- Ryan Coombes, Gyrocom’s Technical Director talking about what’s really going on in IT departments wrestling with outsourcingRead More
Retailers believed that the trend for consumers buying at Amazon during the financial crash was a blip and that those shoppers would return. They haven’t, quite the opposite actually.Read More
We’re in an age where new competing technologies and architectures are constantly challenging the way we have delivered IT for years. We’ve all been exposed in some manner to “SDx” - Software Defined everything!
At Gyrocom we embrace the SDE (Software Defined Enterprise) and the associated benefits: vendor agnostic hardware and software driven intelligence. From the five key components that form the SDE (Compute, Networking, Storage, Automation & Management), my primary focus is on HCI (Hyper-converged Infrastructure) which is the consolidation of Compute and Storage into a single chassis.Read More
'I beg your pardon?" Another Basil Fawlty communication issue (Fawlty Towers)
I travel, and I stay in a lot of hotels and every one of those has been better than Fawlty Towers.
However, when booking for the week away, one of the websites that I use, aside from Tripadvisor, is “HotelWifiTest.com”.
Because once I’ve slung my bags down onto the hotel bed, I am no longer satisfied with being subject to a broadcast schedule and T.V. controller, I hate to admit it, but I have become one of the “I want it, and I want it now” Millennials (albeit I am far too old to actually be one). I could be watching anything from The Walking Dead to Parks & Recreation to YouTube’s latest IT Infrastructure doodle video; no matter what it is, one thing is for certain…I have no time or patience for buffering! I thought “buffering” had been consigned to the past along with dial up modems and AOL.
“We didn't get any messages, and Captain Blackadder definitely did not shoot that delicious plump-breasted pigeon." – Lieutenant George to General Melchett and Captain Darling
In the series “Blackadder goes Forth”, set in the trenches of WW1, Edmund Blackadder avoids multiple types of messages for the company to “go over the top”. These messages come in the form of a telegram (addressed to “Catpain Blackudder”), telephone (the wrong number and latterly, a very poor connection), and a carrier pigeon (General Melchett’s beloved Speckled Jim).
Businesses today are faced with communication problems similar to that of General Melchett:
- Visibility – How does the Enterprise know whether their network is performing as it should to support their applications?
- Performance – How does it ensure that it gives its applications the quality of bandwidth they need?
- Choice – How can a business achieve the necessary flexibility to choose its connection method?
- Cost – OK, the analogy falls down here although the death of Speckled Jim came at great emotional cost to General Melchett. Regardless, how can businesses maximise network performance in a cost efficient way?
Sometimes it’s easy to miss something that is actually right in front of you.
At least that’s what it was like for my colleague (who’s going to remain nameless..!).
He’d attended the keynote at VMworld in Barcelona and was in the VMVillage. In his defence, I think he was a little distracted, presumably he was thinking how great the partnership between AWS and VMware would be for some of our customers. Anyway, he was going to meet me outside in one of the bustling gardens, he spots my table, and quickens his pace, until, that is, he walks full tilt, face-first into the glass wall separating him and I.Read More
Cybercrime is perhaps the most serious threat to businesses today, yet many executives still underestimate the risk that it poses to their organisation.Read More
First and foremost, thanks to everybody who took the time to visit our stand at London’s IP Expo last week. The event was a great opportunity to network and provided an excellent platform for showcasing Gyrocom’s expertise in the Software Defined Data Centre (SDDC).Read More
A lot has been written about how today’s I.T. Infrastructure security models are broken. The days of securing the perimeter and trusting everything and everybody inside are gone. To make such a statement may seem bold, but you only have to look to a recent Forrester survey* identifying the top three corporate security breaches as (1) the loss/theft of corporate assets; (2) inadvertent misuse by an insider and (3) external attacks targeting corporate systems, to understand that such a statement is far from bold and in fact a matter organisations should start to consider more seriously.Read More