DCJ Expert Blogs

iVMcontrol iPhone VMware management, iTool or iToy?

iVMcontrol iPhone VMware management, iTool or iToy?
March 31, 2014 No Comments »

A few months back I was looking for a simple easy to use yet robust tool for accessing and managing my VMware environment from my iPhone. The reason being is that I don’t always like to carry a laptop or ... Read More »

Missing flight MH370 should remind us, do you know where your digital assets are?

Missing flight MH370 should remind us, do you know where your digital assets are?
March 28, 2014 No Comments »

I recently did a piece over at InformationSecurityBuzz called Dark Territories, Do You Know Where Your Information Is? In that piece (click here), I bring up the topic of dark territories which with the recent missing Malaysian Airlines flight 370 ... Read More »

The Persisting Challenges of SOC 2 Reporting

The Persisting Challenges of SOC 2 Reporting
March 18, 2014 No Comments »

Increasing concerns regarding information security have heightened scrutiny of service organizations’ control infrastructure and driven demand for attestation reports.  As a result, the SOC 2 examination’s popularity has increased dramatically since its inception in January 2010. The SOC 2’s operational ... Read More »

How to get more bang for your data-center-energy buck!

How to get more bang for your data-center-energy buck!
March 14, 2014 1 Comment »

In 2010, energy usage for data centers accounted for 2% of the U.S.’s total energy usage. This is a sizeable amount, but much of it is necessary to run the technology we rely on. There are, however, inefficiencies in the ... Read More »

How Cloud Datacenters Differ from Traditional Datacenters

How Cloud Datacenters Differ from Traditional Datacenters
March 6, 2014 No Comments »

The main component of any cloud datacenter is its ability to scale up and down quickly. In the old days, a company would purchase collocated space and managed services inside of a datacenter. They would ship the server and have ... Read More »

Its Award Season: Time for 2014 top VMware and virtualization blog voting

Its Award Season: Time for 2014 top VMware and virtualization blog voting
March 5, 2014 No Comments »

It’s that time of the year again for award season including with the recently wrapped up 2014 Winter Olympic (and benchmarking games), the academy awards and many others. That also means it is time again for the annual top VMware, ... Read More »

Old School, New School, Current and Back to School (With Poll)

Old School, New School, Current and Back to School (With Poll)
March 1, 2014 No Comments »

Are you old school or new school? If you are new school or old school, then will you be stuck on those school’s of thought or advanced to the current and future schools? Old School From the old school folks ... Read More »

Power Protection: The Fifth Element of Converged Infrastructure

Power Protection: The Fifth Element of Converged Infrastructure
February 24, 2014 No Comments »

Converged infrastructures provide facility managers with validated solutions for their data centers, utilizing virtualization and automation to achieve high levels of availability while maintaining low costs. Though these solutions help form an incredibly resilient platform, leading some IT managers to ... Read More »

Has Nirvanix shutdown caused cloud confidence concerns?

Has Nirvanix shutdown caused cloud confidence concerns?
February 21, 2014 No Comments »

Recently seven plus year old cloud storage startup Nirvanix announced that they were finally shutting down and that customers should move their data. Nirvanix has also posted an announcement that they have established an agreement with IBM Softlayer (read about ... Read More »

Data Assessments for Center-Wide Information Governance

Data Assessments for Center-Wide Information Governance
February 20, 2014 1 Comment »

Over the last few years senior executives, legal teams and IT departments have been tasked with protecting their companies from a multitude of evolving legal and compliance liabilities surrounding old emails, files and mystery legacy data. Industry regulations have changed ... Read More »