Blogs

Taking Predictive Maintenance from the IIoT to Big Data Analytics

Predictive maintenance can grow far beyond traditional condition monitoring when the data from equipment is gathered through the Industrial Internet of Things (IIoT) and then stored and processed through Big Data analysis systems, such as IBM’s Watson. “When you gather the regular maintenance data, you can build a history of the data. Then you use …

Taking Predictive Maintenance from the IIoT to Big Data Analytics Read More »

VMware preps NSX network virtualization for smaller customers

VMware’s mainstream server virtualization users haven’t felt a lot of love in recent years The company’s focussed on the cloud, containers and software best suited to very large enterprises. But on Thursday’s earnings call for Q1 2019 VMware CEO Pat Gelsinger signalled that simpler versions of the company’s NSX network virtualization software are on the …

VMware preps NSX network virtualization for smaller customers Read More »

Enable rapid provisioning of VMs with SCVMM SAN copy

Most IT administrators use System Center Virtual Machine Manager (SCVMM) to maintain the data center’s entire virtualization stack. Microsoft has added several new features and improved existing features of SCVMM. One of the features added to SCVMM 2012 R2 SP1 is rapid provisioning of VMs to virtualization hosts.   Most production environments use storage area …

Enable rapid provisioning of VMs with SCVMM SAN copy Read More »

Pentagon delays disputed JEDI cloud contract

The Pentagon has “delayed indefinitely its final request for proposals” (RFP) for its multi-billion dollar cloud contract, Defense Department spokeswoman Dana White told Bloomberg today. The question came up 11 minutes into the Pentagon briefing, which is available online at DVIDS. White said “it’s important that we don’t rush towards failure” and “we are moving …

Pentagon delays disputed JEDI cloud contract Read More »

A refresher course on white box networking equipment

Under the cover, white box networking gear is made with all the same components as name-brand equipment. It typically contains microprocessors from Advanced Micro Devices, Arm Holdings or Intel and network processors from the likes of Broadcom, Intel, Cavium, Mellanox and Barefoot Networks. Because it’s compatible with the same software as name-brand equipment, but comes …

A refresher course on white box networking equipment Read More »

The Next SDN Leap: Automation and Intent-Driven Networking

Without an agile, flexible, and secure network infrastructure, organizations are in danger of falling behind competitors. That’s why many organizations are seeking to transform their businesses with cloud computing and hybrid cloud environments that are more adaptive and flexible. Software-defined networks (SDN) and network functions virtualization (NFV) can ease that path, but it requires automation …

The Next SDN Leap: Automation and Intent-Driven Networking Read More »

Desktop and mobile malware detection takes on high priority

As the variety of endpoints in the enterprise has increased, so has the variety of malware targeting those devices. End-user computing administrators and security professionals must protect against viruses, worms and spyware, plus emerging threats such as ransomware. And they need new technologies — such as mobile threat detection and unified endpoint management — to …

Desktop and mobile malware detection takes on high priority Read More »