5 steps to secure your data center

With the advent of cloud computing, rich Internet applications, service-oriented architectures and virtualization, data center operations are becoming more dynamic with fluid boundaries. The shifting form of computing adds layers of complexity that have broad implications for how IT managers secure the components that make up a data center.

The path to cloud computing is beginning to take shape

Cloud computing still has a lot of uncertainties -- among them a lack of maturity among many of its potential services -- but the path toward this nest era of enterprise computing is beginning to take shape.

Cloud computing: Winners and losers

Technology companies that expect to beneift from cloud computing must creatively adapt licensing, pricing and revenue models.

Virtualization proves cost effective for some agencies

Capacity planning is a vital component data center managers need to implement in order to achieve power savings and other benefits from virtualization technology, according to IT managers representing two federal organizations.

Agencies face tough questions on how to deploy cloud computing

Security issues, data privacy, the acquisition process, standards and service level agreements were among the chief issues that feds grapple with.

Interior developing cloud infrastructure services

Cloud computing will fundamentally change the shared services model, National Business Center director predicts.

NSF commissions supercomputer to visualize ever-larger data sets

The 2,048-core system, nicknamed Longhorn, will be capable of 20.7 trillion floating-point operations per second, will help researchers keep pace with the explosive rate of data production, TACC officials said.

Cut the cords to storage networking

Agencies running stand-alone Fibre Channel-based Storage Area Networks may be able to reduce the amount of cabling snaking through their data centers, thanks to an emerging converged network protocol named Fibre Channel over Ethernet.

Shawn P. McCarthy

Fusion center approach could be effective in other areas

The fusion center approach used in antiterrorism operations could also be applied to other civilian uses, such as bridge and road monitoring and electronic business reporting.

Denial-of-service-attack worries dominate Cisco patching

If the latest semiannual round of security advisories from Cisco are any indication, DOS attacks continue to be a serious — and largely unsolvable — problem for networks.

Security upgrades highlight DISA buying surge

The Defense Information Systems Agency plans to bolster security features embedded in its far-flung networks and data centers via several acquisition projects planned for the twilight of fiscal 2009.

Future online storefront to let agencies buy computing services

A storefront for the federal government will let agencies acquire cloud computing technology as easily as consumers can sign up for Gmail accounts.

Topic Resources

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • Data Center Micro-Segmentation

    The software-defined data center is beginning to reveal some benefits beyond agility, speed, and efficiency to government agencies. One critical area is security. Read this brief to find out how VMware is making micro-segmentation operationally feasible in the data center for the first time.

  • Moving to a Private Cloud? Infrastructure Really Matters!

    This Clipper Group paper outlines the importance of the underlying IT infrastructure for private cloud environments and lays the groundwork for clients navigating cloud, highlighting many key aspects of a private cloud infrastructure. Download this informative whitepaper to gain further insight on cloud computing.

  • Store Less, Spend Less: Managing Data According to Its Economic Value

    The term “big data” is now passing into the common vernacular. Although initially as much about the power of business analytics and data mining, the semantics have now swung to encapsulate data that is just big and of course, resource hungry, whether in terms of management, sheer storage capacity, or budgets. In that respect, the numbers are getting increasingly alarming: Estimates suggest that 90% of the world’s information was created in the last two years, and 2.5 quintillion bytes of data are created daily. Download this informative whitepaper to gain further insights into the conflicting demands of storage management.

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.