Data Center

Data Center / Featured Blogs

OTT Threat to Telco's Middleware Opportunities

I recently participated in two Comverse events, and once again the message was driven home to me about the enormous opportunities that lie ahead of the industry in the field of new telecoms applications. The middleware and cloud applications that are now appearing at the edge of the network will of course, be further developed once high-speed broadband becomes available, but already they are having an enormous impact on the telecoms market. The new user experiences that can be obtainable through these applications will enrich fast broadband networks beyond recognition. What we now have is, on the one hand, the Over-The-Top (OTT) applications that have conquered the world... more

Web Application Delivery: The Challenge of Managing Thousands of Web Applications in the Cloud

Cloud Computing is a hot topic. Some say it is already here, most agree that it will be much bigger in the coming years. It is pushed forward by the economic benefits of virtualization and consolidation. Take a heterogeneous data center, full of many kinds of servers, running a myriad of applications and consolidate it into a uniform farm of virtual machines, where each application is services by one or more VMs and you have a cloud, what is called a private cloud. more

Project Title: Adopt-an-Haitian-Internet-Technician-or-Facility

I circulated this, and its precursors, notes about the necessity for diesel to keep the generators powering Boutilliers Hill NAP on the Hatian-Dominican Republic Border from failing, earlier this month on the North American Operators Group (NANOG) mailing list. Efforts by former ICANN people, in public service and in the private sector, were critical to bringing the continuity of the surviving infrastructure to the attention of the White House, the Department of State, and the Southern Command. more

Protecting Customer Data

There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more

Google Energy - Are You Surprised?

Just when you thought Nexus One was the biggest thing coming out of Google this week, we now get word about Google Energy. Well, Nexus One is a big deal, but I say that wearing my telecom analyst hat. Switching to my smart grid hat, Google Energy is something else altogether... As big as that is -- and will be -- Google Energy has all kinds of implications for smart grid. For starters, more

CircleID's Top 10 Posts of 2009

Looking back at the year that just ended, here are the top ten most popular news, blogs, and industry news on CircleID in 2009 based on the overall readership of the posts. Congratulations to all the participants whose posts reached top readership in 2009 and best wishes to the entire community in 2010. more

The Coming of the ADC

In the previous decade and the beginning of this one, Server Load Balancing (SLB) reigned supremely in the web data center. Lately, a new class of products is replacing the older load balancers. These products are known as Application Delivery Controllers (ADC) and in the following paragraphs I will share my thoughts on the reasons for that. more

How Open Cloud Could Have Saved Sidekick Users' Skins

The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users' data. This is an unfortunate and completely avoidable event that Microsoft's Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There's plenty of theories as to what went wrong -- the most credible being that a SAN upgrade was botched, possibly by a large outsourcing contractor, and that no backups were taken... more

Email Snooping Can Be Intrusion Upon Seclusion

Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more

Hannaford Data Breach Plaintiffs Rebuffed in Maine

A US District Judge in Maine largely granted a motion to dismiss brought by Hannaford in a big data breach case... According to the court, around March 2008, third parties stole up to 4.2 million debit and credit card numbers, expiration dates, security codes, PIN numbers, and other information relating to cardholders "who had used debit cards and credit cards to transact purchases at supermarkets owned or operated by Hannaford." more