Welcome!


Latest Blogs from Linux Containers
It means you can't use "network" protocols to make intelligent decisions about applications any more. Back in 2000 (or 2001, I forget exactly), I got to test a variety of bandwidth management appliances. Oh, they were the bomb back then - able to identify (and classify) applications b...
In this installment of our "Hyper-V from a VMware admin's perspective" series, Keith Mayer and Andy Syrewicze discuss support for guest operating systems in Hyper-V. Tune in as they go in depth on supported server and client operating systems as well demo for us how Linux...
How many of you actually fill out the registration cards that come with your kid's toys? Anyone? Anyone? Bueller? Bueller? That's what I thought. Me neither. Not as a parent and certainly not as an adult. After all, they were just going to use it for marketing, right? Fast forwa...
In reviewing some opportunities for Plexxi this week, I was reminded that we have made things very hard on ourselves. Through no one’s fault but our own we have created monsters of networks that are impossible to maintain, debug, diagnose and understand. I have been lucky in my career...
This week's "bad news" with respect to information security centers on Facebook and the exploitation of HTTP caches to affect a DDoS attack. Reported as a 'vulnerability', this exploit takes advantage of the way the application protocol is designed to work. In fact, the same author who...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
by James P. Peruvankal Kaggle just announced a competition to predict which shoppers will become repeat buyers. To aid with algorithmic development, they have provided complete, basket-level, pre-offer shopping history for a large set of shoppers who were targeted for an acquisition ca...
Adobe Systems Inc. has shipped an emergency security update to fix a critical flaw in its Flash Player software that is currently being exploited in active attacks. The exploits so far appear to target Microsoft Windows users, but updates also are available for Mac and Linux versions o...
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
Being from the Hawaiian Islands, the annual gathering of the Kohola (humpback whales) is always a spectacular view. They can get over half their body out of the water and administer a cannonball body slam splash like you’ve never seen before. Most of the internet thinks they breach to ...
Way back in the early days of the Internet scalability was an issue (the more things change...). One of the answers to this problem was to scale out web servers using a fairly well-proven concept called load balancing. Simply put, distribute the load across web servers to make sure eve...
I’m at the Next Web conference in Amsterdam. A large cavern is full of entrepreneurs and Web marketing folks, mainly young. (From my end of the bell curve, most crowds are young.) 2,500 attendees. The pening music is overwhelming loud; I can feel the bass as extra beat in my hear...
From a cost perspective, the networking dialogue is dominated by CapEx. Acquisition costs for new networking gear have historically been tied to hardware, and despite the relatively recent rise of bare metal switching, networking hardware remains a high-stakes business. But SDN is chan...
Take a moment to consider the things we put up with on a daily basis because they have been understood and accepted as the status quo. Perhaps the old adage, “better the devil you know than the devil you don’t,” rings no truer than for traditional on-premise data storage systems. Sure,...
IT Appliance range supports businesses transitioning from Microsoft Small Business Server and Windows Server 2003 to a managed hybrid cloudBath, United Kingdom - 24th April 2014 - Zynstra, the pioneer in cloud managed server appliances, today announces the launch of two new products, S...
In the beginning there was a simply acronym: MTTI (mean time to innocence). Weary after years of costly and time-consuming war room battles, IT organizations turned to AppDynamics to give an objective application-level view of production incidents. As a result, application issues are s...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...
Like moving to IPv6, simply picking up your existing network architecture and moving it to a completely new one is not going to happen overnight. There will undoubtedly still be "traditional" networks hanging around even when SDN adoption is considered mainstream and fully mature. That...
[This post is penned by Plexxi executive Bill Koss] Two months ago I read an interesting blog post by Greg Ferro titled “Cheap Network Equipment Makes a Better Data Centre.”  At Plexxi, I am the person who leads our sales team and I found the post interesting because I think there is a...
By Bob Gourley “R” is a freely available language for interacting with your computer that is designed for a wide variety of functions. It is most frequently associated with statistical computing and graphics. R runs on a wide variety of systems, including Mac, Windows, Linu...
While organizations spend the next few days and weeks patching OpenSSL vulnerabilities, the realization is setting in that we may never know the full extent of the damage caused by Heartbleed. Although Heartbleed was only announced in early April, it has actually been present in OpenS...
David Linthicum and I attended the Red Hat Summit and Chef Conf 2014 this past week and sat down to talk about both conferences, as well as topics like Docker, OpenStack, and VMWare.
Earlier this week, Ethan Banks wrote a very nice article about Mellanox’s dual spine and leaf network in support of a large amount 10GbE access ports. After describing the scaled up network design, he reviews 8 observations about the design, not to point out good or bad, but merely to ...
Author Peter RogersPrincipal MobilityArchitect, CognizantVisionMobile recently published one of the best reports on apps for vehicles that I have read (http://www.visionmobile.com/product/apps-for-cars-mileage-may-vary/).  It is frustrating with how difficult it is to actuall...
The latest version of Ubuntu, version 14.04 – codenamed “Trusty Tahr” – has finally been released! Ubuntu 14.04 comes with some great new features and guaranteed support and security updates for 5 years until April 2019 – which is great for those that need or want a stable desktop envi...
Last week was a crazy week for information security. That's probably also the understatement of the year. With the public exposure of Heartbleed, everyone was talking about what to do and how to do it to help customers and the Internet, in general, deal with the ramifications of such a...
Like every one I am updating my terminology to reflect the shift that occurred – Business and technical executives immediately get that when combined with a world of smart, connected devices then Cloud computing only makes more sense. We have entered an age where IoT Cloud Computing...
This past weekend, like many of you, I started getting the blood curdling password resets from a bunch of OpenSSL affected sites. I also got a few emails from sites indicating that I had nothing to worry about. Bad news, good news. Probably the biggest security story thus far for 2014 ...
When I visit clients to talk about DevOps, I usually ask them what their monitoring strategy is. Too often, the answer I hear is "We use Nagios". I think Nagios is a great tool, but it sure is not a strategy. Nagios does a good job of monitoring infrastructure. It will alert you when y...
Versatile faxing app enables businesses to send and receive faxes worldwide via any browser, plus Windows and Mac OS/X desktops, and iOS, Android and Blackberry devicesMUNICH, GERMANY -- April 16, 2014 -- PamConsult GmbH today launched PamFax 3.0, its newly updated complete fax solutio...
Revolutionary new "Elastic Containers" provide channel with compelling differentiation against other major players on price, scalable performance and ease of useLondon, UK 16th April 2014 Cloud server provider, ElasticHosts, has today announced that it is expanding its white-label rese...
One of the most powerful aspects of the Internet of Things is the process of synthesis it achieves; it provides a mental model for people to associate and relate a number of different technologies under one umbrella concept and trend. Therefore one early quick win is a simple taxonomy...
OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs and "software-defined" (which really means software-controlled, but this is neither the time or place to get into that debate). It's about jailbreaking the network. Enabling access to features and functionalit...
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
On April 2, the IT industry was rocked when it was announced that over 60 percent of the Internet — even secure SSL connections — were vulnerable to attack due to a new weakness codenamed Heartbleed. The weakness lives in the OpenSSL cryptographic software library, which en...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
Not too long ago, it took even the most successful entrepreneurs several centuries or at least decades to reach a valuation of a billion and thus become a member of the exclusive Billionaire Boys Club*. Families like the Rothschilds, the Waltons or the Brenninkmeijers have indeed built...
Pluribus Networks Joins Red Hat OpenStack Cloud Infrastructure Partner NetworkRED HAT SUMMIT, SAN FRANCISCO, CALIF - April 14, 2014 - Pluribus Networks, the company that brings together compute, network, storage, and virtualization into a single platform, announced today its first cert...
Despite claims that there exists (or will, look out!) a mythical "god box" for the enterprise data center, capable of performing every data center function imaginable, it remains, well, mythical. Efforts to effectively secure the data center and the applications it delivers therefore r...
Tous les médias se sont relayés pour en parler, personne n'a pu passer à côté de la nouvelle : une faille vieille de 2 ans a été détectée le 7 avril, son nom, Heartbleed, le coeur qui saigne The post Heartbleed, la plus grosse faille de l’Internet appeared first on Provectio - Cl...