Fusion-io exec describes how the company's hardware and software enable data center managers to build faster, more cost-effective storage arrays, in the latest episode of Valley View.
Gary Orenstein, Fusion-io's senior VP of product, says his company's purpose is to make the world's data go faster. Data is everywhere--the cloud, the Web--but it's on disk, which is too slow for many of today's demanding data needs. With Fusion-io's IoDrives and Ion Data Accelerator software, data center managers can build solid-state, flash-based storage arrays across physical and virtual servers more cost effectively. And it does so with a smaller footprint, which is crucial in today's data center.
Orenstein says Fusion-io is doing lots of work in organizations using Oracle, Microsoft, and MySQL databases, and is also starting to see some big data deployments using MongoDB.
Orenstein boiled all of this down into his 3-minute elevator pitch on Valley View recently and came out shining in front of our judges. You can watch it all in the video embedded below.
Make sure to tune into our October Valley View, on October 24 at 11 a.m. Pacific Time, where we'll have more startups--including Taptera (enterprise mobile applications), Alteryx (big data), and Hearsay Social (social enterprise). We'll also feature conversations with Cisco CEO John Chambers, and Oracle president Mark Hurd. You can also register for the October Valley View show and have a chance to win some excellent gear.
Informationweek.com run-of-site player, used to publish article embedded videos via DCT. The same ads will be served on this player regardless of embed location.
Dark Reading Tech Digest, Dec. 19, 2014Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
10 Recommendations for Outsourcing SecurityEnterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
5 Top Tips For Outsourced SecurityIt's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
Published: 2015-01-28 Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Published: 2015-01-28 pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not properly restrict access to the upload functionality, which allows remote attackers to write to arbitrary files.
Published: 2015-01-28 pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com.
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.