Is automation killing the engineering? When MTV first appeared on the air, the first video it played was, “Video Killed the Radio Star.” Fast forward a few decades and I have to wonder if automation is killing the engineering. In the early days of virtualization the administrators were expected to be proficient in using the command line, and to be honest, if you wanted to really understand how things worked, command line administration was an absolute must-have skill. Virtualization has evolved from those early days. More and more features and services are being added to the infrastructure, such that the need for the vast number of skills required seems to be fading as the technology continues to mature. Looking forward to a time when cloud computing is working to achieve complete and total automation, I have to wonder how administrators will handle the stress of getting issues resolved when automation is not an option. Continue reading Is Automation Killing The Engineering?
At EMCworld 2013, one of the big stories was Pivotal and it’s importance to the EMC2 family and the future of computing. Pivotal is geared to provide the next generation of computing. According to EMC2 have gone past the Client-Server style to a scale-out, scale-up, big data, fast data Internet of Things form of computing. The real question however, is how can we move traditional business critical applications to this new model, or should we? Is there migration path one can take? Continue reading Can you Pivot to Pivotal?
For years we have had an expectation of privacy while using our computers, tablets, phones, email, etc. However, with the advent of big data analysis and everything being on the internet, the internet of things, there is no longer the veil that makes up an Expectation of Privacy. Big Data has allowed us to be tracked in new ways and as we add more devices onto the internet, more of our habits will be tracked: Such as location of boats, planes, your mobile device. Purchasing habits, your location within a store, or theme park. Perhaps even your usage of your toaster, house doors, your refrigerator, etc.
Where do we draw the line? Is there such a thing as personal privacy anymore or do we assume we are being tracked everywhere? When does our social media life end and privacy begin? What is considered to invasive? Continue reading Internet of Things: Expectation of Privacy
In, “How Will VMware Win Against Microsoft?“, we addressed the question of if Microsoft is making the hypervisor a free part of the operating system (which it is), how could VMware effectively combat a free hypervisor that is at feature parity with its own. One of the answers was to bundle products with the hypervisor (vSphere) that were valuable and differentiated, thereby making the case that VMware’s hypervisor was effectively free as well. VMware has taken a step in that direction with vSphere with Operations Management (vSOM). Continue reading VMware Delivers a New Bundle – vSphere with Operations Management (vSOM)
Converged infrastructure comes in many forms. Some vendors put a bunch of discrete hardware together on a pallet and call it “converged.” Others think that their use of iSCSI or FCoE means they’ve got converged storage. Yet the real holy trinity of convergence is when a vendor converges compute and storage resources on three fronts: acquisition, implementation, and ongoing management. This is where Nutanix operates. Continue reading A Look at the Nutanix NX-3000 Virtual Computing Platform
What is the future of virtual storage in a Software Defined Data Center (SDDC)? As more and more technology gets moved from hardware to software in the SDDC, I have to wonder which direction virtual storage will go. Continue reading What is the Future of Virtual Storage in a Software Defined Data Center?