June 18, 2013

How To Analyze Performance, Capacity with Foglight
With Dell acquiring Quest, Quest Foglight and vKernel vOPS are now all Dell products. With these changes, all products have been rebranded with the Foglight for Virtualization name and is available in three editions; Free, Standard and Enterprise. The Free Edition is based on the same virtual appliance as the Standard Edition and allows you try the Standard version (with a single click) as you need more advanced functionality with no loss of historical performance statistics.

Samsung mass produces 1.4GBps PCIe flash cards for notebooks
"This allows the drive to read 500GB of data or 100 HD movies as large as 5GB in only six minutes, or 10 HD movies at 5GB in 36 seconds," the company claimed in a news release. "That is approximately seven times faster than a hard disk drive (which would need over 40 minutes for the same task), and more than 2.5 times faster than the fastest SATA SSD."

Making OUTER and CROSS APPLY work for you
This article will explain OUTER and CROSS APPLY and show you how to use them by means of sample code. OUTER and CROSS APPLY are unique to SQL Server so this article is intended for anybody using SQL in a SQL Server environment. It will also cover many examples of where you can use OUTER and CROSS APPLY and their pro's and con's.

NIST Cloud Computing - Security Reference Architecture
The purpose of this document is to define a NIST Cloud Computing Security Reference Architecture (NCC-SRA) – a framework that: identifies a core set of Security Componentsthat can be implemented in a Cloud Ecosystem to secure the environment, the operations, and the data migrated to the cloud; provides, for each Cloud Actor, the core set of Security Componentsthat fall under their responsibilities depending on the deployment and service models; ...

Microsoft Building Up Hyper-V Management Support for Linux and Unix Servers
The improvements that Microsoft is bringing with the new Hyper-V in Windows Server 2012 R2 also apply to managing Linux and Unix systems. Examples offered by Kelley included faster live migrations and network virtualization benefits. He also described dynamic memory support, the ability to dynamically resize VHDs and VHDXs, a new two-dimensional synthetic video driver and the ability to use replicas of Linux-based virtual machines (VMs) for disaster recovery.

Prism doesn't have CIOs in a panic -- yet
Many enterprises may be more concerned about industrial espionage than government spy agencies cracking their communications. But Prism should nonetheless serve as a clear wake-up call to CIOs and other IT executives, said Nick Selby, CEO of StreetCred Software and a risk management consultant who advises large organizations on industrial espionage and data breaches.

How to Comply with Security Standards for Health Care Applications
This article demonstrates how Visual Guard has been able to help meet the strict criteria of health regulations in the United States. It will look at why two major health care actors have integrated Visual Guard into their applications. Visual Guard combines authentication, permissions and auditing features in the same tool. A number of Visual Guard clients are public and private health care actors.

Chris Matts on BDD, Feature Injection and Commitment
The idea is that most of the time when business domain experts come and ask for something they very rarely tell you and express it in terms of the value they want, they often come up with a half-baked solution. What we actually want though is something which is a set of examples that can drive the Agile development process but driven by value. Feature injection has three very simple steps, first step is find the value, second step is inject the features, as we call it, and the third step is break the model.

Why Hadoop and Solr in DataStax Enterprise?
Today’s modern LOB applications have new data requirements that have proven to exceed the capabilities offered by legacy RDBMS’s. ... because the data requirements of modern applications are different today, the types of technology and data management vendors have also changed, both on the LOB and data warehouse sides. With this change has also come a change in technology regarding how analytics and search are handled in modern LOB and data warehouse systems.

U.S. and Russia sign pact to create communication link on cyber security
“We recognize that threats to or in the use of [computer technologies] include political-military and criminal threats, as well as threats of a terrorist nature, and are some of the most serious national and international security challenges we face in the 21st century,” President Obama and President Vladimir Putin said in the joint statement, issued by the White House.

Quote for the day:

"Fear will keep you alive in a war. Fear will keep you alive in business. There's nothing wrong with fear" -- Norman Schwarzkopf

No comments:

Post a Comment