IDG Contributor Network: Getting data center managers & C-Suite on the same page for DCIM implementation

In any enterprise – large and small – bottom-line ROI is arguably the biggest factor driving business decisions. Whether switching from PCs to Macs, investing in new travel and expense management software or integrating data center solutions, every business unit, from HR to sales and IT, must prove the value that new processes and offerings will have on the enterprises’ bottom line. The problem? Getting buy-in from all business groups, from the C-Suite on down, can be a serious undertaking often halting or ceasing potential implementation. When it comes to the data center, no one knows this better than data center managers who must work tirelessly with C-Suite to showcase the value and benefits of next generations data center software solutions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Getting data center managers & C-Suite on the same page for DCIM implementation

In any enterprise – large and small – bottom-line ROI is arguably the biggest factor driving business decisions. Whether switching from PCs to Macs, investing in new travel and expense management software or integrating data center solutions, every business unit, from HR to sales and IT, must prove the value that new processes and offerings will have on the enterprises’ bottom line. The problem? Getting buy-in from all business groups, from the C-Suite on down, can be a serious undertaking often halting or ceasing potential implementation. When it comes to the data center, no one knows this better than data center managers who must work tirelessly with C-Suite to showcase the value and benefits of next generations data center software solutions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Getting data center managers & C-Suite on the same page for DCIM implementation

In any enterprise – large and small – bottom-line ROI is arguably the biggest factor driving business decisions. Whether switching from PCs to Macs, investing in new travel and expense management software or integrating data center solutions, every business unit, from HR to sales and IT, must prove the value that new processes and offerings will have on the enterprises’ bottom line. The problem? Getting buy-in from all business groups, from the C-Suite on down, can be a serious undertaking often halting or ceasing potential implementation. When it comes to the data center, no one knows this better than data center managers who must work tirelessly with C-Suite to showcase the value and benefits of next generations data center software solutions.To read this article in full or to leave a comment, please click here

Docker features for handling Container’s death and resurrection

Docker containers provides an isolated sandbox for the containerized program to execute. One-shot containers accomplishes a particular task and stops. Long running containers runs for an indefinite period till it either gets stopped by the user or when the root process inside container crashes. It is necessary to gracefully handle container’s death and to make … Continue reading Docker features for handling Container’s death and resurrection

Why that “file-copy” forensics of DNC hack is wrong

People keep asking me about this story about how forensics "experts" have found proof the DNC hack was an inside job, because files were copied at 22-megabytes-per-second, faster than is reasonable for Internet connections.

This story is bogus.

Yes, the forensics is correct that at some point, files were copied at 22-mBps. But there's no evidence this was the point at Internet transfer out of the DNC.

One point might from one computer to another within the DNC. Indeed, as someone experienced doing this sort of hack, it's almost certain that at some point, such a copy happened. The computers you are able to hack into are rarely the computers that have the data you want. Instead, you have to copy the data from other computers to the hacked computer, and then exfiltrate the data out of the hacked computer.

Another point might have been from one computer to another within the hacker's own network, after the data was stolen. As a hacker, I can tell you that I frequently do this. Indeed, as this story points out, the timestamps of the file shows that the 22-mBps copy happened months after the hack was detected.

If the 22-mBps was Continue reading

3 real-world examples of IoT rolled out in the enterprise

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

The Ironic – And Fleeting – Volatility In NVM Storage

There is no question any longer that flash memory has found its place – in fact, many places – in the datacenter, even though the debate is still raging about when or if solid state memory will eventually replace disk drives in all datacenters of the world.

Sometime between tomorrow and never is a good guess.

Flash is still a hot commodity, so much so that the slower-than-expected transition to 3D NAND has caused a shortage in supply that is driving up the price of enterprise-grade flash – unfortunately at the same time that memory makers are having trouble cranking

The Ironic – And Fleeting – Volatility In NVM Storage was written by Timothy Prickett Morgan at The Next Platform.

When Agility Outweighs Cost for Big Cloud Operations

If anything has become clear over the last several years of watching infrastructure and application trends among SaaS-businesses, it is that nothing is as simple as it seems. Even relatively straightforward services, like transactional email processing, have some hidden layers of complexity, which tends to equal cost.

For most businesses providing web-based services, the solution for complexity was found by offloading infrastructure concerns to the public cloud. This provided geographic availability, pricing flexibility, and development agility, but not all web companies went the cloud route out of the gate. Consider SendGrid, which pushes out over 30 billion emails per month.

When Agility Outweighs Cost for Big Cloud Operations was written by Nicole Hemsoth at The Next Platform.

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here