Fusion-io exec describes how the company's hardware and software enable data center managers to build faster, more cost-effective storage arrays, in the latest episode of Valley View.
Gary Orenstein, Fusion-io's senior VP of product, says his company's purpose is to make the world's data go faster. Data is everywhere--the cloud, the Web--but it's on disk, which is too slow for many of today's demanding data needs. With Fusion-io's IoDrives and Ion Data Accelerator software, data center managers can build solid-state, flash-based storage arrays across physical and virtual servers more cost effectively. And it does so with a smaller footprint, which is crucial in today's data center.
Orenstein says Fusion-io is doing lots of work in organizations using Oracle, Microsoft, and MySQL databases, and is also starting to see some big data deployments using MongoDB.
Orenstein boiled all of this down into his 3-minute elevator pitch on Valley View recently and came out shining in front of our judges. You can watch it all in the video embedded below.
Make sure to tune into our October Valley View, on October 24 at 11 a.m. Pacific Time, where we'll have more startups--including Taptera (enterprise mobile applications), Alteryx (big data), and Hearsay Social (social enterprise). We'll also feature conversations with Cisco CEO John Chambers, and Oracle president Mark Hurd. You can also register for the October Valley View show and have a chance to win some excellent gear.
Informationweek.com run-of-site player, used to publish article embedded videos via DCT. The same ads will be served on this player regardless of embed location.
10 Recommendations for Outsourcing SecurityEnterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
5 Top Tips For Outsourced SecurityIt's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
Published: 2015-03-27 DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...
Published: 2015-03-27 Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.
Published: 2015-03-27 The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.