The early 1980s marked a revolution in the chip industry. System architecture
shifted from the board level to the chip level, making it possible to compile
The data center is undergoing a similar evolution that will enable
organizations to compile their dream data center. How? By leveraging software
A New Model
Significant changes can be seen in data centers already. Traditionally, data
centers have been comprised of a complex and diverse array of servers
performing discrete tasks. Critical business servers have been dependent on
dozens or even hundreds of underlying data center components. A single
problem in one area often had a cascading impact on other areas.
Administrators, in turn, have been left with far too many variables with
which to contend.
Organizations now have a wealth of tools available to help them take control
of the d... (more)
Utility computing (UC) is a concept in which storage hardware resources are
pooled within a shared infrastructure of storage management and made
available as needed in a pay-as-you-go model. Ultimately, the end goal that
UC promises is to help companies more efficiently manage the resources they
currently have while holding down costs. To get there, and operate as a
utility, IT needs three key building blocks - availability, performance, and
automation - that apply across storage, servers and applications.
Before looking at the three key building blocks to UC in depth, it is best ... (more)
Given the mountains of data now floating around, it is perhaps inevitable
that the very function of data analytics is seen as somehow intrusive.
There's a constant glut of reports, columns and other stories bemoaning the
lack of data privacy - and at times, they're entirely justified.
Organizations have a solemn duty to protect their customers' data, and those
that don't implement the proper safeguards deserve to be vilified.
But beneath the surface lurks another dimension of this discussion that is
often overlooked. Ethical and effective data analytics enhances security.