Dell is the future for EMC and, incidentally, for VMware. But how is this future going to be formed? Assuming the stockholders agree, the deal will go through. How will Dell ingest such a large organization with such a diverse product line that competes with Dell—not to mention VMware, which, while part of the Federation, is traded separately. Let us look at the landscape of EMC with regard to how Dell could create a powerhouse. What are the options available to it? Continue reading Dell: The Future for EMC
In its October 2014 quarterly earnings statement, EMC2 announced that it was taking VCE under direct control and moving it under the umbrella of its federated companies by buying back a significant proportion of Cisco’s share in the company, leaving Cisco with only 10%. Cisco also announced the same. Continue reading Cisco: Post-VCE, Is It a Wounded Bear?
When you hear the term “cloud computing,” Amazon, Google, VMware, and Microsoft are the companies that you most likely think of first. Well, it seems Cisco Systems wants a spot on that list of companies known for their cloud services. Cisco announced in March that it plans to begin offering Cisco Cloud Services to its corporate customers. Cisco is fully committed to making this happen and is ready to invest more than one billion dollars over the next two years to do so. I would venture to say that Cisco is putting its money where its mouth is to enter and compete in a market that is now led by Amazon.
On the January 2, 2014, the Virtualization Security Podcast was joined on the spur of the moment by @Josh_Atwell, who works for VCE, to discuss the security of converged infrastructures. This was of particular interest to me due to my current research on the security of a VCE Vblock. The research got me thinking about converged infrastructures in general. Before the podcast, I posed two questions on Twitter:
- Are converged infrastructures more secure than traditional implementations?
- Can converged infrastructures be more secure than traditional implementations?
When to implement security and data protection practices, or even change existing ones, is all about timing, knowledge, and scope. Deciding what to implement at any particular time requires knowledge of what needs to be fixed, and also of what the future could hold. To do this properly, you need to pay close attention to the threats within your industry, understand their impact, and evaluate them based on risk. Where to obtain such knowledge is always changing, but the scope we apply the knowledge to seems to be static and not changing with the times.