Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?
Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into...
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...
Containers Hold an Agile Approach to Data Center Virtualization
According to the Merriam-Webster dictionary, container is a noun, and is defined as a receptacle for holding goods. Alternatively, it also means, a portable compartment in which freight is placed (as on a train or ship) for convenience of movement. In this blog, I’ll be talking about containers in the networking sense and the important […]
The Napkins Dialogues: Life of a Packet (Walk), Part 1
Lately I’ve been giving a lot of presentations about storage basics. I actually really enjoy it, because it makes me rethink some of the things that I took for granted, and it helps me understand some of the gaps in my own knowledge when questions arise. When you think of how we do certain things […]
#EngineersUnplugged S5|Ep10: Automation Demystified!
Welcome back to an amazing episode of Engineers Unplugged, featuring Alan Renouf (@alanrenouf) and Patrick Carmichael (@vmcarmichael) demystify automation in the modern data center in less than 10 minutes: built-in, scripts, workflow, and policy-based. Answers to your most answered questions about how to start, where to simplify, and elimination of human error. Don’t miss this […]