VMware Virtualization Management Blog: Management Automation: The “Catalysts” that Empower the Software Defined Data Center

By Rich Bourdeau

Today, the world revolves around applications. Creating, delivering and managing those applications is a formidable challenge for both Development and IT.  By virtualizing all aspects of the data center (namely, compute, networking, security and storage), VMware customers are moving to a completely virtualized infrastructure. One that can be dynamically configured to meet specific application needs.

Read the source article at VMware Blogs

Understanding the World of Cloud Automation

The modern data center is getting a lot smarter. We’ve got better systems, more optimally controlled resources, and the end-user experience is continuously improving. But there’s a lot more intelligence being built into your cloud platform than ever before. The sheer number of new users and workloads accessing the cloud has forced data centers and various organizations to adopt new, powerful, methods to delivery rich content.

Read the source article at Data Center Knowledge

Building a Structured Approach to the Industrial Network

The linkage between technology and future growth is strong. As McKinsey & Company characterizes, for western economies the growth of GDP will only come from the “do it smarter” companies that build a better business model. 

Read the source article at panduitblog.com

Data Center Security Lessons from Heartbleed and Target

Winston Saunders has worked at Intel for nearly two decades and currently works on making the data center more secure and efficient. Winston is a graduate of UC Berkeley and the University of Washington. You can find him online at “Winston on Energy” on Twitter

Read the source article at Data Center Knowledge

Virtualization—Good Practices for SMBs by Matt Smith

Looking for a way to save money and make your business more efficient? Virtualization can help you with both of those goals. Here’s a look at some of the benefits and best practices:

Take Advantage of the IT You Already Own

Virtualization can help you get more out of the IT infrastructure you have right now. Instead of the standard one-to-one relationship between servers and applications, virtualization allows you to consolidate multiple server tasks onto one machine.

Read the source article at Green Data Center News

DCIM News from Data Center World

Data Center Infrastructure Management vendors continued the race to add features and functionality to their software with a number of announcements at last week’s Data Center World conference in Las Vegas. Companies added to what their solutions can do by both building new features themselves and integrating with partners.

Read the source article at Data Center Knowledge

Hybrid Cloud Computing for the Modern Economy

Robert Jenkins is the chief executive officer of CloudSigma.

Since the dawn of cloud computing, its appeal to businesses could be summed up in three words: scalability, availability and accessibility. But, cloud computing has been around for a while now, and like any other technology, we inevitably reach the point where people start asking what’s next. We live in an age where paradigm-shifting innovations are rolled out more often than at any other point in history.

Read the source article at Data Center Knowledge

Securing a Hybrid Infrastructure

Cloud services have provided a solid alternative for enterprises to consume IT services, but most organisations use a hybrid cloud that combines private infrastructure with specific external cloud services.

Read the source article at J-Net Community – J-Net Community

Guest Users : Friend or Foe to your network?

The question asked then and now is still:  When is a visitor or contractor a threat, and what can be done to mitigate that threat?

It has become expected that organizations provide wireless networks for visitors and staff but increasingly questions are being asked about the threats posed by outsiders given access to wireless services and allowed beyond into an organization’s network. Aside from combating the obvious rogue element it is also important to remember that such users can have malicious effects without intending it, due to malware existing, unknown to them, on their machines.

Read the source article at J-Net Community – J-Net Community

How to measure security?

No one would pretend that an organization’s threats and the effectiveness of its security policy should not be measured and quantified. But what does that mean in reality?

Read the source article at J-Net Community – J-Net Community