article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. One of those new technologies in the Enterprise Data Center space is what I call Infrastructure Orchestration (others term it fabric computing or unified computing ). Big Data. (6). Data Center efficiency. (1). Green IT. (43).

article thumbnail

Fountainhead: Where the Server Industry Went Amiss

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. This meant that the server retained static data, specifically things like I/O addressing and storage connectivity naming, not to mention data on the local disk -- resulting in the server having a static “state". Big Data. (6).

Industry 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started in journalism. So, that was, that was a really, the turning point for me because I realized that okay if we're going to move all these servers that we spent so much time on hardening and security, securing behind a perimeter, now we are just putting it on somebody else's data center, without questioning what we're doing.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started in journalism. So, that was, that was a really, the turning point for me because I realized that okay if we're going to move all these servers that we spent so much time on hardening and security, securing behind a perimeter, now we are just putting it on somebody else's data center, without questioning what we're doing.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started in journalism. So, that was, that was a really, the turning point for me because I realized that okay if we're going to move all these servers that we spent so much time on hardening and security, securing behind a perimeter, now we are just putting it on somebody else's data center, without questioning what we're doing.