Mark Bregman

Subscribe to Mark Bregman: eMailAlertsEmail Alerts
Get Mark Bregman via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Mark Bregman

Given the mountains of data now floating around, it is perhaps inevitable that the very function of data analytics is seen as somehow intrusive. There's a constant glut of reports, columns and other stories bemoaning the lack of data privacy - and at times, they're entirely justified. Organizations have a solemn duty to protect their customers' data, and those that don't implement the proper safeguards deserve to be vilified. But beneath the surface lurks another dimension of this discussion that is often overlooked. Ethical and effective data analytics enhances security. Ethical and effective data analytics protects not only the institutions that possess the data, but also the consumers that data reflects. Ethical and effective data analytics serves a good purpose. Let's be clear about the parameters of this argument. Data doesn't exist in a vacuum - it's generate... (more)

Virtualization & the Evolution of the Data Center

The early 1980s marked a revolution in the chip industry. System architecture shifted from the board level to the chip level, making it possible to compile a chip. The data center is undergoing a similar evolution that will enable organizations to compile their dream data center. How? By leveraging software and virtualization. A New Model Significant changes can be seen in data centers already. Traditionally, data centers have been comprised of a complex and diverse array of servers performing discrete tasks. Critical business servers have been dependent on dozens or even hundre... (more)

Utility Computing: Three Key Building Blocks

Utility computing (UC) is a concept in which storage hardware resources are pooled within a shared infrastructure of storage management and made available as needed in a pay-as-you-go model. Ultimately, the end goal that UC promises is to help companies more efficiently manage the resources they currently have while holding down costs. To get there, and operate as a utility, IT needs three key building blocks - availability, performance, and automation - that apply across storage, servers and applications. Before looking at the three key building blocks to UC in depth, it is best ... (more)