Evaluating product features, comparing prices, and doing proofing of concepts are important steps in the process of adopting almost any new product. But once one completes those steps, the time arrives to start to roll the product out and implement it. In this second installment of my interview series with System Architect, Fidel Michieli, he shares how his company gained a comfort level with Cohesity for backup and disaster recovery (DR) and how broadly it decided to deploy the product in the primary and secondary data centers.
This year’s Veritas Vision 2016 conference held a lot of intrigue for me. The show itself was not new. The Vision show has been an ongoing event for years though this was the first time in more than a decade that Veritas was free to set its own agenda for the entire show. Rather the intrigue was in what direction it would take going forward. This Veritas did by communicating that it plans to align its product portfolio and strategy to deliver on an objective that has, to date, eluded enterprise organizations and vendors alike for at least two decades: enterprise data management.
It is almost a given in today’s world that for almost any organization to operate at peak efficiency and achieve optimal results that it has to acquire and use multiple forms of technology as part of its business processes. However what is not always so clear is the forces that are at work both insider and outside of the business that drive its technology acquisitions. While by no means a complete list, here are four (4) forces that DCIG often sees at work behind the scenes that influence and drive many of today’s technology infrastructure buying decisions.
DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.
DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.
Earlier this year, DCIG interviewed the executive team at GroupLogic. GroupLogic shared with us how they approach the market for “enterprise file sharing” or what DCIG has been calling File-Sync-and-Share. In addition, we had the privilege of talking to Chris Broderick, CEO of GroupLogic who covered some of the company’s history.
Information managers can expect data storage companies to drive significant campaigns around Big Data as we enter 2012. Storage is the least of anyone’s concerns, according to The Economist Intelligence Unit (EIU) report Big Data: Harnessing a game-changing asset. Information Governance in 2012 requires Data Science strategy and practitioners be added to all business teams.
Consumerization of content consumption models exposes opportunities to incorporate business process metadata with Big Data. Consumerization includes proliferation of social networks, content syndication and mobile devices, such as Apple iPAD, Samsung Tablet, etc. Consumerization of content merging with Enterprise Business Big Data is a challenge best met by standardized content interfaces.
Over the years big data has crept into the everyday life of systems administrators. Attempts to solve the big data problem in both block and file storage emerged as data management software. While data management software struggled to get a footing, deduplication and compression took off stunting data management software’s growth.
Deduplication and compression technologies have well known capabilities in both the storage and information disciplines. However, they differ in a significant way. These technologies do not ease the burden of information management.
Upon arriving at Symantec Vision on Wednesday morning, it quickly became evident that the messaging at this year’s event focused on how the business world is shifting from a Systems-Centric View (policies and governance is done according to the physical devices on which they reside such as servers, networking and storage) of data management to an Information Centric View (policies and governance are set independent of what storage device on which the data resides).
Obama’s administration allocated $17B of the recent (Feb 09) stimulus spending package to healthcare, for the purpose of building better healthcare infrastructure. The goal of the new infrastructure is to move patient records online and enable a ubiquitous Electronic Health Record (EHR) to be shared universally among hospital systems. Obama himself promised a total of $50B in spending for this purpose during his campaign. Some experts believe that even more is to come. But, now that some of the money is allocated, how are healthcare institutions getting access to it and what are they doing with it?