Return to the The Data Chain website homepage

Blog

Archive for June 2013

Keeping your cool in a data centre

28 Jun 2013

Edward Jones, CEO - PMB Holdings and MK DataVault writes: Cooling is one of the most important aspects of a data centre, reflected by the wide array of techniques and strategies that have emerged as solutions. The chosen approach for a facility will often be regarded as one of its defining features, especially for the more unusual solutions such as Yahoo’s Compute Coop facility, which features an ambient air system resembling an enormous chicken coop.

Read blog post

Why Data Security Pros Are Knocking Down Firewalls

28 Jun 2013

Barry Shteiman, Senior Security Strategist, Imperva writes: Yesterday, a very interesting article in the AFCEA caught my eye: “DISA Eliminating Firewalls.” Although the title seemed provocative at first, the article itself just made me smile.

Read blog post

Do you trust in the internet, are digital certificates the new malware?

20 Jun 2013

Gavin Hill, Director, Product Marketing, Venafi writes: Organised criminals are using encryption keys and digital certificates against you on a daily basis. We’ve all come to trust that we securely communicate with websites as we go about our daily online transactions. The green address bar in our browsers gives us a sense of confidence that the transfer of information is secure. However, many times when our browsers popup with a warning that something is wrong with the website certificate, we ignore it and proceed anyway. Cryptographic keys and certificates are the core of trust in digital communication. But what happens when that trust is used for nefarious action against you?

Read blog post

Private Cloud offers multiple benefits to (almost) all applications

17 Jun 2013

Brian Jacobs, Senior Product Manager, Ipswitch Inc. writes: Although ‘the cloud’ has become a part of standard IT vocabulary over the past few years, many organisations remain unaware of the potential impact cloud technologies can have on their businesses.  Can almost any business benefit from ‘the cloud’?  For most, the answer is a definite yes, although there are some areas where the cloud may not be beneficial.

Read blog post

Fighting fire with fire

12 Jun 2013

Leon Ward, SourceFire writes: In this latest phase of the cyber security threat cycle, organisations are battling hard to combat the advanced malware, targeted attacks and advanced persistent threats (APTs). While these threats have demonstrated themselves to be more damaging than any in their wake, technologies are available to deal with them.  In this continuously evolving threat landscape, the trick is to select the right technologies and apply them correctly.

Read blog post

Red Hat Enterprise Linux: Foundation for the open hybrid cloud

12 Jun 2013

Jim Totton, vice president and general manager, Platform, Red Hat, writes: Red Hat espouses a vision called open hybrid cloud, but it’s important to note that this is not merely “cloud washing” or a response to the latest fad. Rather, it’s based on a foundation that Red Hat has been building for years, and stems from the experience and credibility we’ve established in helping to create the market for commercial Linux. This long-held vision has been informed by a decade of collective feedback from our customers, and helps avoid some of the pitfalls that are often created within enterprise software –sometimes by vendors themselves. Examples of pitfalls are the purpose-built solutions that enterprises adopt that end up becoming rigid and inflexible infrastructure silos. These silos are expensive to maintain, often implement non-standard interfaces and APIs, and result in vendor lock-in.

Read blog post
vizion vRanger

Mailing list




Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.