January 01, 2014

Decoding common virtual data storage terms
Sometimes we get carried away, and many times it's difficult to decipher virtual data storage terms, especially when you are comparing technologies or systems before a big purchasing decision. Just what is a "value-added, impactful solution" anyway? In this podcast, analyst firm Storage Switzerland LLC's senior analyst Eric Slack breaks down some common virtual data storage terms to help you decode sales and marketing gibberish and determine which technology and product is right for your environment.


Deadly Downtime: The Worst Network Outages Of 2013
No company is immune, no matter how sophisticated its technology. In 2013, some of the largest and most well-known technology companies in the world experienced downtime because of network failures. Companies such as Google, NASA, Facebook, Netflix, Twitter, and others all reported outages stemming from some problem in the network. Whether downtime is caused by a faulty piece of hardware, a software bug, a configuration error, or a denial-of-service attack, it causes the same response in customers, employees, users, and the IT professionals responsible for that network: Sheer panic.


Drake Baer: How To Create A Sustainable Culture Of Innovation
At Fast Company, Baer covers the intersection of psychology and work. He interviews the foremost minds in business for a living, including Clay Christensen, Nate Silver and Nassim Taleb. He also has a special interest in companies and bands on the brink of breaking big and the methods by which they do so. In this interview, he talks about why companies struggle with innovation, why leaders become irrelevant when they aren’t thinking forward, which companies are able to create sustainable innovation, sources of creativity and his career advice.


The security industry finds a dream enemy -- government spy agencies
The security industry has the enemy it always dreamed of to help it make the case for encryption adoption, but users looking to secure their data and communications need to be wary of claims made in marketing messages. Securing data in motion is the priority, experts say, and some large Internet firms are already making progress in this area, but encrypting data at rest without losing its usefulness will prove a greater challenge.


Rule Engine with Generic UI
A business rules engine works by separating execution code for business rules from the rest of the business process management system. This allows the end user to change business rules without having to ask a programmer for help. When a change is made, the engine will evaluate the change's effect on other rules in the system and flag the user if there is a conflict. Generic UI engine is a UI components that are common to various kinds of User Interfaces. That means: having generic UI Components that can be accessed using common Interfaces. Generic UI engine can be mapped to custom rule engine.


Enterprise mobility management: Embracing BYOD through secure app and data delivery
Given the paramount importance of security in IT’s mission, the natural instinct may be to try to limit peoples’ choice of devices or otherwise constrain the endpoint environment, even if it means sacrificing the benefits of greater productivity and flexibility. But simply barring the door to consumer device usage and BYOD is neither realistic nor desirable—it is inevitable that IT will face increasing pressure to provide access to any kind of app, anywhere, on any type of device. Simply put, IT has no choice but to enable and support consumer devices and BYOD; the only remaining question is how.


Four SSD best practices for efficient virtual machine storage
When solving the IOPS problem, IT managers have the choice of either server-side flash (basically, cache) or storage-side solid-state drives (SSDs). Either choice can deliver thousands or tens of thousands of IOPS (depending upon quantity) but they are not interchangeable; this is where the issue of latency comes in. Server-side flash has no more latency than other system cache, assuming the data is flash-resident -- meaning the data accessing the flash has to reside on the server as the flash does. If the system has to issue a read command to the hard disk drive (HDD), then there is no benefit to flash.


5 IT Hiring Trends In 2014
In a survey of 860 tech-focused hiring managers and recruiters, 73% reported planning to hire more candidates in the next six months, and 24% percent said their additional hiring will be substantial. That's good news for anyone looking to make a change in 2014. But expect the IT landscape to change, too. Here's a look at five predictions on hot skills, evolving roles, and how social media will change recruiting.


U.S. Struggles to Keep Pace in Delivering Broadband Service
The Obama administration effectively agrees. “While this country has made tremendous progress investing in and delivering high-speed broadband to an unprecedented number of Americans, significant areas for improvement remain,” said Tom Power, deputy chief technology officer for telecommunications at the White House. The disagreement comes over how far behind the United States really is in what many people consider as basic a utility as water and electricity — and how much it will affect the nation’s technological competitiveness over the next decade.


How the Financial Services Industry Should Use Big Data to Regain Trust
Analysing the usage of the many products that financial services firms have explains a lot about the behaviour of the customers. Although banks do not do this, or at least they say they do not do it, they have the possibility to understand customers better than customers understand themselves. The payment information explains a lot about customers. For that reason, when payment provider Equens (the largest pan-European payment processor) decided to sell the transaction data lot of negative reactions appeared and Equens had to withdraw their plan.



Quote for the day:

"All our final decisions are made in a state of mind that is not going to last." -- Marcel Proust