Cohesity Cloud Infographic

| February 15, 2019

article image
By 2020, companies expect to run 83% of their workloads in the cloud.1 And so far, it’s the primary data that gets all the attention. While most have focused on primary workloads and data, 80% of all enterprise data is secondary. It's non-mission critical data that's massively fragmented across backups, archives, file shares, object stores, test/dev systems and analytics data sets.

Spotlight

Lastline, Inc.

Lastline delivers the most effective and comprehensive security platform to detect, stop, and manage targeted attacks, advanced persistent threats, zero-day exploits, and evasive malware designed to bypass traditional security products.

OTHER ARTICLES

Virtualizing Broadband Networks: Q&A with Tom Cloonan and David Grubb

Article | June 11, 2020

The future of broadband networks is fast, pervasive, reliable, and increasingly, virtual. Dell’Oro predicts that virtual CMTS/CCAP revenue will grow from $90 million in 2019 to $418 million worldwide in 2024. While network virtualization is still in its earliest stages of deployment, many operators have begun building their strategy for virtualizing one or more components of their broadband networks.

Read More

Discovering SCVMM and Its Features

Article | June 11, 2020

System Center Virtual Machine Manager (SCVMM) is a management tool for Microsoft’s Hyper-V virtualization platform. It is part of Microsoft’s System Center product suite, which also includes Configuration Manager and Operations Manager, among other tools. SCVMM provides a single pane of glass for managing your on-premises and cloud-based Hyper-V infrastructures, and it’s a more capable alternative to Windows Server tools built for the same purpose.

Read More

Best Practices for vSphere 6.7 Tagging

Article | June 11, 2020

vSphere Tags were introduced in version 5.1 as a way to organize inventory objects such as VMs, Hosts, Datastores, etc., a much-needed feature for helping search for or group objects within vSphere. A Tag is basically a label that can be applied to vSphere inventory objects. When an administrator creates a tag, it is then assigned to a tag category. Categories allow the grouping of related tags. When a Category is created, you can specify associations of object types (such as; VM or Datastore) as well as whether more than one tag in a category can be applied to an object (ex; One Tag or Many Tags).

Read More

Can AI bring down network energy costs?

Article | June 11, 2020

Data volumes in mobile networks are increasing at an unprecedented rate. In our latest mobility report, we forecast that mobile data traffic will grow fourfold by 2025, reaching up to 160 exabytes (EB) per month. This is amazing of course and offers all kinds of opportunities for communications service providers, but there is also a potential downside to this rapid surge in data traffic: its impact on the energy consumption and carbon footprint of mobile networks. That’s not the only downside for communications service providers, as it also raises a significant cost concern. The energy consumption of today’s networks accounts for 10 percent of annual operation expenditure (OPEX). As we found in our AI report, the demand to reduce operational costs already ranks among the top priorities for today’s operators. With the deployment of 5G and a spike in data traffic forecast, suddenly this demand becomes even more relevant.

Read More

Spotlight

Lastline, Inc.

Lastline delivers the most effective and comprehensive security platform to detect, stop, and manage targeted attacks, advanced persistent threats, zero-day exploits, and evasive malware designed to bypass traditional security products.

Events