While the federal government has mandated that nearly 40 percent (over 800) of its data centers be consolidated by 2015, the results of at least two recent studies indicate several concerns over the implications of the consolidation. According to the Federal Data Center Consolidation Initiative (FDCCI), federal government data centers quadrupled between 1998 and 2010, from 432 to 2,094, and on average, they have only been using 27 percent of their computing power. As a result, federal CIOs are looking to consolidate effectively without compromising data center management by embracing server virtualization, shifting to a “cloud first” policy, and through modular computing.
Brocade Hyper Edge Promises To Ease LAN Management
Brocade has announced a new initiative to simplify switch configuration and management. Called Hyper Edge, the initiative lets IT designate a master switch that can manage all the other switches on the LAN. Hyper Edge is a response to Cisco, Juniper and other vendors that are offering simplified management. Hyper Edge software creates a virtual stack of Brocade’s ICX and FCX switches, allowing IT to manage tens or hundreds of devices as a single logical unit. While Hyper Edge should be welcome news to Brocade customers, it won’t be available until Q1/2013.
Network Computing
Comments Off
Categories: General.
iOS Leaves Android in the Dust for HTML 5 Performance
The future of Web-based apps seems to be HTML5. As ubiquitous as it is on PCs, Adobe Flash has failed to catch on in the mobile world, and alternate solutions like Silverlight are too proprietary. A new report finds that iOS blows Android out of the water when it comes to HTML 5 performance.
Comments Off
Categories: General.
Dell Adds AppAssure to Its Storage Portfolio
Dell recently announced the acquisition of AppAssure, which it describes as a next-generation data protection solution, as it deals not only with physical IT assets, but also with virtual and cloud environments, as well. Dell plans to integrate the AppAssure software product with its Fluid Data architecture. AppAssure is the first acquisition that Dell has made since the creation of its new Software Group and will be part of its enterprise storage and software portfolio. This acquisition is another significant signpost that Dell is aggressively attacking the storage and storage management market, and the software market overall, more broadly.
Network Computing
Comments Off
Categories: General.
Modular Data Centers Best Suited For SMBs
The typical data center was designed for finicky mainframes, but in the age of robust virtualized servers–not to mention economic considerations–many organizations are opting to tweak the data centers they have, according to the InformationWeek Analytics State of the Data Center Survey. Many are considering new data center designs rather than dealing with the cost and difficulty of retrofitting an outdated facility, but while modular data centers are growing in popularity, and available from enterprise heavyweights like Cisco, HP, IBM and Oracle, they appear to be better suited for SMBs.
Network Computing
Comments Off
Categories: General.
Proofpoint Extends Data Protection To Box File-Sharing Cloud
Data protection vendor Proofpoint is using this week’s RSA Conference 2012 to announce it is partnering with the cloud-based file-sharing site Box.com to extend data protection to users of the popular service. Proofpoint already provides data protection as a service for a customer’s e-mail, Web and social media communications to prevent sensitive customer or company data from being exposed. Just like social media, employees are choosing themselves to use file-sharing sites to get their work done, and IT managers need to adapt, a Proofpoint executive says
Network Computing
Comments Off
Categories: General.
RSA Chief Tells Enterprises: Make Security And Privacy Protection Top Priorities
While RSA, EMC’s security division, has acknowledged it has a lot of work to do to repair its reputation after the 2011 hack attack that exposed information on 77 million customer accounts, the company says a new study shows a troubling lack of attention to security and privacy risks among directors and top executives at global 2000 companies. Presented at the RSA Conference 2012 in San Francisco, the study calls for companies to “establish a tone from the top” to make security and privacy protection top priorities.
Network Computing
Comments Off
Categories: General.
EMC Rolls Out 5 GRC-Centered Security Services
EMC’s consulting arm is introducing five security and risk management advisory services. “When you look at the services and the way we set this up, its very much a reflection of our need to provide our customers with end-to-end solutions… framed under the broader umbrella of GRC – governance, risk and compliance,” says Mat Allen, senior director, security and risk management global practice, EMC Consulting. “GRC acts as the center point.”
Network Computing
Comments Off
Categories: General.
Two More Stealthy Solid State Storage Startups
My last post discussed, or at least mentioned, all the startups, and re-startups, building storage system designed around flash memory that have made public announcements. Most startups spend the time they’re developing version 1.0 of their products in stealth mode so they can pop up fully formed like Athena from the skull of Zeus. We at DeepStorage have developed our own startup detection system that ferrets out those flying under the RADAR umbrella. Today we’ll look at a pair of stealth startups, XtremIO and Proximal Data.
Network Computing
Comments Off
Categories: General.
