Mar2016

More Secure vs. Better/Cheaper/Faster … or Both?

With the myriad cases of cyber-theft and security breaches that headline the news every day, it’s no wonder that system improvements are taking a back seat to security items within most IT organizations. While many vendors highlight new products or …
Read More “More Secure vs. Better/Cheaper/Faster … or Both?”

Sep2015

The Container Security Gap is Rapidly Closing

I have been following containers for quite some time now. A year ago it was safe to say that container technologies like Docker were far from production ready when it came to security. What I have seen over the past year is …
Read More “The Container Security Gap is Rapidly Closing”

Aug2015

Which Data Is Passed from My Physical Device to the Virtual Infrastructure?

With the proliferation of virtualized applications and desktops, the concept of any user accessing any application or desktop from any device has become reality. Whether accessed from a smartphone, tablet, or desktop, whether tethered or untethered, all the resources that …
Read More “Which Data Is Passed from My Physical Device to the Virtual Infrastructure?”

Feb2015

The Circle of Virtualization: Yesterday, Today, and Tomorrow

With half of the first quarter of 2015 already behind us, many IT organizations are in fast-forward mode, making progress on addressing annual projects and goals, including many that involve virtualization. With the plethora of new products and services available, …
Read More “The Circle of Virtualization: Yesterday, Today, and Tomorrow”