StoONE promises to deliver high-end storage array performance for pennies on the dollar. How? That’s the big question.
Container orchestration isn’t easy, even with Kubernetes running smoothly. If you need a little extra help to make it all run correctly you need direction. Tom Hollingsworth takes a look at Nirmata and how they can help architect your container strategy.
Monitoring containerized applications can be a pain, especially if you are using containers to their fullest. But it doesn’t have to be impossible. Tom Hollingsworth takes a look at Ixia CloudLens and how it can help you unravel the mysteries behind what your containers are doing.
In this week’s IT Origins interview, we were lucky enough to talk to podcaster, engineer, and IT pro Allison Sheridan. In the interview we discuss her move from mechanical engineering to IT, the gradual departmentalization of IT throughout her career, what is IT’s role in business, and the liberating definition of waste.
This week on the Gestalt IT Rundown, Tom Hollingsworth and Rich Stroffolino discuss Intel’s potentially disastrous kernel memory leak. The give a quick overview of what the issue is, what’s being done to remediate it, and how it will impact the enterprise.
Intel just released more details on their upcoming CPU with Radeon graphics. The details answer many of the “what” and “how” questions about the chip, but we’re still missing “why”.
2017 was a busy year for Gestalt IT. We launched a podcast, interview series, and live weekly news rundown. On top of that, we continued to cover the latest and greatest in enterprise IT. Thanks for checking out our site this year. Look forward to lots of new additions in 2018!
Paying for more capacity than you need can be wasteful and lead to difficult decisions down the road. But what if you only have to pay for what you use? Tom Hollingsworth takes a look at KEMP Technologies and their Metered Licensing option for their Application Delivery Controllers.
Apple made a rare admission that they chose to throttle CPUs on iPhone with spent batteries. Some say an conspiracy to force upgrades, others say a proactive step to ensure a better overall user experience. But no one seems satisfied how they reacted. The question is: how should have Apple dealt with this issue?
Data breaches were one of the dominant IT trends in 2017. In here recent ebook, Karen Lopez delves into why it’s often not from a lack of technical security, but failures of communication that can lead to these leaks.