Resources (557)

  1. 090  – Blurring the Memory/Storage Lines

    It’s the age-old IT tradeoff: the speed of memory, with its lack of persistence, vs. storage, which is slower but persistent. More and more, however, this tradeoff is being minimized, with new technologies offering the promise of both speed and persistence. MemVerge is one of the companies at the leading edge of this revolution, and they join ActualTech Media Partner James Green to discuss th… Listen Now

  2. 089  – The Cloud and the Pandemic

    Coronavirus has taken a terrible toll on the world, and changed everything. On the IT side, one of the most obvious ways things have changed is the “new normal” of cloud computing moving to the center of operations. Even when business starts to return, there will be more remote work than ever being done, and it’s likely to be a permanent situation. That means a need for cloud solutions th… Listen Now

  3. 088  – Moore's Law Is Dead: What It Means for Storage

    Moore’s Law, which held that processor speeds would double every 18 months to 2 years, is dead, according to Pliops President/CBO Steve Fingerhut. Because of that, the burden now falls on storage to provide the kind of performance that the current IT environment demands. Fingerhut discusses these issues on this episode of “10 on Tech” with ActualTech Media Partner James Green. What’s ne… Listen Now

  4. Branch Maintenance via Out-of-Band Management

    Out-of-band management, aka OOBM, plays a vital role in modern IT operations of all sizes and scales. Indeed, OOBM might be judged “mission critical” for headquarters operations and data centers alike. But OOBM is tremendously important for satellite IT operations, as well, most notably for branch and remote offices. Such operations span a wide range of locations and roles, with tens to hun… Read More

  5. Stay Connected with Out-of-Band Management

    During a security assessment, auditors always ask this one question: “How do you manage your devices?” The answer should be: “out-of-band management.” Is that your answer? If not, you may have issues that need immediate attention. What Is Out-of-Band Management? Let’s get started with a definition. Out-of-band management, or OOBM, is a technology that allows you to connect to devi… Read More

  6. Systems Management and the FCAPS Standard

    Managing systems and networks ultimately means understanding what they comprise, what they can do, and who’s allowed to use them. In IT, systems and network management is an important discipline with a long history, with many approaches and tools to implement them. FCAPS Sets the Management Stage A comprehensive model for network and device management appeared in the 1980s as part of the Ope… Read More

  7. Tips for Proper Out-of-Band Network Design

    Out-of-band (OOB) networking provides a separate, independent pathway in and out of systems and networks. OOB doesn’t depend on production networks to access equipment, perform management and monitoring tasks, make repairs, or access data for legal or technical reasons. But what’s the proper way to set up an OOB network? Do you know and understand how they differ from standard networks? If… Read More

  8. 087  – Tech Conferences Ain’t Dead!

    COVID-19 has changed everything, and hit every area of life. That’s also true for the tech industry, and no part of our industry has been hit harder than tech conferences. What’s their future? That’s what ActualTech Media Partner James Green and HashiCorp Head of Global Events & Experiential Marketing Jana Boruta tackle on this episode of “10 on Tech.” The reality is that no one kn… Listen Now

  9. 086 – Kubernetes Grows Up

    How is Kubernetes like the virtualization industry? They both got their start as niche technologies, but as their usefulness became evident, they started to get more mainstream adoption. That led to more development of the technology, extending it further, which led to more adoption, and so on. Kubernetes today experiencing a similar growth curve, argues Rancher CMO Peter Smails in this episode… Listen Now

  10. 085 - Don’t be Scared of Security

    There are many things to be worried about these days when it comes to IT security. There’s so much to know that it can be difficult to even know how to get started. As ActualTech Media Partner James Green says in this edition of “10 on Tech” with Devolutions, doing nothing means possibly leaving an attack vector left open. But the risk of doing something, and doing it wrong, can also leave y… Listen Now

  11. 083 - The ‘Keys’ to Proper Key Management

    It may seem odd at first glance for a traditional storage company like StorMagic to branch out into the area of security—specifically, key management. But as StorMagic Chief Marketing and Product Officer Bruce Kornfeld explains, it’s actually a natural progression. After all, in this day of data being everywhere—on-premises, off-premises, in the cloud, at the edge—it’s more important… Listen Now

  12. 084 - Proper Cybersecurity Starts With Getting Back To Basics

    You know you need to implement proper cybersecurity in your environment. But how do you do that? Where do you even start? That’s the topic of this episode of “10 on Tech,” featuring Liam Downward and Michael Hogue of Data Spotlite. They discuss these issues and more with ActualTech Media Partner James Green. One of their central points is that you have to understand your own environment b… Listen Now

  13. SASE: Rethinking Network Security in the Age of the Globally Distributed Cloud

    Today's network security solutions are proving inadequate, based on a major shift in the spotlight on where data and resources are located and work is performed in the enterprise network. With the increase in remote-based users, Software-as-a-Service (SaaS), and globally distributed cloud services, the focus of identification has changed from the data center to the user or device. This isn't yo… Read More

  14. The 'Three E's' of Exceptional IT Content

    In my work the last few years, I’ve overseen the creation of content that helps IT vendors connect with information-hungry IT buyers. I’ve been observing how that content is received and find the '3 E’s' mnemonic a helpful way to remember each ingredient. I’m constantly teaching my team (and the army of contributors we work with) to think about these things. Here they are... Read More

  15. Where to Spend on IT Content Marketing in 2020

    We polled our audience to find out how they feel about the standard stable of IT marketing tactics and assets. The overwhelming feedback we received reveals six key areas we recommend that our clients invest in, and three that are little more iffy in terms of bottom-line results. Read More

  16. How Impactful Is VMware’s New Core-Limited Licensing?

    This week, VMware announced new licensing restrictions for vSphere, which I wrote about here.  I wanted to get more understanding for how impactful this change would be for existing customers.  On today’s ActualTech Media EcoCast, I asked our audience for two pieces of information.  The first asked viewers if they have any servers with individual processors of more than 32 cores.  The second… Read More

  17. VMware’s Licensing Change Redux: Better the Second Time Around

    The year was 2011. I was comfortably ensconced in my office at Westminster College watching as VMware brought out a marketing executive to discuss the company’s revolutionary new licensing program. As soon as I saw that it was a marketing person giving the news about a change in licensing, I thought to myself, “This isn’t going to be a positive announcement.” And it wasn’t. vSphere… Read More

  18. Report: Cloud Spend Tops Data Center Spend for First Time in 2019

    “Trend” stories have some value, in the same way virtual machine snapshots have some value: they’re helpful, and often quite helpful, as long as you understand their limitations. (And always remember: a snapshot is not a backup!) You know the end-of-year trend articles: “Top Stories of 2019,” “Most Downloaded Songs of 2019,” and so on. They provide a look at what happened in the p… Read More

  19. Google Anthos: Kubernetes the Easy Way

    Kubernetes continues to gain popularity in the industry, and shows no signs of slowing down. This container management platform has essentially won the container wars, and is now the de facto orchestration tool for containers. Kubernetes is popular because managing containers is a serious pain. But Kubernetes itself is a pain, too—ask any admin who’s tried to bootstrap it. In fact, the most… Read More

  20. WannaCry Ransomware Hits Hard in 2019

    If your organization was pummeled by the WannaCry virus last year, you’re not alone: nearly a quarter of all ransomware attacks were of that variety. And the damage it did was staggering. That’s according to PreciseSecurity.com, which reported that WannaCry was the most common crypto ransomware attack of 2019, accounting for 23.56% of all such assaults globally. The article also estimate… Read More