Integrating Windows, Linux, Unix, Macs on Computer Networks

Mixed Network Integration

Subscribe to Mixed Network Integration: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Mixed Network Integration: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories

Many in the IT industry seem to enjoy arguing exactly what does and does not constitute a cloud service. As I mentioned in my post on the controversy over private cloud services, I do not feel that these arguments are productive. We should focus on results and business value instead of arguing about semantics. However, the current crop of cloud storage solutions have many important differences from traditional SAN and NAS storage, something that seems to surprise many end users I meet. Cloud storage capacity is not your fathers blocks and files! Primary, Secondary, and Tiered Storage Most IT infrastructures contain a wide variety of storage devices, but these have traditionally been divided into two categories: Primary or production storage serves active applications and is accessed randomly. The primary category includes most familiar direct-attached disks (DAS), s... (more)

Tightening Security on Virtual Servers

In a news release today, Gartner's Neil MacDonald, vice president and Gartner fellow, says that while "virtualization is not inherently insecure  ... virtualized workloads are being deployed insecurely ... a result of the immaturity of tools and processes and the limited training of staff, resellers and consultants." To improve authentication and access control in virtualized environments, Likewise today announces a technology licensing agreement with VMware. Neil MacDonald is quoted in that news release saying, ""Virtualization platform vendors have realized the need to architec... (more)

Likewise Unveils Enterprise 6 Software

Likewise takes the wraps off of its Enterprise 6 software with quite a few performance improvements and two features, in particular, to call out - Smart Card support and a command line (CLI) administration tool. Likewise joins desktops and servers running Linux, Unix, and Mac OS to an organization's existing network using Microsoft Active Directory (AD). This provides a single, secure framework for authentication and access control in mixed networks. These days, many enterprises - and especially government customers - are turning to dual-factor authentication to further secure th... (more)

PCI Compliance Should Be Easy, But It's Not

When it comes to security, the highest standard to date is the Payment Card Industry Data Security Standard (PCI DSS), a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the PCI DSS is a collection of policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure n... (more)

Marc Andreessen, Ben Horowitz, and Disruptive IT Firms

Andreessen Horowitz has a model I have not seen at any other Venture Capital firm, and that model is paying off for a broad ecosystem of companies, investors and enterprise IT professionals. From the standpoint of an enterprise technologist, the payoff will come by their support of firms fielding capabilities that will make a positive difference for organizations. The best way to learn about their spirit and approach is to review the blogs of their founders Marc Andreessen and Ben Horowitz. But the best way to prepare yourself for coming distruption, in my opinion, is to dive right... (more)

Windows Azure IaaS Reaches General Availability

Today, Windows Azure Infrastructure Services (IaaS), including Virtual Machines and Virtual Networking, has reached general availability. These new services make it possible for you to move your applications into the cloud as is. This announcement is a significant step in our cloud computing strategy, which has been influenced directly by our discussions with customers and partners around the world. One point holds true in every one of our discussions with you - the cloud should be an enabler for innovation, and an extension of your organization’s IT fabric, not just a fancier w... (more)