IBM Storage Insights: Here’s To Your Storage’s Health…

Storage systems are inherently complex and IT users need to manage their storage environment’s performance, capacity utilization, and health constantly. Vendors have long helped with Call Home capabilities where a storage system sends storage usage data to a vendor. Now IBM has turbocharged Call Home with Storage Insights where more data is collected, where users are able to better self-service their needs through using a feature-rich dashboard, and where IBM can provide deeper and broader technical support when the user needs that extra level of storage management support. Let’s look more deeply into IBM Storage Insights. IBM Storage Insights Delivers a Turbocharged Call Home Capability Call Home has long been a standard and well-accepted feature for many block-based storage systems whereby metadata (such as on performance and capacity utilization) is transmitted from a customer datacenter to a vendor site for storage monitoring purposes. The data can then be used for diagnostic, analysis, and planning purposes that can include proactive alerts to avert a potential problem (such as an early detection of a bad batch of disks that are starting to degrade below acceptable levels) or to more rapidly accelerate the resolution of a problem that has unexpectedly occurred. Although Call Home capabilities vary among vendors, traditional systems can be limited in a number of ways: Reactive alerts only to error conditions such as hardware failures as limited metadata prevents broader usage value; for example, among many other concerns, this means that proactive support for configuration optimization may not be available Users do not have an interface with the system at the vendor site that allows them to self-service, self-manage the process as much as possible; that means a greater (and unnecessary) level of reliance on the vendor for support; while necessary support is valuable, you do not want to in-effect delegate decision-making to someone who is not as familiar with your storage systems as you are May focus on individual storage systems rather than on all the storage systems so there is no unified pane of glass for an IT user to view all critical events easily (usually at a single glance); this makes a storage administrator’s life more difficult The overview of IBM Storage Insights below reveals how IBM turbocharges Storage Insights to overcome those limitations and to provide even more features and functionality. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

Containers are Here! What About Container Security?

The industry is gaga for container technologies like Docker and for good reason. According to ESG research, containers make up about 19% of hybrid cloud production workloads today, but in just 2 years’ time, containers will make up one-third of hybrid cloud production workloads. Not surprisingly, rapid growth and proliferation of application containers have led to several security issues: -35% of cybersecurity professionals claim that their organization’s current server workload security solutions do no support the same functionality for containers, requiring the use of separate container security technologies. This adds cost and complexity to safeguarding valuable IT assets. -34% of cybersecurity professionals claim that they need to verify images stored in container registries meet their organization’s security and compliance requirements. Again, they tend to need specialized tools to accomplish this task. -33% of cybersecurity professionals claim that there is a lack of mature solutions available for container security. This is understandable as container security is dominated by startups and point tools at present (i.e., Aporeto, Aqua Security, Cavirin, CloudPassage, Layered Insight, Neuvector, StackRox, Twistlock, etc.). We are seeing more and more coverage from established players as well like Tenable Networks, Trend Micro, VMware, etc. Cybersecurity pros should pay close attention to this market as vendors and tools are evolving quickly. -30% of cybersecurity professionals claim that the potential for container sprawl creates loose access controls between containers that could leave their production environment more vulnerable. This indicates process and management problems that lead to security vulnerabilities. -27% of cybersecurity professionals claim that portability makes containers more susceptible to “in motion” compromises. And a lot of security pros don’t have the tools to monitor transient containers and microservices as they appear and disappear. To read the complete article, CLICK...

Read More

Is Dell Right? Was The MacBook Air Stupid?

Steve Jobs was a natural manipulator, so much so that folks often referred to him as having his own Reality Distortion Field. This allowed him to say often even contradict himself and get away with it. For instance he once said that video on an iPod was stupid and that no one would ever adapt a tablet because it lacked a keyboard (there is a list of his 6 most impressive false statements here). One effort that really screwed up the PC market for a while was his forced march to the ultimate thin Notebook Computer the MacBook Air. It was a lust worthy device, but the tradeoffs were painful, so much so that Lenovo made fun of it in this video. Why The MacBook Air Sort Of Sucked Now I’m sure a lot of folks legitimately liked the MacBook Air, but I’ve known several that quickly learned they couldn’t live with it. It was simply the wrong product for them and yet they were convinced by some impressive marketing that it was a “Magical” product only to find it was instead a bad buy. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

At .NEXT Nutanix Adds App & System Visibility…

Intriguingly located just down the New Orleans Convention Center hallways from a cannabis-growers conference that was also called ‘Next,’ Nutanix just held its user and partner event. What were the folks at the Nutanix .NEXT event ‘smoking!?’ This year it was a heady mixture of (to borrow the company’s theme) “freedoms” – not just in terms of infrastructure and on-premises IT, but also in terms of a hybrid multi-cloud world…and even personal progress. The underlying enabling-twist to a lot of this was Nutanix adding significant amounts of visibility – whether into such things as application performance or optimum placement of workloads across clouds, compliance, and network traffic – to its original, and continuing, mantra of invisible infrastructure. My colleagues Bob Laliberte and Mike Leone join me in the following ESG On Location video to encapsulate some of the key news and insights we garnered. To read the complete article, CLICK...

Read More

Dell Wyse 5070 – A Thin Client for Global Markets

The PC market is one where form tends to dominate function–where pedestrian features are often dressed up in progressively stylish wrappers to emphasize varying attributes—thinness, lightness, specific application support—and attract certain customers. There’s nothing wrong with that approach. In fact, it’s a model that has long typified many parts of the consumer PC and electronics markets. But it also differs distinctly from thin clients where function leads or even dominates form. Why is that important or even worth discussing? For a number of reasons. First, though many people regard general purpose PCs as ideal solutions for productivity tasks, there are critical differences separating “ideal” and “best”, especially when it comes to the needs of organizations. That point is readily acknowledged at the high end of the market where engineers, financial specialists and others have long utilized powerful workstations instead of the garden variety PCs provided to their office mates. But it is also true for collaboration/knowledge workers and others who typically use a few simple, necessary workplace applications that require modest or even minimal compute resources. Providing those employees full-featured PCs is akin to demanding that people whose transportation needs could be easily met with small sedans drive Humvees instead. Initially, thin clients focused almost exclusively on applications and employees with modest performance requirements. But over time, and with the aid of ever more flexible and powerful compute, storage and networking technologies, thin clients have evolved into workplace solutions that can be adapted and finely tuned for a wide variety of use cases, including tasks requiring robust compute performance. Which brings us to the new Dell Wyse 5070 thin client introduced at Dell Technologies World 2018. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

Three Facts About Multi-Cloud That Will Surprise You

As I’ve often written, multi-cloud is probably the hottest term in the IT industry today. You literally cannot buy a product that connects to the cloud that isn’t multi-cloud (unless it’s from the rare company that aligns with only one cloud service provider). But one of the most interesting things is that there has been very little research on what defines multi-cloud, how extensive it is, why organizations are multi-cloud, and how it will change. ESG recently completed a detailed research study on multi-cloud, its use, and future. For our ESG subscribers, I’ve written a couple of research briefs with the results but I’ve also created this video on three key aspects of multi-cloud that will surprise most people. To read the complete article, CLICK...

Read More