the heart of the FCC’s ruling on net neutrality struck down. Now, for the first time legally, those companies can both block content and offer fast lane services ...
The so-called Bring Your Own Device (BYOD) phenomenon has gone hand in hand with the consumerization of IT trend. Both of which sound like strangely disconcerting and confusing terms if taken out of context or presented to a layman or novice for the first time. Of course all we are ta...
I’ve been traveling the last few weeks shooting some videos for VMware PEX and RSA. When that happens, my browser tabs get crowded with the various stories I’m interested in but will read later. This time they all seemed to hover around Identity Theft. When I got home, in my awaiting p...
The Network Centric Operations Industry Consortium (NCOIC) has begun offering an open process that will enable governments, agencies and businesses to create and manage a secure, hybrid IT computing environment quickly and cost effectively. Known as the NCOIC Rapid Response Capability...
When considering the major benefits of modern cloud computing, the lower operational overhead of the cloud should be high on anyone’s list. But when it comes to sensitive data — such as healthcare, finance, retail or government data — security measures are needed to ensure privacy and ...