Softbank and ARM… Heaven/Hell?

The proposed acquisition of UK-based ARM Holdings, LTD by Japan-based Softbank has generated more than a little controversy and commentary since its announcement on Sunday. That’s certainly related to the $32B size of the all-cash offer, but the deal also touches a number of economic, business and political third rails. Those are worth examining, as is the likelihood of the success of the venture if it closes according to Softbank’s plans. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

Why Video Conferencing… Waiting for Holoportation

I’m writing this as I wait between planes at San Francisco Airport and contemplate just how much closer I’ll be to getting cancer after I’m done with my latest trip. I can still remember when travel was exciting and fun but that was a long time ago, and even though I have almost every perk and travel advantage known to man, I’ve come to really dread getting on a plane. Back in the 1960s—yes, 1960s—not only was flying far more fun, but we thought that by now we wouldn’t be doing as much of it. Instead of traveling on a plane to a meeting we’d more often use some kind of video call. But even though there have been hundreds of thousands of video conferencing systems sold–most laptops, smartphones, and tablets have this capability baked in, Facetime was heavily promoted by Apple, and the market has consumed millions of USB video cameras—we actually get on planes more now than we did back then. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

Cybersecurity: a vertical industry application?

Cybersecurity has always been a horizontal technology practice that’s roughly the same across all industry sectors. Yes, some industries have different regulations, use cases, or business processes that demand specific security controls, but overall every company needs things like firewalls, IDS/IPS, threat management gateways, and antivirus software regardless. Generic security requirements will remain forever, but I see a burgeoning trend transforming cybersecurity from a set of horizontal technologies to a vertical industry application. These drivers include: To read the complete article, CLICK...

Read More

The gold standard for data protection keeps evolving

Yes, of course, data protection has to evolve to keep up with how production platforms are evolving, but I would offer that the presumptive ‘gold standard’ for what is the norm for those on the front lines of proactive data protection is evolving in at least three different directions at the same time. Here is a 3-minute video on what we are seeing and what you should be thinking about as the evolutions continue. To read the complete article, CLICK...

Read More

Cisco: from CLI to cloud

With DNA, Cisco is prepping for a future where network devices can be managed from the cloud. At last week’s Cisco Live, I heard about how Cisco is working to change how network devices will be managed in the future. This will be a gradual evolution, rather than a sudden blockbuster change, but will require some adjustment for traditional networking administrators accustomed to CLI. Network admins are accustomed to configuring and devices one at a time and devices performed tasks locally. Of course, they have communicated with other peer networking devices using protocols such as BGP to exchange routing information, but the network has been fundamentally a distributed system of independent devices. Some centralization is possible with network automation tools that perform configuration settings on many devices, or more recently, SDN controllers such as Cisco APIC or OpenDaylight, which have started to create an architecture that coordinates a large part of the network. To read the complete article, CLICK...

Read More

IBM’s POWER9 Microprocessor…

Over the past several years, all major server makers have focused on redesigning their server architectures in order to eliminate data flow bottlenecks – building what have become known as “accelerated systems”. Likewise, the major developers of database software have also found new ways to speed database processing. This combination has created a data-processing panacea for fast, efficient and affordable processing of very large databases (Big Data). As far back as early 2013, Clabby Analytics started to report on the progress being made in accelerated system designs (our reports on VelociData, The Now Factory, IBM’s PureData system, IBM’s DB2 Analytics Accelerator and IBM Power Systems accelerated designs are available upon request).   Accelerated system designs focus on speeding workload processing by improving system throughput. Improved throughput is achieved in a variety of ways including increasing internal bus speed, reducing communications overhead, off-loading tasks to other types of processors, improving memory management, reducing I/O drag, tuning execution methods, creating new interfaces that streamline peripheral access to processing power, and more. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More