Limit a VM from an IOps perspective
Last couple of weeks I heard people either asking questions around how tot limit a VM from an IOps perspective or making comments that Storage IO Control (SIOC) allows you to limit VMs. As I pointed...
View ArticleCybersecurity@EMCworld 2013: Transforming the Trusted Cloud
In my earlier blogs on Transforming Security Analytics and Transforming Trust, I wrote about the strong focus we have on cybersecurity at this year’s EMCworld, previewing several of the sessions that...
View ArticleAn Intelligence-Driven SOC – Come See It
By Matthew Gardiner, Sr. Manager, RSA I just returned from a weeklong trip to Europe, where I contributed my voice to the wildly successful series of RSA Security Summits. With near unanimity in...
View ArticleAre Snaps Dead?
No, not really -- but a surprising number of IT shops have moved beyond simple snapshots towards continuous data protection -- a DVR-like model that allows recovery to any point in time, and not just...
View ArticleWhy Cloud Was So Darn Confusing
Many of us have watched trends wash over the industry landscape. Some come and go quickly; others make more substantive changes. I've had the unfortunate privilege of observing many different waves...
View ArticleThe Biggest Online Attack in the History of the Internet??
By Berk Veral, Senior Product Marketing Manager, RSA …And they did it, they managed to slow down the internet. Next thing you know, they will break it! I am referring to what’s been called “the...
View ArticleThe “Groove Theory of GRC” and its Postulates
Many moons ago, in a galaxy far far away, a theory emerged that would challenge the very existence of the universe. Okay, I may be a little dramatic here. It was actually in 2009, in Overland Park,...
View ArticleIncrease Storage IO Control logging level
I received this question today around how to increase the Storage IO Control logging level. I knew either Frank or I wrote about this in the past but I couldn’t find it… which made sense as it was...
View ArticleSecure Product Deployment: A Team Sport
Year after year, studies such as the Verizon Data Breach Investigation Report show software vulnerabilities and misconfiguration among the main data breach causes. At EMC, we operate under the...
View ArticleWhat is static overhead memory?
We had a discussion internally on static overhead memory. Coincidentally I spoke with Aashish Parikh from the DRS team on this topic a couple of weeks ago when I was in Palo Alto. Aashish is working...
View ArticleIntroducing EMC ViPR: A Breathtaking Approach To Software-Defined Storage
I'd like to think I have a pretty good capacity for approaching new technology concepts, internalizing them and explaining them effectively. Those capabilities were severely put to the test when I...
View ArticleIsilon's OneFS -- The Definition Of A Modern File System?
As part of the EMC World festivities, EMC's Isilon group is announcing a few new features available today -- as well as previewing their next release, dubbed Waikiki. Even with my obvious EMC bias, I...
View ArticleCybersecurity Takes Center Stage: Notes from EMCworld Day One
Cybersecurity has been visible in EMC keynotes before. Last year Pat Gelsinger spoke about the importance of security in VMware architecture, for example. But this year is the first time that security...
View ArticleTested / Supported / Certified by VMware? (caching / dr solutions)
Lately I have been receiving more and more questions around support for specific “hypervisor side” solutions. With that meaning, how VMware deals with solutions which are installed within the...
View ArticleThe Top 10 Gaps in Breach Readiness
Timothy R. Rand, Senior Manager, RSA Advanced Cyber Defense Practice – Americas The main goal of RSA’s Advanced Cyber Defense (ACD) practice is to help customers strengthen their overall cyber...
View ArticleSecurity Monitoring Use Cases with RSA Authentication Manager
Walter Goulet, Senior Practice Consultant/Identity and Data Protection, RSA Advanced Cyber Defense Services Organizations which deploy RSA Authentication Manager (SecurID) for enforcing two-factor...
View ArticleDRS not taking CPU Ready Time in to account? Need your help!
For years these rumors have been floating around that DRS does not take CPU Ready Time (%RDY) in to account when it comes load balancing the virtual infrastructure. Fact is that %RDY has always been a...
View ArticleThe Sea of Trust: Cloud, Big Data and Security at EMC World
In his #EMCworld keynote on Tuesday morning, Joe Tucci used the phrase “the sea of trust” to capture the pervasive role that security has to have in the success of the “third platform” of mobile,...
View ArticleEMC World 2013 -- The Tribe Is Strong
I can't remember how many EMC Worlds I've been to over the years. These days, I don't pay much attention to the metrics: number of attendees, number of sessions, etc. I'm far more interested in the...
View ArticlevSphere 5.1 Storage DRS Interoperability
A while back I did this article on Storage DRS Interoperability. I had questions last week about this so I figured I would write a new article which reflects the current state (vSphere 5.1). I also...
View Article