Aug2014

News: DataGravity Wins Best of Show at VMworld

VMworld 2014 is in full swing, with more than 23,000 people having made the pilgrimage to San Francisco for this this year’s show. Thus far, things appear to be well-organized and running very smoothly. During my first walk through the Expo …
Read More “News: DataGravity Wins Best of Show at VMworld”

Apr2014

Storm in a Teacup, or as Elmer FUD Would Say, “Shhh—be vewy vewy quiet; I’m hunting wabbits”

What is it about the tech world that always seems to put us at each others’ throats? FUD is thrown around like candy from a broken piñata. Notable oppositions that come to mind are EMC vs. NetApp, block vs. file, …
Read More “Storm in a Teacup, or as Elmer FUD Would Say, “Shhh—be vewy vewy quiet; I’m hunting wabbits””

Jul2013

Securing the Hybrid Cloud

The secure hybrid cloud encompasses a complex environment with a complex set of security requirements spanning the data center (or data closet), end user computing devices, and various cloud services. The entry point to the entire hybrid cloud is some form of End User Computing device whether that is a smart phone, tablet, laptop, or even a desktop computer. Once you enter the hybrid cloud, you may be taken to a cloud service or to your data center. The goal is to understand how the data flows through out this environment in order to properly secure it and therefore secure the hybrid cloud, but since it is a complex environment, we need a simpler way to view this environment.