Fusion-io exec describes how the company's hardware and software enable data center managers to build faster, more cost-effective storage arrays, in the latest episode of Valley View.
Gary Orenstein, Fusion-io's senior VP of product, says his company's purpose is to make the world's data go faster. Data is everywhere--the cloud, the Web--but it's on disk, which is too slow for many of today's demanding data needs. With Fusion-io's IoDrives and Ion Data Accelerator software, data center managers can build solid-state, flash-based storage arrays across physical and virtual servers more cost effectively. And it does so with a smaller footprint, which is crucial in today's data center.
Orenstein says Fusion-io is doing lots of work in organizations using Oracle, Microsoft, and MySQL databases, and is also starting to see some big data deployments using MongoDB.
Orenstein boiled all of this down into his 3-minute elevator pitch on Valley View recently and came out shining in front of our judges. You can watch it all in the video embedded below.
Make sure to tune into our October Valley View, on October 24 at 11 a.m. Pacific Time, where we'll have more startups--including Taptera (enterprise mobile applications), Alteryx (big data), and Hearsay Social (social enterprise). We'll also feature conversations with Cisco CEO John Chambers, and Oracle president Mark Hurd. You can also register for the October Valley View show and have a chance to win some excellent gear.
Informationweek.com run-of-site player, used to publish article embedded videos via DCT. The same ads will be served on this player regardless of embed location.
10 Recommendations for Outsourcing SecurityEnterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
5 Top Tips For Outsourced SecurityIt's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
Published: 2015-10-15 The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...
Published: 2015-10-15 Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.
Published: 2015-10-15 Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.