Return to the The Data Chain website homepage


Archive for 2012

Data Wiping: A New Trend in Cyber Sabotage?

19 Dec 2012

Rob Rachwald & Tal Be'ery write: Yesterday, the Iranian CERT made an announcement about a new piece of malware that was designed to corrupt data. This malware joins the list of data corruption malware discovered in April, November and December 2012 – Wiper, Narilam and now GrooveMonitor respectively.

Read blog post

The top 5 Internet challenges for enterprises in 2013:

12 Dec 2012

Karl Barton, VP Sales of EMEA at Exinda writes: IT departments have a lot on their minds as they consider their requirements – and their budget -- for the coming year. As 2013 draws closer, one of the most pressing questions enterprises face is how to deal with the continued rise in both strategic and recreational Internet traffic as more and more high-bandwidth applications and P2P traffic cross the network.

Read blog post

To save on tape or disk, that is the question…

05 Dec 2012

Luc Gheysen, VP and General Manager, Imation Europe writes: Today’s small to medium-sized businesses (SMBs) are faced with two major challenges: cost and storage scalability. Unlike their larger counterparts, SMBs do not have access to the same IT resources and yet like any business, they still need to manage their own data and abide to regulatory compliance.

Read blog post

SaaSID is shortlisted as a Cloud Trailblazer and Security Trailblazer

30 Nov 2012

Ed Macnair, CEO of SaaSID writes: After many years of running businesses I know that there is a tipping point in every young company’s life when its idea suddenly catches on. After pitching to investors and prospects and setting up proofs of concept, things suddenly come together and you get that first big customer signed up, a major investor comes on board and people start sitting up and taking notice. Success breeds success.

Read blog post

What good is a snapshot in a continuously changing malware landscape?

27 Nov 2012

Leon Ward, UK Field Product Manager, Sourcefire writes: In my last article I wrote that advanced malware and targeted attacks are profoundly changing how we must protect our systems. It’s no longer enough to focus on visibility and blocking at the point of entry in order to protect systems. Attacks today have reached a new level of sophistication and outbreaks are inevitable. Like the infamous bank robber, Willie Sutton, who disguised himself as a mailman, a maintenance man, even a police officer to gain entry to targeted financial institutions and eluded captors for decades, modern malware can disguise itself as a legitimate application to evade defences. Later, when a breach occurs, you don’t know what you’re looking for. To contain and stop the damage, you need a broader approach to IT security that enables continuous visibility and control. Because once you “see it,” then you can “control it” and “protect it.”

Read blog post

Nominations Needed for a Data Center Hall of Fame

22 Nov 2012

Kevin Heslin from RF Code writes: 

It’s a question of leadership

I’m just back from the 7x24Exchange Fall meeting in Arizona, and I’ll admit to being very impressed by the program the organization put together. I found almost all the sessions to be very strong and right on target for the assembled group. I hope the survey results confirm my finding. Attendance was also very good, even considering that a number of familiar faces stayed east to deal with the aftermath of the superstorm. Still I find myself more concerned over the people and companies not in attendance: the companies and people who never attend 7x24Exchange events—or the events put together by AFCOM, DatacenterDynamics, Gartner, 451Research, or anyone else.

Read blog post

Your Money or Your Life?

14 Nov 2012

Tom Newton at Smoothwall writes: Such was the typical refrain of the 18th century Highwayman on stopping a stagecoach full of wealthy but ill-prepared travelers. We'd like to think we don't have to make that choice today, but information superhighwaymen (I can't believe I just wrote that) are asking us to do so, and more surprisingly, we consistently make the wrong choice.

Read blog post

Is it time to drop Dropbox?

14 Nov 2012

Mark Butcher, Commercial Director at Proact writes: The recent Dropbox security fiasco made it abundantly clear that businesses must be aware of potential security threats when employees are sharing files. In the case of Dropbox, hackers were able to access users’ accounts by simply stealing their usernames and passwords from other websites, and then using them to log into the service.

Read blog post

Welcome to the Era of Software Networking

05 Nov 2012

Ken Cheng at Brocade writes: Software defined networking is a disruptive technology that is creating an opportunity for Brocade to gain ground in important customer segments such as large enterprises, service providers, data center hosting providers, and cloud computing providers. Brocade has been pursuing this opportunity with an aggressive R&D roadmap that has already resulted in a number of innovation breakthroughs. For example, we were the first networking company to introduce support for OpenFlow technology at 100 Gigabit Ethernet performance and true “hybrid mode” support for OpenFlow that enables our customers to run this SDN technology concurrently over their production IP networks.

Read blog post

SaaSID selected as G-Cloud ii supplier

02 Nov 2012

Ed Macnair, CEO of SaaSID writes: “On 26th October we were delighted to announce that SaaSID has been selected as a Specialist Cloud Service supplier to G-Cloud.  This means that SaaSID Cloud Application Manager has been added to the UK government’s CloudStore and will be available to local and central government departments that are seeking a means of controlling and auditing the use of web applications.

Read blog post

Data Centre Solutions Diary Blog # 2: Staying Cool

01 Nov 2012

Dominic Philips, Managing Director, Datum writes: 

It’s not easy staying cool, especially when you are running a datacentre. All that heat being generated by the IT needs to be dissipated somehow, and the traditional approach of throwing air conditioning units at the problem is becoming less acceptable for a future proofed datacentre. CRC’s, or whatever format the next carbon tax comes in, add extra costs to profligate users of energy not to mention the demands of Clients Compliance teams and indeed the Marketing and PR departments, keen to avoid being seen to be an irresponsible user of precious power.

Read blog post

How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers

19 Oct 2012

Rob Sobers, Technical Manager from Varonis writes: Earlier this week, Keith Ng blogged about a massive security hole in the New Zealand Ministry of Social Development’s (MSD) network.  He was able to walk up to a public kiosk in the Work and Income office and—without cracking a password or planting a Trojan—immediately gain access to thousands upon thousands of  sensitive files.

Read blog post

SaaSID Executive Briefing

12 Oct 2012

Ed Macnair, CEO of SaaSID writes: On Tuesday 25th September, we held our inaugural Executive Briefing, to introduce SaaSID and our new product, Cloud Application Manager, to CISOs and CIOs from some of the largest organisations in the UK.

Read blog post

Data Centre Solutions Diary Blog # 1: A datacentre is born

11 Oct 2012

By Dominic Philips, Managing Director, Datum, writes: In this new series of blogs, we will take you on a virtual tour which we hope will provide some insight into the challenges we face in building both a new datacentre and a new business, and entering what some might say is already a crowded market. We will also try to demonstrate along the way how we hope to take advantage of new technologies and well as tried and tested ones.  

Read blog post

If content is King, then connectivity is Queen

01 Oct 2012

Will Pitt from Geo writes:If you were one of the 20 million people in the UK who watched Usain Bolt achieve the seemingly impossible on the evening of Sunday 5th August, or one of the 8 million who watched via the BBC website, (the more remarkable of the two statistics in my view, given that the previous record for viewing live content via the BBC website was 5.7m), you will be assured of a statement as old as television itself: Content is King. All 9.63 glorious seconds of it.

Read blog post

NYT Article: More digital media users mean more data centers (which affects the planet)

28 Sep 2012

Mark Harris writes: This past week an article was published by the New York Times which discussed the impacts of data centers upon the planet. It correctly pointed out that more converging digital age progress (like smartphones and tablets) begets more digital media users, which requires more information accessibility and more data center capacity. It goes on to say that this additional data center capacity consumes more energy, land and water and puts larger amounts of carbon in the air.

Read blog post

I/O Control for Social Gaming: Taming Traffic Spikes with ioMemory

25 Sep 2012

Chris Rosenquist writes:Social gaming infrastructure has to support peak traffic times, and ideally must control the anticipated viral surge, an event where performance can make or break a game. But out-of-control server sprawl stretches personnel and budget resources to their limits. The best solution to this problem is technology that scales up performance easily without the significant scale out that conventional systems require.

Read blog post

Red Hat's KVM Hypervisor Achieves Top Virtualization Performance Results with IBM

20 Sep 2012

Red Hat & IBM Performance Teams write: Red Hat is excited to announce today that the Kernel-based Virtual Machine (KVM) hypervisor, which is incorporated in both Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, has again achieved top performance results. This latest performance mark was achieved on the IBM® System x3850 X5 host server with Qlogic® QLE 256x Host Bus Adapters, Red Hat® Enterprise Linux® 6.3 hypervisor and Red Hat Enterprise Linux 6.3 guests. During testing by IBM, KVM demonstrated its ability to handle I/O rates at the storage performance levels required by enterprise workloads, with four guests handling more than 1.4 million I/Os per second (IOPS). The results are further proof that virtualized workloads can maintain consistent high performance as compared with baremetal deployments.

Read blog post

State of the Data Center Survey Reveals Increasing IT Complexity

17 Sep 2012

Danny Milrad writes: Few people would disagree with the statement that our world is becoming more complex, and this is especially apparent in the data center. With new technology being rapidly adopted, from mobile devices to cloud computing, businesses are struggling to integrate new solutions that promise increased productivity and cost-savings, while managing ever-growing amounts of information. In order to assess how well organizations are dealing with these changes, we developed the 2012 State of the Data Center Survey.

Read blog post

Postini Becomes Post-ini

13 Sep 2012

Peter Bauer, CEO of Mimecast writes: You’ve probably heard about Google’s decision to decommission the Postini service as we know it. It plans to migrate all users to Google Apps-based email security within the next few months.

Read blog post

Apple’s New iPhone and its anticipated impact on the enterprise user

13 Sep 2012

Mervyn Kelly, Ciena, the network specialist writes: Amid much fanfare, Apple has launched the iPhone 5 and CIO’s must now expect to face a barrage of employees who will want to get their hands on Apple’s latest and greatest device. Key to its enterprise focus is its new 4G LTE connectivity option. In offering ultra-high-speed mobile connectivity, the iPhone 5 has all the capabilities required to allow users to not only surf the web more efficiently, but at a faster speed, something that in the enterprise environment should have a direct and positive impact on mobile work efficiency.

Read blog post

Data Centres and connectivity – the fourth utility

03 Sep 2012

Chris Waters at Geo Networks writes: My previous two blog entries discussed the build or buy and power conundrums. Today I want to talk about ‘connectivity’ – the last component, and one which is often overlooked. Data centre operators and those thinking about building their own data centres might want to take note of this.

Read blog post

4G or not 4G… Superfast broadband in a mobile world

28 Aug 2012

Nick Ballard at Geo writes: So after many years of speculation, debate and bandwidth envy, there seems like a genuine chance that the UK will at last move forward and begin to catch up the rest of the technology world with the launch of 4G services in 2013.

Read blog post

From the Device to the Server: Google Wallet Simplifies Approach to Mobile Payments

22 Aug 2012

Jose Diaz, Technical and Strategic Business Development, Thales writes: Earlier this month, Google announced that consumers would have the ability to enlist their own financial card information onto their Google Wallet instead of waiting for their bank to board their card credentials. This approach supports the ‘consumer centric’ model for mobile payments vs. having interested parties such as banks, mobile network operators, etc. in control.

Read blog post

Woz is Worried About “Everything Going to the Cloud” — the Real Issue is Giving Up Control

14 Aug 2012

Nati Shalom, Gigaspaces writes: In a recent article, Steve Wozniak, who co-founded Apple with the late Steve Jobs, predicted "horrible problems" in the coming years as cloud-based computing takes hold. 

Read blog post

Lessons Learned from Mat Honan’s Epic Hacking

09 Aug 2012

Rob Sobers at Varonis writes: “Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.”

If you haven’t read Gizmodo writer Mat Honan’s gut-wrenching play-by-play of how his entire digital life was evaporated in the matter of hours, do yourself a favor and Instapaper it. Or, if you’re too busy to read the whole article, I’ve created a quick-and-dirty summary that retraces the hacker’s steps and highlights some steps we can take to protect ourselves from similar attacks.

Read blog post

Designing Cloud Data Centers: Unearthing Hidden Truths And Potentials

09 Aug 2012

James Young at CommScope writes: It is official: the cloud is impacting data center design. More than just a facelift, the changes are occurring right at the infrastructure design and implementation process–and it is about time.

Read blog post

Dropbox – Please Reset Everyone’s Password

02 Aug 2012

Rob Sobers, technical manager at Varonis writes:  This week, Dropbox confirmed that they were indeed hacked.  They issued a blog post explaining:

"Our investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts. We’ve contacted these users and have helped them protect their accounts."

Read blog post

Cloud Computing – Panacea or Problematic?

24 Jul 2012

Marcie Terman, Business Development Director at DataFort writes: Strategies that suggest running company servers from data centres (Cloud Computing) are not a new concept to businesses. But as time has gone on, this strategy has now become a viable alternative to SMEs, providing a number of attractive benefits. As a result, many companies are actively turning to cloud-based strategies rather than merely refreshing server hardware.

Read blog post

Are you ready for the Olympics?

24 Jul 2012

Orlando Scott-Cowley writes: We are only days away from the London 2012 Olympics, and the everyday advice for Londoners is hitting its peak. Transport for London has told me to expect a “Major Impact to Travel” in an email earlier this week, reminding me in a fantastically understated way about “…the sporting events which will be held across London…” and how I should consider staying at home, or more precisely, working from home.

Read blog post

Data Centres and the power question…green or not?

23 Jul 2012

Chris Walters writes: Sustainability and data centres – the two go together like cats and dogs, well at least in the past they did. Today’s data centre operators are redefining these standards. With big data and the adoption of cloud computing, businesses are increasingly taking up valuable space in today’s modern facilities and data centre operators are feeling the crunch when it comes to power consumption.

Read blog post

Returning to Bletchley Park: A Journey Through Cryptography

18 Jul 2012

Blair Semple, CISSP-ISSEP, Director of Business Development writes: This week I am talking at a UK security event at Bletchley Park, a name and place that I am sure many, if not most of you, know about.

Read blog post

Microsoft Moves to SaaS with Office 2013

17 Jul 2012

Barry Gill writes: Having been at Mimecast for many years championing the benefits of the Software as a Service model to customers, prospects and partners alike, I am well versed in the benefits that this model poses to organizations of every shape and size.

Read blog post

KVM over IP is QWOP

10 Jul 2012

Robert Waldie writes: To keep your data center serving its users, out-of-band management for servers has always been necessary, and up until a few years ago a KVM over IP switch was often a necessary evil.

Read blog post

Data Centres – to build or to buy, a network operator’s conundrum

09 Jul 2012

Chris Walters, Sales Director at Geo writes: Last week’s announcement by NTT Communication Corp. to acquire an 85% stake in UK data centre operator Gyron Internet Ltd. marks a more common occurrence in the traditional Telco space.

Read blog post

A La Carte: Criminals Charging Per Feature for Custom Webinjects

26 Jun 2012

Trusteer's Amit Klein writes: Over the past several months, Trusteer has written about the evolving underground market for webinjects. Our researchers recently discovered a new development -- criminals are now selling customized webinjects that are priced per feature. For example, one seller offers a webinject for Zeus/SpyEye that contains the automatic transfer system (ATS) that was reported by Trend Micro researchers last week.

Read blog post

It Is Official: Microsoft Acquires Yammer. What Does It Mean to the Industry and Moxie Software?

26 Jun 2012

Tom Kelly writes: In the past days, I’ve been asked by industry peers and the media to provide my thoughts around Microsoft’s acquisition of Yammer. Since the deal was formally announced today, I wanted to further elaborate on my views, providing additional insights about the impact of the acquisition to the industry and to Moxie Software.

Read blog post

Say Goodbye To Data Center Downtime

22 Jun 2012

James Young at CommScope writes: There’s a quiet revolution going on in your data center. Labeled Data Center Infrastructure Management (DCIM), it represents what can be achieved when IT and dataf center facilities functions converge. Properly done, DCIM can take energy efficiency to the next level, optimize physical equipment layouts, improve strategic planning and enhance resource availability.

Read blog post

LinkedIn and eHarmony: a lesson in online identity via email

18 Jun 2012

Orlando Scott-Cowley writes: Late last year I wrote about how important an email address is, and suggested that your email address is really part of your identity. That post seems more relevant today than when I wrote it, as this week we learn that both LinkedIn and eHarmony have had user credentials stolen.

Read blog post

Why code signing matters

08 Jun 2012

Mark Knight, Director, Product Management at Thales e-Security writes: 

Code signing has been a popular topic over the last fortnight.

  • Yahoo was quick to patch an embarrassing key management error with the signing key used in their new Axis browser extension for Chrome that was discovered by Security blogger Nik Cubrilovic [1].
  • Microsoft has published [2] a security advisory revoking trust in a number of digital certificates that may have been abused to sign parts of the recently discovered “Flame” malware.
Read blog post

Skyscanner Sends Microsoft SQL Server Search Performance Soaring

01 Jun 2012

Charlie Holmberg writes: Travel search site Skyscanner helps hundreds of thousands of people find the best deals on flights every day. It provides instant comparisons of flight prices on millions of flights, as well as on cars and hotels.

Read blog post

Expert comment on ‘Flame’

30 May 2012

This week an elaborate cyber-attack called ‘Flame’ has been detected collecting private data from individuals, businesses, academic institutions and government systems, particularly across the Middle East.

Commenting on this latest threat, Wieland Alge of Barracuda Networks warns: “There is still more to come!”

Read blog post

Open Clouds: Beyond Open Code

25 May 2012

The Cloud Computing Team at RedHat write:Open source is a key ingredient in open clouds. But openness in a cloud requires more than just code that's under an open source license. In this post, we examine three open characteristics that are closely related to open source but don't automatically flow from it.

Read blog post

Vodafone & CWW: consolidation and speculation

08 May 2012

Nick Ballard at Geo Networks writes: As anticipated it was confirmed last week that the Vodafone would offer just over £1bn for Cable and Wireless Worldwide (CWW) which values the company at a price of 38p per share – a 92% premium to the closing price of the company a day before the talks were unveiled!

Read blog post

Announcing OpenShift Origin – Open Source Code For Platform-as-a-Service (PaaS)

01 May 2012

The Cloud Computing team at RedHat write: It's been almost a year to the date since Red Hat launched the OpenShift Platform-as-a-Service (PaaS) at Red Hat Summit. Since launch, OpenShift has established itself as a compelling PaaS choice for developers seeking enterprise capabilities.

Read blog post

The 2011 Internet Security Threat Report – There Is No Panacea to Protect Against All Attacks

30 Apr 2012

Kevin Haley at Symantec writes: When it comes to Internet security, organizations shouldn’t feel like it’s only a matter of time before they suffer a catastrophe. But at the same time, it’s important to recognize that there is no single preventive measure that will guarantee safety from all attacks.

Read blog post

Road to Elsewhere: Virtualised Data Centres

27 Apr 2012

Dave Schneider, senior manager, market development, Ixia writes: Recent years have seen IT organisations move their platforms and applications to “the cloud”. The details are still evolving, but for most enterprises the cloud is a set of services, data, resources and networks located “elsewhere.” This contrasts with the historical centralised data centre model where enterprises purchased, configured, deployed and maintained their own servers, storage, networks and infrastructures.

Read blog post

So just what is a collaborative conversation? Have you ever had one?

16 Apr 2012

Manish Sablok, Head of Marketing for CNE Europe at Alcatel-Lucent Enterprise, looks at how ground breaking developments in collaborative technology are enabling 'outcome driven' conversations across the enterprise.

Read blog post

Top tips from NetIQ ahead of World Backup Day

30 Mar 2012

NetIQ’s Mike Robinson writes:

Back up essential components. If the majority of disaster recovery budgets are allocated to protect only the most critical applications, a large portion of business-critical servers are left under-protected. Since the risk of downtime is so high, the need to deploy disaster recovery solution is not a matter of if, but when. Any business-critical server essential to maintaining operations will require costly fault tolerance and clustering solutions, while any business-supporting servers that are not essential to running the operations will employ ineffective restore and recovery solutions. Ideally, disaster recovery software should provide businesses with the ability to quickly move restored workloads to wherever needed.

Read blog post

Red metal networks: Red alert (1 of 2)

21 Mar 2012

Mike Ainger, Chief Operating Officer at Geo writes: In my role as COO, I frequently get to talk to operations managers about what concerns keep them up at night. International commodity pricing is probably not the one that springs most readily to mind, but the combination of inexorable rises in metal prices (copper is now around five times more valuable than ten years ago), and the troubled state of the economy (unemployment has nearly doubled over the same period), has led to an epidemic of copper theft.  This in turn is having a profound impact on the reliability of communications networks, as can commonly be seen in the headlines.

Read blog post

The Last Bottleneck: How Parallel I/O Can Attenuate Amdahl's Law

16 Mar 2012

Rex Tanakit, Director of worldwide systems engineering at Panasas writes: Parallel computing is becoming mainstream in technical computing.    Let me provide you with a few examples.  The Economist magazine ran an article on parallel programming last June,   Its comfortable discussion of parallel programming is a sure indication of the topic’s movement into the mainstream.  A more technical example is to look at the average number of CPUs on the TOP500 ( in the past 18 years.  In 2001 the average core count was between 129 and 256 per system according to the article, compared with 4000 to 8000 in 2011, over 30X increase in shared processing power.

Read blog post

Apple’s New iPad and The Inconvenient Truth for Mobile Network Operators

08 Mar 2012

Mervyn Kelly, EMEA marketing director at Ciena: “Amid much fanfare, Apple has launched the new iPad – the third iteration of the dominant tablet platform on the market. While network operators clearly welcome the excitement Apple launches generate in consumers, with each new Apple product comes increased challenges around connectivity and capacity.

Read blog post

Power availability: when broadcast goes wrong

05 Mar 2012

Will Pitt Media and Broadcast Sales Director at Geo writes: Significant outages during live TV broadcasts in 2011 due to ‘unusual power spikes’ has brought the subject of power, and its resilience and reliability, into sharp focus.

Read blog post

Twinterview with MIME co-creator, Nathaniel Borenstein

05 Mar 2012

Justin Pirie writes:Almost twenty years ago, Mimecast’s very own Chief Scientist Dr. Nathaniel Borenstein co-created the email format Multipurpose Internet Mail Extension protocol (MIME) and, in doing so, laid the foundations for email to become the world’s dominant personal and business communication tool.

Read blog post

Understanding ShoreTel

29 Feb 2012

Adrian Hipkiss, managing director EMEA, ShoreTel writes: I joined ShoreTel as Managing Director, EMEA, this past October, and was invited to meet the board in Sunnyvale, California. Playing it safe, I dressed-up but was surprised to discover a relaxed group of senior executives. A “compliment” about my tie broke the ice and set me thinking about the parallel between Silicon Valley and ShoreTel.

Read blog post

DNSChanger Malware – Are you afraid you’ll lose Internet access on March 8th?

27 Feb 2012

Lauren Smith writes: Over 450,000 computers - including half of the Fortune 500 companies and over 50% of government entities – are still infected with the DNSChanger malware. Don’t be one of them! 

Read blog post

No skeleton key – protecting your organisation on the web

22 Feb 2012

Mark Knight, Director of Product Management, Thales e-Security, writes: Weaknesses in the SSL protocol (the protocol for encrypting information over the internet) or the public certificate authority (CA) ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been no exception.

Read blog post

The expectation of collaboration

17 Feb 2012

DeLisa Alexander, SVP People writes: I believe that the future success for businesses to attract and retain top talent relies on a more open management and leadership approach. The workforce is evolving and the new employee is part of a major change affecting not only how we hire and who we hire, but how our companies operate on a basic level. It’s especially prevalent in the new generation entering the workforce.

Read blog post


13 Feb 2012

James Donovan at CommScope writes: Over the past years, one infrastructure media technology in particular has become more and more common in catering to the trends in all types of networks, that of optical fiber. When I say networks, I mean it in widest sense to include Wide Area Networks (WAN), Metropolitan Area Networks (MAN), Local Area Networks (LAN), Cellular and Mobile Networks and Broadband Networks.

Read blog post

Certified Ethical Hacker's analysis of FBI-UK police call hack

03 Feb 2012

Graeme Batsman writes: It was reported in the media today that the Metropolitan Police and Federal Bureau of Investigation (FBI) have launched a criminal investigation after computer hackers intercepted a conference call between cyber security experts.

Read blog post

HP Software Introduces New Major Private and Public Cloud Discovery Capabilities with HP Discovery and Dependency Mapping Advanced (DDMA) Content Pack 10

02 Feb 2012

Michael Grainge writes:  Today I am pleased to formally announce the availability of HP Discovery and Dependency Mapping Advanced (DDMA) Edition Content Pack 10. This content pack ten introduces a myriad of new discovery capabilities – including discovery for major private and public cloud service providers, including Amazon Web Services (AWS) and vCloud. Cloud and virtualization discovery allow DDMA to reach beyond the physical world and into the world of private and public cloud services, and virtualized environments. In addition, these new capabilities can address and escalate customers cloud transformation and associated planning activities.

Read blog post

PIM Happens – Why, What, When?

31 Jan 2012

James Donovan writes: For wireless cellular networks to achieve their full operating potential, each sector within the network must perform up to its design standard. When this does not occur, the economic impact to the service provider can be substantial:

Read blog post

More to Storage Efficiency than Capacity

30 Jan 2012

Hu Yoshida writes: In response to my last blog, Jon Toigo was kind enough to post a training piece that he wrote last year, reminding us that capacity is only one part of storage efficiency.

Read blog post

The Native App: Still a Firm Favourite with the Consumer

23 Jan 2012

Tony Speakman, Director of Filemaker, Northern Region writes: 

The best way to build an app has been the subject of fierce and intriguing debate. Professional and popular opinion is split into two main camps: those who favour ‘native’ and those who advocate ‘web based’ apps. The difference is relatively simple: the native app is built for a mobile platform, whereas a web application can be used on a variety of different machines and hardware via an internet browser.

Read blog post

Vint Cerf is Too Modest; Internet Access is a Human Right

16 Jan 2012

Nathaniel Borenstein, Chief Scientist at Mimecast writes: In his January 4 op-ed piece, Vint Cerf argued that Internet access is not a human right. While I consider Vint a friend and have tremendous respect for his achievements, I think he’s wrong in this case. Perhaps out of modesty, the man often called the “father of the Internet” is undervaluing the global network he played such an important role in developing. I fear his underestimation may be as fundamental and consequential as his belief, 30 years ago, that 4 billion Internet addresses would be sufficient — another of the rare times I disagreed with him. I believe that in the future, the Internet will be nearly as fundmental to civilized human life as food, clothing, and shelter. 

Read blog post

Safer digital identities in 2012?

13 Jan 2012

Mark Knight, Director of Product Management at Thales e-Security writes: Sometimes it takes a very public breach for the shockwaves to force an industry to tighten up security. I welcome the news that the Certificate Authority (CA) industry body that initially specified the standard for Extended Validation (EV) certificates has now published requirements (or standards of due care), for the issuance of publically trusted certificates. Certificate authorities that have signed up to the new requirements have 6 months to comply.

Read blog post

BYOD is the challenge of the decade

11 Jan 2012

Simon Wilcox, Head of Marketing Operations at web filtering and security technology specialistSmoothwall writes: Whilst instant internet access at home, work or even in coffee shops and on trains is something most people now take for granted, for many network managers the growing popularity of smart phones, tablets and other portable devices is causing a major headache. 

Read blog post

SSD: Imagine The Possibilities

10 Jan 2012

Scott Hansen Enterprise Sales Manager at WhiptailTech writes: How much of your storage environment is performance based versus capacity based? How many times do you hear, “I have an application only three terabytes in size but I need 90K in I/O at its peak?” If you haven’t, be grateful. But be warned, it’s coming.

Read blog post

Certified Ethical Hacker's analysis of "Anonymous" breach of Strategic Forecasting Inc

10 Jan 2012

Graeme Batsman, Director of Data Defender writes: Months have passed from the last major story relating to Anonymous and LulzSec. It seems they are back with their “robin hood” tendencies. They say their “goal was to use the credit data to take a million dollars and give the money away as Christmas donations”, from the target for this was Strategic Forecasting Inc which is an intelligence think tank with around 70 staff based in Austin, Texas, USA, which has clients from Apple, The U.S. Army, the U.S. Air Force and the Miami Police Department. As you can tell, this is serious stuff.

Read blog post

How to Stop SQL Injection

05 Jan 2012

Rob Rachwald, Director of Security Strategy at Imperva writes: On the very last day of 2011, SANS published a story about automated SQL injection attacks affecting 1M plus websites.  What will be different with SQL injection in 2012?  Nothing.  Perhaps more, perhaps some new attack tools.  But otherwise, it is "meet the new boss, same as the old boss."

Read blog post
Server Tech (sentry)

Mailing list

Copyright 2010-17 The Data Chain Website design and management by CBJ Digital Ltd.