Fusion-io exec describes how the company's hardware and software enable data center managers to build faster, more cost-effective storage arrays, in the latest episode of Valley View.
Gary Orenstein, Fusion-io's senior VP of product, says his company's purpose is to make the world's data go faster. Data is everywhere--the cloud, the Web--but it's on disk, which is too slow for many of today's demanding data needs. With Fusion-io's IoDrives and Ion Data Accelerator software, data center managers can build solid-state, flash-based storage arrays across physical and virtual servers more cost effectively. And it does so with a smaller footprint, which is crucial in today's data center.
Orenstein says Fusion-io is doing lots of work in organizations using Oracle, Microsoft, and MySQL databases, and is also starting to see some big data deployments using MongoDB.
Orenstein boiled all of this down into his 3-minute elevator pitch on Valley View recently and came out shining in front of our judges. You can watch it all in the video embedded below.
Make sure to tune into our October Valley View, on October 24 at 11 a.m. Pacific Time, where we'll have more startups--including Taptera (enterprise mobile applications), Alteryx (big data), and Hearsay Social (social enterprise). We'll also feature conversations with Cisco CEO John Chambers, and Oracle president Mark Hurd. You can also register for the October Valley View show and have a chance to win some excellent gear.
Informationweek.com run-of-site player, used to publish article embedded videos via DCT. The same ads will be served on this player regardless of embed location.
Dark Reading Tech Digest, Dec. 19, 2014Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
10 Recommendations for Outsourcing SecurityEnterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
5 Top Tips For Outsourced SecurityIt's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
Published: 2014-12-27 Integer overflow in aswFW.sys 5.0.594.0 in Avast! Internet Security 5.0 Korean Trial allows local users to cause a denial of service (memory corruption and panic) via a crafted IOCTL_ASWFW_COMM_PIDINFO_RESULTS DeviceIoControl request to \\.\aswFW.
Published: 2014-12-27 Directory traversal vulnerability in the TFTP Server 188.8.131.52 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation.
Published: 2014-12-27 Cross-site request forgery (CSRF) vulnerability in starnet/index.php in SyndeoCMS 3.0 and earlier allows remote attackers to hijack the authentication of administrators for requests that add user accounts via a save_user action.
Published: 2014-12-27 Multiple cross-site scripting (XSS) vulnerabilities in amMap 2.6.3 allow remote attackers to inject arbitrary web script or HTML via the (1) data_file or (2) settings_file parameter to ammap.swf, or (3) the data_file parameter to amtimeline.swf.