4 Steps to Maintain Proper Visibility with Containers
Did you know that 34% of IT Decision Makers reported they are concerned with adopting containers due to a lack of full visibility?1
Welcome to our blog, the WEI Tech Exchange, where our subject matter experts exchange ideas, best practices, and thoughts on the latest data center and enterprise IT technologies and trends.
By David Fafel | Sep 13, 2018
Did you know that 34% of IT Decision Makers reported they are concerned with adopting containers due to a lack of full visibility?1
By David Fafel | Sep 06, 2018
Containers are best known for their role in simplifying application development, providing a disposable, reusable unit to modularize delivery, and bring consistency to virtually every development stage. They have demonstrated an ability to move DevOps forward by transforming the way development and infrastructure teams operate, and they have helped these teams move ever closer to continuous delivery. However, managing containers presents an entirely new challenge for most organizations. Containers, by their very nature, rely on shared resources. These may range from operating systems and application files to hosting resources including memory and CPU. When left unchecked, container use can lead to sprawl and may result in resource drain. With hooks into so many different areas, there is a strong incentive to know precisely what these containers are doing, what resources they are consuming, and how they are utilizing the network.
By David Fafel | Aug 23, 2018
Containers are the next level of virtualization and they are here to stay. There are many reasons enterprises adopt containers. The top three reasons include:
By David Fafel | May 22, 2018
The ability of an enterprise to keep up with changing technology depends on the skills of its IT employees. The pace of innovation can be overwhelming even for the most experienced professionals, but this isn’t the only challenge organizations face. As companies understand the importance of digital transformation and take it on within their company, the demand for IT professionals with the required skillsets to transform legacy driven data centers into hybrid infrastructures is skyrocketing. As a result of this move towards hybrid IT, the demand is outpacing supply.
By David Fafel | May 08, 2018
Last week we began a discussion on the steps you need to take to prepare your enterprise for containerization; now we continue the conversation with the rest of the actions you need to take before you can deploy a containerized approach.
By David Fafel | May 01, 2018
Have you heard the term “containerization” thrown around a lot recently? It’s a hot topic in the IT world, but what exactly does it mean and how can you prepare your enterprise to take advantage of what it has to offer? Continue reading to learn all about it and the steps your enterprise needs to take to deploy containers in your organization.
By David Fafel | Mar 15, 2018
Although Hyperconverged Infrastructure (HCI) is not a dominant solution yet, all signs indicate it will be soon. In fact, Gartner predicts that in five years it will be reaching $5 billion in spending. According to Gartner, there are five keys as to why so many organizations and IT leaders are turning to HCI.
By David Fafel | Jan 18, 2018
It’s been two weeks since the IT world was rocked by the news of the CPU vulnerabilities known as Meltdown and Spectre. It’s making headline news due to how far the vulnerabilities extend—to nearly every processor manufactured over the past 20 years—as well as the potential impacts in mitigating these vulnerabilities. Every server, computer, tablet, phone or any other computing device with a modern CPU is potentially affected. (See WEI’s Customer Advisory about Meltdown and Spectre in this blog post.)
By David Fafel | Jan 05, 2018
WEI is aware of the new vulnerabilities related to Intel and other CPUs which could potentially allow an attacker to gather privileged information from CPU cache and system memory, putting enterprise security at risk. The vulnerabilities are code named “Meltdown” and “Spectre." The “Meltdown” issue is reported to only affect Intel CPUs while “Spectre” is reported to affect Intel, AMD, and ARM. The impact of these vulnerabilities could extend back to CPUs from as early as 1995 (in the case of Intel).
By David Fafel | Dec 12, 2017
Has your organization clearly defined your hybrid IT strategy? According to Gartner’s Managing Vice President, Chris Howard, "Many organizations have now passed the definitional stage of cloud computing and are testing cloud architectures inside and outside the enterprise, and over time, the cloud will simply become one of the ways that we 'do' computing, and workloads will move around in hybrid internal/external IT environments. As a result, the traditional role of the enterprise IT professional is changing and becoming multifaceted. A hybrid IT model requires internal and external IT professionals to support the business capabilities of the enterprise."
WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.
At WEI, we’re passionate about solving your technology problems and helping you drive your desired business outcomes.