SDN essentials: Why network orchestration and virtualization?
SDN orchestration tools have emerged from startup Anuta Networks and Alcatel-Lucent's Nuage Networks. These tools target cloud providers that need to automate the creation of network services for their customers, although each company attacks the problem in a different way. Anuta's solution focuses on working with the network infrastructure many providers already have in place, while Nuage introduces a distributed software router and overlay network to create multi-tenant friendly network containers.
The PoSh DBA - Reading and Filtering Errors
Both the SQL Server Error Log and the Event Viewer are designed to be used via their respective graphic user interface. This is fine for one or two servers, but painfully slow for the average DBA who has to read and filter information in many servers. Even when you’re focusing down on a problem with a single busy server, the added weight of the graphical tool in terms of resources can slow troubleshooting down considerably. It is very important in the day-to-day life of a DBA to have a mechanism to read and filter error messages quickly and unintrusively; a technique for "mining errors".
E-book: IAM for the Real World: Simplifying Complexity
The world of identity and access management (IAM) is one of constant change, shrinking deadlines, minuscule budgets, overtaxed staff and unmerciful regulations. Unfortunately, the historical approach to IAM involves piecing together “half solutions,” in hope that tomorrow’s solutions will address real-world needs. The e-book “IAM for the Real World: Simplifying Complexity” evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the IAM challenges you face.
The smartest cars may need 5G, Ericsson says
Connected to a 5G network, cars could warn drivers of an impending collision or even be guided through traffic automatically with no driver behind the wheel, Ewaldsson said. Demonstrations at CES showed off both of those types of capabilities. But making those kinds of services work would require guaranteed performance all the way from the cloud that runs the service to the car, and back again. "The networks that we have today have nowhere near that quality-of-service guarantee," Ewaldsson said.
Which mobile cloud approach is right for your company?
Most companies are still trying to find the appropriate mobile cloud computing strategy to make sure their employees are more productive and their data (and their customers' data) is secure. Doing so could mean that remote workers have a combination of mobile apps, remote access to other systems and secure email, for example. Business leaders and IT managers need to think about their enterprise architecture and how to make their employees more productive in the mobile era.
The 24 most exciting new gadgets coming soon
CES has come and gone: we now have a long list of new and notable products coming in 2014. What follows are the ones we're most looking forward to. Let's start by stating the obvious: in 2014, we're going to see a lot of "sequel" products building on the success -- or attempting to fix the shortfalls -- of their predecessors. We've broken out some of the more notable ones on the pages that follow. This story was originally published on January 1, 2014, and has been updated extensively with additional products announced at CES 2014.
Build big data adaptability through rapid experimentation
Adaptable organizations experiment rapidly with their offerings (products, services, and relationships) and build strong discovery capabilities. There's no better way to accelerate discovery than to embrace big data in your strategy -- the key is to attack this with purpose and vigor. To dramatically increase adaptability, you must build an organization that experiments in a big data fashion: with high volume, velocity, and variety.
What Executives Should Know About Open Data
Not all data that’s valuable is internal and proprietary. New initiatives by governments as diverse as those of the United States, Mexico, and Singapore are opening the spigots of readily usable public data. Corporate information too is becoming more “liquid,” moving across the economy as companies begin sharing data with their business partners and, sometimes, consumers. Also surging is the richness of the information from data aggregators, which are assembling, rendering anonymous, and selling (to interested third parties) a wide range of data flows.
Rapid Diffusion of New Technologies Stumps IT Managers
IT managers allowing these technologies to enter the workplace must also take into consideration wireless security. Currently, emerging technologies use either their own WiFi capability to connect to a network or Bluetooth to tether themselves to a tablet or smartphone to access the Internet via a 3G/4G network. There are several issues to consider; the first is using public, unsecured networks. As these devices become more widely deployed they will be a target for the cybercriminal community just like today’s mobile devices.
Considering Going Remote? Here’s What Managers Need to Know
Telecommuting comes with challenges. From a manager’s perspective, there can be security concerns about sensitive company data on a remote device. Remote employees can burn out more easily as they work longer than they would have if they were in the office, research shows. Working from home can also be isolating and lonely. “The worst part about being remote is the feeling of being disconnected. We always wonder if we’re doing OK, if we’re remembered, if we’re sufficiently connected to the home office,” said Scott Hanselman, a programmer at Microsoft who works remotely.
Quote for the day:
"Successful people make the right decisions early and manage those decisions daily." -- John Maxwell
SDN orchestration tools have emerged from startup Anuta Networks and Alcatel-Lucent's Nuage Networks. These tools target cloud providers that need to automate the creation of network services for their customers, although each company attacks the problem in a different way. Anuta's solution focuses on working with the network infrastructure many providers already have in place, while Nuage introduces a distributed software router and overlay network to create multi-tenant friendly network containers.
Both the SQL Server Error Log and the Event Viewer are designed to be used via their respective graphic user interface. This is fine for one or two servers, but painfully slow for the average DBA who has to read and filter information in many servers. Even when you’re focusing down on a problem with a single busy server, the added weight of the graphical tool in terms of resources can slow troubleshooting down considerably. It is very important in the day-to-day life of a DBA to have a mechanism to read and filter error messages quickly and unintrusively; a technique for "mining errors".
E-book: IAM for the Real World: Simplifying Complexity
The world of identity and access management (IAM) is one of constant change, shrinking deadlines, minuscule budgets, overtaxed staff and unmerciful regulations. Unfortunately, the historical approach to IAM involves piecing together “half solutions,” in hope that tomorrow’s solutions will address real-world needs. The e-book “IAM for the Real World: Simplifying Complexity” evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the IAM challenges you face.
The smartest cars may need 5G, Ericsson says
Connected to a 5G network, cars could warn drivers of an impending collision or even be guided through traffic automatically with no driver behind the wheel, Ewaldsson said. Demonstrations at CES showed off both of those types of capabilities. But making those kinds of services work would require guaranteed performance all the way from the cloud that runs the service to the car, and back again. "The networks that we have today have nowhere near that quality-of-service guarantee," Ewaldsson said.
Which mobile cloud approach is right for your company?
Most companies are still trying to find the appropriate mobile cloud computing strategy to make sure their employees are more productive and their data (and their customers' data) is secure. Doing so could mean that remote workers have a combination of mobile apps, remote access to other systems and secure email, for example. Business leaders and IT managers need to think about their enterprise architecture and how to make their employees more productive in the mobile era.
The 24 most exciting new gadgets coming soon
CES has come and gone: we now have a long list of new and notable products coming in 2014. What follows are the ones we're most looking forward to. Let's start by stating the obvious: in 2014, we're going to see a lot of "sequel" products building on the success -- or attempting to fix the shortfalls -- of their predecessors. We've broken out some of the more notable ones on the pages that follow. This story was originally published on January 1, 2014, and has been updated extensively with additional products announced at CES 2014.
Build big data adaptability through rapid experimentation
Adaptable organizations experiment rapidly with their offerings (products, services, and relationships) and build strong discovery capabilities. There's no better way to accelerate discovery than to embrace big data in your strategy -- the key is to attack this with purpose and vigor. To dramatically increase adaptability, you must build an organization that experiments in a big data fashion: with high volume, velocity, and variety.
What Executives Should Know About Open Data
Not all data that’s valuable is internal and proprietary. New initiatives by governments as diverse as those of the United States, Mexico, and Singapore are opening the spigots of readily usable public data. Corporate information too is becoming more “liquid,” moving across the economy as companies begin sharing data with their business partners and, sometimes, consumers. Also surging is the richness of the information from data aggregators, which are assembling, rendering anonymous, and selling (to interested third parties) a wide range of data flows.
Rapid Diffusion of New Technologies Stumps IT Managers
IT managers allowing these technologies to enter the workplace must also take into consideration wireless security. Currently, emerging technologies use either their own WiFi capability to connect to a network or Bluetooth to tether themselves to a tablet or smartphone to access the Internet via a 3G/4G network. There are several issues to consider; the first is using public, unsecured networks. As these devices become more widely deployed they will be a target for the cybercriminal community just like today’s mobile devices.
Considering Going Remote? Here’s What Managers Need to Know
Telecommuting comes with challenges. From a manager’s perspective, there can be security concerns about sensitive company data on a remote device. Remote employees can burn out more easily as they work longer than they would have if they were in the office, research shows. Working from home can also be isolating and lonely. “The worst part about being remote is the feeling of being disconnected. We always wonder if we’re doing OK, if we’re remembered, if we’re sufficiently connected to the home office,” said Scott Hanselman, a programmer at Microsoft who works remotely.
Quote for the day:
"Successful people make the right decisions early and manage those decisions daily." -- John Maxwell
No comments:
Post a Comment