Word of the Day: Tech Definitions from WhatIs.com

December 11, 2008  1:09 PM

Overheard – All we are saying…is give clouds a chance

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
kyle_rankin.jpg If you can increase your capacity simply by adding another twenty nodes to your infrastructure (such as with standard clustered LAMP deployments) you should try putting a few nodes in a cloud for a month and see if it works for you.

Kyle Rankin, Data center panel weighs cloud computing risks, rewards

December 10, 2008  4:44 PM

Overheard – Key to cloud is an old-fashioned SLA

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
cloud_dollars-sm1.jpg “Cloud computing” is an apt name for a technology that is many things to many people. Although each vendor that enters the space seems to have a different approach to cloud services, all of them face a common challenge: coming up with an achievable service guarantee to reassure hesitant customers.

Erika Morphy, Cloud Computing, Part 3: SLA Spirit in the Sky

Take the tech challenge for service level agreement.

December 9, 2008  11:23 PM

Overheard – A hybrid cloud is not a cloudburst

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
jeff-barr.jpg Cloudbursting is an application hosting model which combines existing corporate infrastructure with new, cloud-based infrastructure to create a powerful, highly scalable application hosting environment.

Jeff Barr, Cloudbursting – Hybrid Application Hosting

I could have come up with some kind of lifeless and forgettable acronym, but that’s not my style. I proposed cloudbursting in a meeting a month or two ago and everyone seemed to like it.

I really like Jeff Barr and usually agree with his observations, but this time I think he missed the boat…er cloud. The term cloudburst doesn’t really describe a hybrid model at all. And it has a negative connotation. And it’s already been used in the blogosphere to describe what happens when your cloud is unavailable.

Remember Microsoft’s Hailstorm? Not a good name either. Still, I can see why Jeff didn’t want to just slap an ordinary acronym on the concept. Hybrid Application Hosting. HAH?

We need to put on our thinking caps and help him out.

December 9, 2008  2:51 PM

Overheard: Cisco steering towards video

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
suraj-shetty.jpg Earlier performance-enhancing technologies, such as MPLS, helped support video as one of many applications. Now it’s time to address video as the main application.

Suraj Shetty, as quoted in Cisco, anticipating video tsunami, builds up network smarts

I’m keeping an eye on the Cisco Media Processing platform. The takeaway is that Cisco is taking another step to position themselves as the company that’s going to help network administrators handle video traffic better.

Cisco marketing is pushing the idea of “Medianet.” The idea is that an intelligent network will understand what format to convert the video and then the hardware will transcode the video so it can play on any device, including digital signage (another area Cisco has been positioning themselves as Number 1). Video transcoding converts the content into different formats so it can be viewed on different types of devices. It’s key to managing bandwidth and storage and it’s been a real brick wall for video.

The first product for Medianet is called the Cisco Media Experience Engine 3000, otherwise known as MXE. It’s expensive — $50k — and I’m not quite sure yet who the customer is. Cisco also introduced the Cisco Advanced Video Services Module (AVSM). It’s part of the Cisco ASR 9000 edge router. The literature says AVSM enables “terabytes of streaming capacity at the aggregation edge while simultaneously offering content caching, ad insertion, fast channel change and error correction.”

December 8, 2008  8:24 PM

Overheard: How does anomaly-based monitoring fit into tomorrow’s security picture?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term.

Jamie Arnold, as quoted in SUNY’s Binghamton Monitors Network with Lancope’s StealthWatch


I spent part of the morning reading about anomaly-based network monitoring. In October, IBM announced that they would no longer sell the IBM Proventia Network Anomaly Detection System (ADS). Stealthwatch seems to be getting a lot of buzz, especially with college campuses whose biggest threats probably come from right inside the network.

December 8, 2008  7:12 PM

Overheard – Facebook Connect is like Beacon without the marketing sleeze

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
om_malik.jpg Facebook Connect, which was announced in May and is being rolled out this week, allows you to use your Facebook login to access Facebook’s partner web sites, then broadcast what you are doing on those sites to everyone on Facebook. It’s like Facebook Beacon — minus the marketing sleaziness.

Om Malik, Social Web’s Big Question: Federate or Aggregate?

Alex Howard did a great job summarizing some of the issues surrounding Facebook Connect. I’m watching to see how long CNET uses it as a way to register. Will they keep it — or quietly drop it?

December 5, 2008  6:13 PM

Overheard – Lean production and specialization are at odds

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
earll_murman.jpg The hierarchical and rigid structure [of the traditional organizational structure] results in extreme specialization of job functions and a large number of job classifications; it is incompatible with the team approach of lean production, in which workers perform many tasks and have few job classifications.

Earll M. Murman, Ph.D., From lean production to lean enterprise

Got a minute? Take today’s quiz!

December 3, 2008  10:43 PM

Overheard – What does an Infiniband server switch look like?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Product manager Robert Stromer demos Cisco SFS 7000 Series InfiniBand server switches.

[kml_flashembed movie="http://www.youtube.com/v/jzSGJSNVOoQ" width="425" height="350" wmode="transparent" /]

Brock, from Saint Paul, MN shows off a new cluster from Penguin Computing – including the storage controller and the InfiniBand switch.

[kml_flashembed movie="http://www.youtube.com/v/a7Ya7jXlKS4" width="425" height="350" wmode="transparent" /]

December 3, 2008  1:42 PM

Overheard – Virtual port technology provides user with reliable wired-like experience

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
radio-wave.jpg With the introduction of virtual port technology, the common pooled resources of virtual cells can be partitioned into multiple virtual WLANs, with a unique WLAN for each user device; the dedicated virtual WLAN moves with the user as long as his device is connected to the wireless network.

Mirko Zorz, Meru Networks brings virtualization to wireless LANs

As with wired switches, the network has full control over the resources and services allocated to a given device. Because the device is “sandboxed” in its own virtual WLAN, the user has a highly reliable wired-like experience, with full access to appropriate resources yet protected from disruptions by other users’ network demands. When devices are partitioned into their own dedicated virtual WLANs, the network can control client behavior in ways that proprietary client driver extensions and AP radio management technologies cannot – without adding any client software. As with virtual cell technology, virtual port technology is fully based on IEEE 802.11 standards.

December 1, 2008  5:49 PM

Overheard – IBM takes a page from Apple when building Blue Business Platform

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
thomas_yung.jpg The model we tried to emulate in the project codenamed Blue Business Platform was to think just like the Apple iPod model — the iTunes Store (Smart Market), iPod (Smart Cube), and the iTunes desktop application (Smart Desk).

Thomas Yung, IBM Blue Business Platform morphs into IBM Smart Business

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: