Imanis Data focuses on big data backup and recovery

Imanis Data, formerly known as Talena, released version 3.0 of its eponymous backup and recovery platform last week with emphasis on supporting very large datasets that are being generated in the era of big data. The company notes that three out of four companies have experienced a data loss over the last year, which carries an average cost of $900,000 and weeks of downtime. With Imanis Data 3.0, the company claims its backup architecture backs up, recovers and replicates terabyte and petabyte-sized data sets up to 10 times faster than any other solution on the market, minimizing the impact of data loss by reducing costly days and weeks of downtime to minutes and hours and reducing secondary storage costs by up to 80%. To read this article in full or to leave a comment, please click here

50% off Prey for Xbox One and PlayStation 4 – Deal Alert

In Prey, you awaken aboard Talos I, a space station orbiting the moon in the year 2032. You are the key subject of an experiment meant to alter humanity forever – but things have gone terribly wrong. The space station has been overrun by hostile aliens and you are now being hunted. As you dig into the dark secrets of Talos I and your own past, you must survive using the tools found on the station, your wits, weapons, and mind-bending abilities. Right now you can get 50% off the listed price. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

What is GLBP and where GLBP should be used ?

GLBP stands for Gateway Load Balancing Protocol. In this article, I will explain where GLBP is used , where it shouldn’t be used with the topologies. GLBP is a Cisco preparatory protocol. In most networks, design requirements might be to use only standard based protocols. If that is the case, GLBP is not a standard […]

The post What is GLBP and where GLBP should be used ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Quick Reference to Common AWS CLI Commands

This post provides an extremely basic “quick reference” to some commonly-used AWS CLI commands. It’s not intended to be a deep dive, nor is it intended to serve as any sort of comprehensive reference (the AWS CLI docs nicely fill that need).

This post does make a couple of important assumptions:

  1. This post assumes you already have a basic understanding of the key AWS concepts and terminology, and therefore doesn’t provide any definitions or explanations of these concepts.

  2. This post assumes the AWS CLI is configured to output in JSON. (If you’re not familiar with JSON, see this introductory article.) If you’ve configured your AWS CLI installation to output in plain text, then you’ll need to adjust these commands accordingly.

I’ll update this post over time to add more “commonly-used” commands, since each reader’s definition of “commonly used” may be different based on the AWS services consumed.

To list SSH keypairs in your default region:

aws ec2 describe-key-pairs

To use jq to grab the name of the first SSH keypair returned:

aws ec2 describe-key-pairs | jq -r '.KeyPairs[0].KeyName'

To store the name of the first SSH keypair returned in a variable for use in later commands:

KEY_NAME=$(aws  Continue reading

IDG Contributor Network: Getting data center managers & C-Suite on the same page for DCIM implementation

In any enterprise – large and small – bottom-line ROI is arguably the biggest factor driving business decisions. Whether switching from PCs to Macs, investing in new travel and expense management software or integrating data center solutions, every business unit, from HR to sales and IT, must prove the value that new processes and offerings will have on the enterprises’ bottom line. The problem? Getting buy-in from all business groups, from the C-Suite on down, can be a serious undertaking often halting or ceasing potential implementation. When it comes to the data center, no one knows this better than data center managers who must work tirelessly with C-Suite to showcase the value and benefits of next generations data center software solutions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Getting data center managers & C-Suite on the same page for DCIM implementation

In any enterprise – large and small – bottom-line ROI is arguably the biggest factor driving business decisions. Whether switching from PCs to Macs, investing in new travel and expense management software or integrating data center solutions, every business unit, from HR to sales and IT, must prove the value that new processes and offerings will have on the enterprises’ bottom line. The problem? Getting buy-in from all business groups, from the C-Suite on down, can be a serious undertaking often halting or ceasing potential implementation. When it comes to the data center, no one knows this better than data center managers who must work tirelessly with C-Suite to showcase the value and benefits of next generations data center software solutions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Getting data center managers & C-Suite on the same page for DCIM implementation

In any enterprise – large and small – bottom-line ROI is arguably the biggest factor driving business decisions. Whether switching from PCs to Macs, investing in new travel and expense management software or integrating data center solutions, every business unit, from HR to sales and IT, must prove the value that new processes and offerings will have on the enterprises’ bottom line. The problem? Getting buy-in from all business groups, from the C-Suite on down, can be a serious undertaking often halting or ceasing potential implementation. When it comes to the data center, no one knows this better than data center managers who must work tirelessly with C-Suite to showcase the value and benefits of next generations data center software solutions.To read this article in full or to leave a comment, please click here

Docker features for handling Container’s death and resurrection

Docker containers provides an isolated sandbox for the containerized program to execute. One-shot containers accomplishes a particular task and stops. Long running containers runs for an indefinite period till it either gets stopped by the user or when the root process inside container crashes. It is necessary to gracefully handle container’s death and to make … Continue reading Docker features for handling Container’s death and resurrection

Why that “file-copy” forensics of DNC hack is wrong

People keep asking me about this story about how forensics "experts" have found proof the DNC hack was an inside job, because files were copied at 22-megabytes-per-second, faster than is reasonable for Internet connections.

This story is bogus.

Yes, the forensics is correct that at some point, files were copied at 22-mBps. But there's no evidence this was the point at Internet transfer out of the DNC.

One point might from one computer to another within the DNC. Indeed, as someone experienced doing this sort of hack, it's almost certain that at some point, such a copy happened. The computers you are able to hack into are rarely the computers that have the data you want. Instead, you have to copy the data from other computers to the hacked computer, and then exfiltrate the data out of the hacked computer.

Another point might have been from one computer to another within the hacker's own network, after the data was stolen. As a hacker, I can tell you that I frequently do this. Indeed, as this story points out, the timestamps of the file shows that the 22-mBps copy happened months after the hack was detected.

If the 22-mBps was Continue reading

3 real-world examples of IoT rolled out in the enterprise

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

The Ironic – And Fleeting – Volatility In NVM Storage

There is no question any longer that flash memory has found its place – in fact, many places – in the datacenter, even though the debate is still raging about when or if solid state memory will eventually replace disk drives in all datacenters of the world.

Sometime between tomorrow and never is a good guess.

Flash is still a hot commodity, so much so that the slower-than-expected transition to 3D NAND has caused a shortage in supply that is driving up the price of enterprise-grade flash – unfortunately at the same time that memory makers are having trouble cranking

The Ironic – And Fleeting – Volatility In NVM Storage was written by Timothy Prickett Morgan at The Next Platform.

When Agility Outweighs Cost for Big Cloud Operations

If anything has become clear over the last several years of watching infrastructure and application trends among SaaS-businesses, it is that nothing is as simple as it seems. Even relatively straightforward services, like transactional email processing, have some hidden layers of complexity, which tends to equal cost.

For most businesses providing web-based services, the solution for complexity was found by offloading infrastructure concerns to the public cloud. This provided geographic availability, pricing flexibility, and development agility, but not all web companies went the cloud route out of the gate. Consider SendGrid, which pushes out over 30 billion emails per month.

When Agility Outweighs Cost for Big Cloud Operations was written by Nicole Hemsoth at The Next Platform.