|
|
|
The Mainframe Comet, Burning Brightly Reassessing the Big Iron Outlook |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
The Mainframe Comet, Burning Brightly Reassessing the Big Iron Outlook Par Security Bloggers NetworkLe [2013-12-05] à 22:50:44
Présentation : If you re reading this blog it means Earth wasn t destroyed by the comet ISON. Phew As we reflect on the fascinating path of that extraterrestrial wonder, it seems like a good time to introduce you to another comet we have in our sights when it comes to data centers and the mainframe. Recently, we completed a guide on data center performance strategies and cost savings. In my discussions with recipients of the guide which you can download for free here and at presentations over the last year, I ve made reference to the mainframe comet. In essence, the view we take when forecasting the mainframe environment over the next 3-to-5 years resembles a comet. At the tail end of the comet, you ve got a majority of customers who are looking to move some level of their data functions off the mainframe, equaling about half of the overall mainframe capacity. Burning bright at the other end is another 10pourcents of customers, who make up one-quarter of all capacity. These are the global financial institutions, government agencies, and any business truly dealing with massive data volumes on a daily basis in the ballpark of more than 20K MIPS . In whole, the comet looks like this But as more strategies and technologies take advantage of existing mainframe environments or at least optimize processing and I O on z OS I m curious if our comet may burn brighter and longer than anyone anticipates. Hybrid environments and the data center are pulling mainframes into cutting-edge use. IBM, for one, has made significant investments and R D dedications with zEDC, zBX and other System z hardware, earning effusive praise from writers in that community. The customers I ve talked to surrounding the performance guide are all about doing more with not without their mainframe. So what does the future of the mainframe look like to you White-hot at 20K MIPS and beyond A clunky way to keep around data for the auditor that you expect to flame out like the comet ISON Or do you expect it to burn brightly in some other way When it comes to this continually emerging and even divisive segment of data performance, we always want to hear from you. We also welcome your feedback on our complimentary big iron performance guide as well as your comments below or via Twitter and LinkedIn.
Les mots clés de la revue de presse pour cet article : outlook
Les derniers articles du site "Security Bloggers Network" :
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance - BeautifulPeople.com experiences data breach 1m affected - Swedish Air Space Infringed, Aircraft Not Required - Why cybercriminals attack healthcare more than any other industry - Setting the Benchmark in the Network Security Forensics Industry - Spotify denies hack users subjected to weird music beg to differ - The Dangerous Game of DNS - Threat Recap Week of April 22nd - Is your security appliance actually FIPS validated - Deploying SAST Static Application Security Testing
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|