Mobile Security Strategy Shift: Wrap The App

With the fast growth in mobile devices being used to access corporate applications and data, board-level GRC (governance, risk & compliance) requirements for mobile security need to be on par with the security demanded of all other devices used to access corporate applications. The GRC process often results in approval bottlenecks on the mobile side,… Read More

mobile security

Why The Cloud Beats Legacy Compute Models

Recently I was a speaker at Westcon’s Cloud event in Orlando, FL. While the event was being held close to Disney, Universal Studios, and other hot spots for fun and games, the event itself was all business as the audience of value-added resellers (VARs) were busy trying to figure out how to position cloud and… Read More

mainframe

Highlights from our #HolidayInternetWeather Twitter Chat With @IntWeather

Yesterday Silver Peak hosted a great live chat on Twitter focusing on the theme of #HolidayInternetWeather. We had plenty of questions around Internet congestion and latency for our special guest, Dave Strickler (@IntWeather), of InternetWeatherMap.com, and he had lots to say on the subject.  We hope you were able to follow along live, but if… Read More

Twitter Logo

Is Software-Defined Storage A Solution In Search Of A Problem?

Software-defined storage, or SDS, seems such a great idea. After all, when we are faced by a new project most of us still think in terms of how many drives to buy for it, yet the fact is that we can never know what that project will need as it evolves, so we almost always… Read More

Software Defined Storage

Starter Kits Offer NFV On-Ramp

As with any new technology, there is the inevitable chasm between the engineering developers (tasked with implementing innovative technology) and the marketers (tasked with getting it out into the market). Network Function Virtualization (NFV) continues that trend. What the term actually means, and how it is implemented, has resulted in frenzied activity in the vendor… Read More

What’s New

mobile security

Mobile Security Strategy Shift: Wrap The App

With the fast growth in mobile devices being used to access corporate applications and data, board-level GRC (governance, risk & compliance) requirements for mobile security need to be on par with the security demanded of all other devices used to access corporate applications. The GRC process often results in approval bottlenecks on the mobile side, delaying the ability to address business requirements. With the mobile consumer device industry setting the technology pace, deploying policies to manage mobile devices, or seeking to steer users towards certain apps is a struggle. This is set to get a lot worse as business processes … Read More

Featured Expert: Duncan Epping

Who's Who - Duncan Epping

Duncan was a found member of the VMware EVO:RAIL team and today works for VMware’s Office of CTO. MORE

Latest Posts

mainframe

Why The Cloud Beats Legacy Compute Models

Recently I was a speaker at Westcon’s Cloud event in Orlando, FL. While the event was being held …

Twitter Logo

Highlights from our #HolidayInternetWeather Twitter Chat With @IntWeather

Yesterday Silver Peak hosted a great live chat on Twitter focusing on the theme of …

Is Software-Defined Storage A Solution In Search Of A Problem?

Software-defined storage, or SDS, seems such …

Starter Kits Offer NFV On-Ramp

As with any new technology, there is the …

Holiday Internet Weather — Cloudy or Clear Skies?

As we move into the cold-weather season, …

#TweetYourPing To Enter The Silver Peak #HolidayInternetWeather Sweepstakes

Cyber Monday is overtaking Black Friday as …

The Internet of Things Rekindles The IT versus OT Debate

A few weeks ago in Chicago, Cisco held its …

Why ONUG Has It Right

I recently got back from spending two days at …

5 Ways To Make New Technology Easier To Adopt

There is no shortage of potentially useful …