The Basics of DCIM

We have remarked several times in this space about the tremendous changes in the data center in such a short period of time. Not only are device footprints shrinking and functionalities converging, but the way that hardware and software are managed has become more comprehensive and streamlined. Now the same thing that has happening to […]

Market Surveys from Disaster Recovery Journal and Forrester

“I only believe in statistics that I doctored myself.” Winston Churchill said a lot of things, but despite the rumors, fact checkers don’t believe he really originated this saying. It is actually a common joke in the German language that the Nazi propagandist Goebbels misattributed to the British leader. Another false quote did not really […]

Drilling for Disaster Recovery

On an Air Force base in San Antonio, Texas, two men walk into the base exchange. They show their IDs to the clerks, don Halloween masks, and proceed to play the part of terrorists. “This is a drill! We want liberation!  This is only a drill!” Airmen shopping in the facility give them funny looks, […]

Environmental Monitoring Just Keeps Getting Better

A data center has many components, but none are more critical than the environmental monitoring system. The technology infrastructure may be state-of-the-art, but if such things as heat or moisture are left unchecked, then all that expensive equipment could fail and cost unnecessary expenses and downtime. Data center managers must have an all-of-the-above strategy that […]

Data Backup Is Not Optional

As with most information technologies, the concept of data backup is as deep as it is broad. That is to say, there are many dimensions and facets to the backup of data, and you can spend anywhere from a few days to a few months trying to get a handle on it. A definition is […]

Zero Day Exploit Protection

They say what you don’t know can’t hurt you — but that’s not really true. One example is a zero-day exploit. This is a network vulnerability that hasn’t been identified yet, at least not by the people who need to fix it. These IT professionals have zero days to fix the problem because they don’t […]

Protocol Anomaly Detection

It’s late at night and you’re walking to your car after attending a community event. Your car is still a block away. As you walk, you scan the scene before you. Something is just not right, you say to yourself. On the dark sidewalk ahead of you, you see two silhouettes. They are moving about, […]

What You Should Know About APIs

We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]

Guarding Against Data Loss

In 2013, a U.S. military judge sentenced PFC Bradley Manning to 35 years in prison. His crime, as everyone knows, was leaking confidential information. Manning illegally downloaded data to a CD and gave it to Wikileaks. The intentional release of sensitive information is just one way that data loss occurs within an organization. Sometimes it […]

And You Thought Your Transactions Were Safe: SSL Based Attacks

Your plaintext internet traffic is subject to attack. You already knew this.  And it probably won’t surprise you to learn that your encrypted internet traffic is also vulnerable. It’s an unfortunate situation. Carl Herberger, Radware’s VP for Security Solutions, says that the prospect of SSL-based attacks “makes a folly of our existing security infrastructure”. The […]