At some point in our lives most of us come the realization that making the lowest cost choice doesn’t always mean you are going to realize the best value possible. These kind of decisions are common in enterprise IT as well.
In this piece, we break down the difference between data management and secondary storage. This is necessary to understand the importance of what Komprise presented at Storage Field Day. Their software solution provides data management to make data visible, save space, and manage your data in a way that enables the data, instead of just storing it.
Log analysis platforms often grow at the cost of performance and usability. Scalyr is the log monitoring and analysis solution known for extremely fast performance.
Rich Stroffolino and Ken Nalbone discuss the IT news of the week on the Gestalt IT Rundown. Databases, open source drama, TLS certificates, chip news, and more!
Inevitably when companies explore the prospect of microsegmentation, a common question arises. Why bother using a firewall at the hypervisor level when the VMs themselves have a host based firewall built into the OS or you could just use a hardware firewall to segment workloads?
Managing infrastructure is hard enough. But in today’s world of cloud computing it can be tough to manage constructs that live for seconds instead of persisting. How can you keep a handle on it all. Confidentially, the best way is with Aporeto. Tom Hollingsworth discusses the power of identity management for workloads in this post.
When people think “cloud”, they usually think web-native applications. But when enterprise IT hears about cloud, especially from vendors, they’re typically looking at a more-flexible environment for their existing applications. The same is true of so-called hybrid cloud – does it bring the cloud closer to the datacenter or vice versa? That’s why the “inside-out” versus “outside-in” metaphor really helps explain the current state of enterprise IT.
In a world of networking built on standards, the hottest new technology isn’t anywhere close to being based on them. Should SD-WAN not be deployed until it has been through the standardization process? Ethan Banks has some great thoughts about why this isn’t as big of a deal as you might think.
On this episode of the Gestalt IT Rundown, Stephen Foskett and Tom Hollingsworth are talking about MAMR vs HAMR drives, what the glut of IoT devices announced at CES means for security, and IBM’s new quantum computer.
WPA3 is the new wireless authentication protocol just around the corner. It’s being developed to fix some of the issues with the ancient WPA2 protocol. But what about open encryption? Why don’t we just run everything over SSL and save time? Tom Hollingsworth examines the need for WPA3 with OWE and why TLS alone isn’t going to work.