SRM vs Stretched Cluster solution /cc @sakacc
I was reading this article by Chad Sakac on vSphere DR / HA, or in other words SRM versus Stretched (vMSC) solutions. I have presented on vSphere Metro Storage Cluster solutions at VMworld together...
View ArticleVote for the top virtualization Blogs / 2012 looking back!
Yes, it is that time of the year again… vSphere-land.com’s voting for the top virtualization blogs has started again. Of course I am hoping to end up somewhere at the top of the list again, but I...
View ArticleIntroducing startup PernixData – Out of stealth!
There are many startups out there that do something with storage these days. To be honest, many of them do the same thing and at times I wonder why on earth everyone focuses on the same segment and...
View ArticleRisk-Based Authentication: What’s Context Got to Do With It?
Contributed by Lauren Horaist, Senior Product Marketing Manager, RSA Identity and Data Protection Group I sometimes find myself making strange comparisons between real life and work life. One of...
View ArticleFrom Periphery To Center: The Evolution Of Vblocks
I make no apologies whatsoever. I am an unabashed fan of Vblocks: a converged IT infrastructure, produced and delivered by a converged entity (VCE), and consumed by converged IT organizations. I was...
View ArticleVMware View Infrastructure Resiliency whitepaper published
One of the white papers I worked on in 2012 when I was part of Technical Marketing was just published. This white paper is about VMware View infrastructure resiliency. It is a common question from...
View ArticleNext Generation Security Operations: The Breach Escalated
To continue with my series on the Next Generation of Security Operations, I want to look at how well the operations are positioned for the be-all, end-all of security – the actual Security Breach....
View ArticleHow to disable Datastore Heartbeating
I have had this question multiple times now, how do I disable datastore heartbeating? Personally, I don’t know why you would ever want to do this… but as multiple people have asked I figured I would...
View ArticleBuilding a Next Generation SOC – Using Intelligence to Find the Threats;...
In this edition of the RSA Speaking of Security Podcast, Tom Chmielarski, Practice Lead with RSA’s Advanced Cyber Defense consulting practice, talks about specific threat intelligence strategies that...
View ArticleIntroducing VMAX Cloud Edition
To this day, too many people still get hung up over the word "cloud" -- they dismiss it as merely marketing fluff, or an unpleasant flavor of vendor hype. To each their own, I say. However, if you're...
View ArticleHadoop Is Growing Up
For many, Hadoop has become much more than just an interesting data management technology -- it's starting to be seen as the potential strategic successor to the familiar relational database world....
View ArticleSAFECode Welcomes Howard Schmidt
Today, SAFECode announced the appointment of Howard Schmidt as its new Executive Director. At a time when Cybersecurity has become a top priority for governments in the US and around the world,...
View ArticleHow broken is security?
Last week Mandiant produced their report entitled ‘Mandiant APT1 report’ that was widely covered by global media and essentially exposed a ring in China allegedly responsible for APT attacks. To many,...
View ArticlevCloud ecosystem announcements at VMware Partner Exchange
It is has been a while since I wrote anything about vCloud Director itself… Primarily because I have been focused on other things within the vCloud Suite the last couple of months. This week various...
View ArticleEMC's VSPEX: A Winning Formula
One of the better stories of 2012 was the rapid adoption of EMC's VSPEX -- a relatively new solutions delivery model for EMC. Since there are so many different flavors of various pre-integrated...
View ArticleThe Collaboration Imperative
For some time now, we at RSA have been speaking about the essential role that collaboration has to play in effective security. It is not enough to collect and analyze information within your own...
View ArticleAn All Access Sweep – RSA Wins Big at SC Mag Awards
Another year, another RSA Conference, and the continued battle to keep companies and assets secure. Unfortunately each new week brings us stories of major US corporations compromised and growing...
View ArticleCalling IT Professionals: Addressing the Security Skills Gap
Art Coviello at RSA often refers to the skills gap in the number of Cyber security professionals in his keynotes. A UK National Audit Office report out today quotes it could take “up to 20 years to...
View ArticleFrom Databases To Dataclouds
I was fortunate to sit through a wonderful, thought-provoking session given by Charles Fan, who is now the SVP of storage, data and applications at VMware. I've known Charles through many roles over...
View ArticleInnovation and the Unexpected
In his introduction to the Innovation Sandbox at RSA Conference, Hugh Thompson remarked on the critical role that small companies have in driving innovation. That’s certainly true and it was great to...
View Article