Chris MacKinnon's Blog (149)

Setting Prices for Private Clouds

As more and more private clouds are deployed, organizations will face the requirement to implement chargeback or at least show back. Key to implementing chargeback is...

 

More Here

Added by Chris MacKinnon on September 13, 2011 at 13:51 — No Comments

The Next Big Storage Hurdle: Preserving Social Media

Just as organizations faced regulatory and legal pressures to archive and discover emails over the last decade, they now face those same pressures to preserve their social media communications. Most, however, are not doing so. As a result...


More Here

Added by Chris MacKinnon on September 7, 2011 at 13:36 — No Comments

Server Failure? Not Here.

Today’s businesses are searching for ways to reduce costs, yet maintain reliable access to critical Web and cloud-based applications—even in the event of server hardware failure...

 

More Here

Added by Chris MacKinnon on August 30, 2011 at 13:27 — No Comments

Separating Hype From Reality About High-Efficiency or “Eco-Mode” UPSs

If you have dealt with UPSs for any length of time, you have no doubt heard plenty of hype about high-efficiency or “ecomode” UPSs in the past. Those terms generally referred to UPSs that switched between modes to improve efficiency. Some form of multi-mode capability has been available on UPS products for years. But, those conventional multi-mode UPSs have their limitations...

 …

Continue

Added by Chris MacKinnon on August 29, 2011 at 16:01 — No Comments

Simplifying Data Center Management with Converged Network Fabrics

Two disruptive trends have recently dramatically increased the data protection challenge: massive growth of digital data and the adoption of virtualization technologies that are driving server consolidation. Massive growth in data storage and processing and a decrease in physical server counts with virtualization technologies...

 

More Here

Added by Chris MacKinnon on August 25, 2011 at 13:49 — No Comments

Private PaaS: Highly Beneficial To Enterprises

Public PaaS, for a variety of reasons, is not accessible to a majority of enterprise IT use cases. However, PaaS in general is highly beneficial to enterprises as it automates typically mundane and long running tasks such as application deployment and provides a foundational architecture for guest application scalability. Private PaaS allows enterprise developers to access the value of PaaS without the accessibility problems of public PaaS since it is offered to them by their own IT…

Continue

Added by Chris MacKinnon on August 22, 2011 at 15:28 — No Comments

How one of the ‘Top 20 Cloud Infrastructure Vendors of 2011’ Found a Better IT Management Solution

As enterprises with large-scale applications or content adopt cloud computing and managed services, the costs to properly monitor, analyze and report on availability and performance become more challenging and more expensive. That challenge and its associated cost was just one of many reasons Stephanie Tayengco, Vice President of Network Operations and the Logicworks team sought a better IT management solution...

 …

Continue

Added by Chris MacKinnon on August 18, 2011 at 13:38 — No Comments

Transitioning to IPv6

Organizational inertia is the single biggest challenge to the embrace of IPv6 in many large telecom companies. Fear, uncertainty and doubt are often factors; indeed, it is often difficult to devote resources to immediate problems, let alone to a problem whose costs will accrue at an unknown time. Another factor is the...

 

More Here

 

Added by Chris MacKinnon on August 12, 2011 at 15:39 — No Comments

How To Protect Your Network Against Zero-Day exploits, Brute Force Attacks and APTs

Throughout the first half of 2011, cyber criminals stunned the business community with unprecedented attacks on industries once thought impregnable. Despite a substantial increase in IT security spending this year – up 4.5 percent from 2010 according to a Morgan Stanley survey – spear-phishing campaigns, security flaws in SecureID tokens, and an increase in Advanced Persistent Threats (APT) have led to successfully executed attacks against companies like Sony, Citigroup, Lockheed Martin,…

Continue

Added by Chris MacKinnon on August 1, 2011 at 14:38 — No Comments

Lowering Cooling Expenses without Risking Downtime

Temperature monitoring throughout the data center facilitates efficient, cost effective cooling without risking hot spots and downtime.



Cooling costs in the data center can comprise a substantial portion of an IT department’s operating expenses. While guidelines for temperatures are slowly increasing and cooling solutions become more efficient, inadequate cooling still poses a serious threat to uptime and reliability. Simply overcompensating by lowering overall temperature is a…

Continue

Added by Chris MacKinnon on July 29, 2011 at 14:16 — No Comments

Can You Trust Your Cloud Data Center Security?

...The fact that so many cloud providers – large and small – have no interest in managing privileged identities and segregating duties to limit access to sensitive data and systems should give customers pause before putting their most precious data and resources in the hands of many providers.


[URL="http://www.datacenterpost.com/2011/07/can-you-trust-your-cloud-data-center.html"]More Here[/URL]

Added by Chris MacKinnon on July 7, 2011 at 15:03 — No Comments

Five Capacity Management Challenges for Private Clouds

Organizations that are seeking to deploy “cloud” based business models for their infrastructure face unique capacity management challenges. This post will review these challenges to enable cloud providers, either public or private, to avoid the pitfalls of improper capacity management. While the post discusses both types of clouds, the needs of private cloud providers will be especially highlighted due to the unique challenges they face with this business model.…



Continue

Added by Chris MacKinnon on July 6, 2011 at 13:32 — No Comments

When Hackers Breach Your Databases Will You Be The Last To Know?

Anyone reading a newspaper or watching the evening news is aware of what seems to be a weekly occurrence of major data breaches – recently, Epsilon and Sony have dominated the headlines. The fact is that any type of breach – major or minor – can cause serious damage that will negatively impact the organization for months or even years after the actual incident.



More…

Added by Chris MacKinnon on June 30, 2011 at 16:56 — No Comments

Combating Botnets and Other Malware

Cybercriminals create autonomous applications called bots that can infect networks in a variety of ways, via Web or email. A botnet is a network of these applications that are capable of acting on instruction once they are triggered. This happens when a bot, that may be dormant in your network,, “calls home” via any port. This allows perpetrators to control infected computers via their command and control hosts residing outside your network. In a study of 130 large companies done by…

Continue

Added by Chris MacKinnon on June 28, 2011 at 19:23 — No Comments

Adding I/O on Demand - Leveraging IOV (I/O Virtualization)

Traditional data center managers and IT admins take a conservative approach related to managing/provisioning I/O connectivity to rack mount based servers, typically installing multiple network interfaces cards (NICs) and storage host bus adapters (HBAs), with redundant cables/switches. This causes a burden on IT’s ability to agile/responsive to their business needs, as the setup/teardown of these environment are both time consuming and costly.

 …

Continue

Added by Chris MacKinnon on June 24, 2011 at 13:22 — No Comments

Why Is Cable Sprawl A Problem?

Cost: When you include the resources at both ends of the cable – the switch ports and adapter cards – a single cable can represent up to $4000 in CAPEX.



Downtime exposure: Even with the most rigorous best practices observed, a cable is still the physical device most likely to fail and one of the hardest to troubleshoot.



Cooling: Efficient cooling requires unrestricted airflow. A wall of cables impairs that, causing equipment to run hotter and cooling systems to work…

Continue

Added by Chris MacKinnon on June 21, 2011 at 12:54 — No Comments

An Innovative Approach to Managed Hosting

A quick survey of the market tells us a number of key things about managed hosting in terms of the value proposition offered, as well as the challenges that it can present. The value proposition seems clear: Organizations that need their infrastructure managed and don’t have the internal resources to do so can either expand their IT capabilities or look externally to a service provider to take on the work. Many choose the second option because it is much faster and more cost effective than…

Continue

Added by Chris MacKinnon on June 16, 2011 at 16:41 — No Comments

Business Process Automation: Emerging As Its Own Market

Our customers tell us that analyst reports are true: IT & Operations budgets in the last 4 years have increased only 22%, while IT workloads have increased 165%. CIOs are saying "do more with less." Automation is the often the answer. 



As automation tools become more powerful, true unattended automation in the data center is accessible and possible. Automation tools used to be a small sliver of the $8 billion Business Process Management (BPM) space, but we feel as automation…

Continue

Added by Chris MacKinnon on June 15, 2011 at 13:52 — No Comments

Watch Out For Falling CFD Prices

For data center managers wrestling with demands to increase performance, server hot spots remain the bugaboo. Would it be better to shift racks around, replace equipment or just throw more CRACS at the problem?



For some companies, CFD (computational fluid dynamics) analysis delivers the answer. Its 3-D models of temperatures and flow can replace guesswork with answers accurate within 10% or better. What better way to design new facilities or enhance existing ones.

 …

Continue

Added by Chris MacKinnon on June 14, 2011 at 12:52 — No Comments

Four Steps to Identify Legacy Data and Collection Strategies

In today’s litigious society it’s more important than ever to have a sound and defensible data retention and collection strategy. New regulations, changes in market expectations and advancements in technology make it wise to review legacy data identification and collection strategies. Old technology that was once state of the art or “tried and true” may no longer be so.



Below are four key items that should be considered when defining a new, defensible process.

 …

Continue

Added by Chris MacKinnon on June 13, 2011 at 12:44 — No Comments

Connecting data center industry professionals worldwide. Free membership for eligible professionals.

Events

Follow Us

© 2024   Created by DCPNet Admin.   Powered by

Badges  |  Report an Issue  |  Terms of Service