Mark Bregman

Subscribe to Mark Bregman: eMailAlertsEmail Alerts
Get Mark Bregman via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Mark Bregman

The early 1980s marked a revolution in the chip industry. System architecture shifted from the board level to the chip level, making it possible to compile a chip. The data center is undergoing a similar evolution that will enable organizations to compile their dream data center. How? By leveraging software and virtualization. A New Model Significant changes can be seen in data centers already. Traditionally, data centers have been comprised of a complex and diverse array of servers performing discrete tasks. Critical business servers have been dependent on dozens or even hundreds of underlying data center components. A single problem in one area often had a cascading impact on other areas. Administrators, in turn, have been left with far too many variables with which to contend. Organizations now have a wealth of tools available to help them take control of the d... (more)

Utility Computing: Three Key Building Blocks

Utility computing (UC) is a concept in which storage hardware resources are pooled within a shared infrastructure of storage management and made available as needed in a pay-as-you-go model. Ultimately, the end goal that UC promises is to help companies more efficiently manage the resources they currently have while holding down costs. To get there, and operate as a utility, IT needs three key building blocks - availability, performance, and automation - that apply across storage, servers and applications. Before looking at the three key building blocks to UC in depth, it is best ... (more)

Security Through Data Analytics

Given the mountains of data now floating around, it is perhaps inevitable that the very function of data analytics is seen as somehow intrusive. There's a constant glut of reports, columns and other stories bemoaning the lack of data privacy - and at times, they're entirely justified. Organizations have a solemn duty to protect their customers' data, and those that don't implement the proper safeguards deserve to be vilified. But beneath the surface lurks another dimension of this discussion that is often overlooked. Ethical and effective data analytics enhances security. Ethica... (more)