22 posts • joined 30 Mar 2010
Where's the sysadmin work?
Trevor I understand the bulk of your work is smaller organizations which cannot have a FTE specialist for every function -- but; I don't see a lot of sysadmin work and/or tools. I see Systems Security I/II/III which in the SMB is very likely a function of IT; but is it as responsibility of IT? Business owners and management foisting security off on the SysAdmins because they are too lazy or cheap. Sure IT can install the security systems; but IT should not operate nor be responsible for their function.
Business Assets management which is a function of the Financial/Operations management which too many IT people have allowed the Business to foist off on the continually overburdened SysAdmin. Ain't nothing technical about counting assets.
Now I have eliminated half your list.
One of the most important monitoring tools of the sysadmin: the random walk and talk. Take a break from staring at the screen and use that all access pass to wander around and talk to people. Go to those company meetings everyone can avoid if they have to; then BS afterwards in the hallway. Openly and calmly discuss with some schmuck who using the latest, coolest Cloud-Stores-My-Department-Data, or this app lets me share all my data all the time with my whole team instantaneously -- and the entire world, or other such technical cockroach. Never ever get excited or confrontational or question their use of said tool during the walk and talk. Just smile, return to your desk, search for all other instances of Things-Which-Should-Not-Exist, and take appropriate action.
Tech toys only get you so far; people are the problem.
You mean the same system HP have used in EVA and now 3Par for years?
deja storage vu
No matter how much marketing methods change, the storage stays the same.
Where's the failure?
Missing some real world operations scenarios here:
What happens when one disk fails?
What happens when a second disk fails?
How does rebuild affect performance?
How does vMotion perform when you have to take a host offline?
This is sales dribble.
the good is gone
Yes, the MBAs kicked out the clever upstarts with ideas and skills. Now all that's left is mediocre; and so is ESXi 5.1. I dread to see 5.5
Re: Son of SAN, version 2.0....,
" Puh-lease, have you forgotten why we moved away from DAS in the first place? Poor utilization, too power hungry, poor resilience, poor central management options, awful centralised backup over the network, and poor inter-server performance."
RING THE BELL, RING THE BELL, RING THE BELL!!!!
Specify and purchase the right SAN with the right connectivity and the right software, all this DAS madness goes away. During the cost justification, don't forget the amount of hours@$$$ in tech support to keep DAS madness operating. Then compare to the costs of a properly implemented mid-range SAN for your SME shop over an effective lifetime of the SAN and less manpower. SAN is not going away any time soon.
Certain technology projects which require Hadoop or other non-SQL data storage will use some DAS. But you would be surprised at how you can implement Hadoop on a storage network and reduce your overhead by eliminating some of that data replication.
Don't bushwhack the SME
Ever tried to buy a SAN as an SME? If possible, the SME IT guy should arrive armed and wearing body armor. Get the point across fast.
The SAN salesman for Highest Profits also brought along, uninvited, a gang bang team of PC salesman, Enterprise Software Salesman, Service Salesman, Printing Salesman, Server Salesman, and a couple others.
The SAN partner for Implied Bondage Makeover wouldn't try to discuss options; gold plated and locked in or nothing.
Everest Mountain Climbing tried to sell me a SAN which was actually SCSI arrays with some fast dancing. The dancing wasn't as fast as the music.
Some of us SME IT folk aren't that gullible; and aren't that inexperienced. We just like to act that way; and the big boys fall for it every time. Still wouldn't hurt to have a gleaming stainless steel negotiator hanging next to the cellphone on your belt.
Trevor, did VMware ESXi install? OpenStack? Eucalyptus?
This looks like a good medium scale virtualization platform; might want to include that in your reviews as a standard test.
Darth Oracle, the more you tighten your grip the more software assets will slip thru your fingers.
Re: Cloudy confusion
...Google search on Barracuda Networks, there are some interesting things...
Interesting indeed. Sounds like a comic strip could be made of this company...oh, wait, already done.
Market research analyst "reckons" what sales are for two years; inflates into full article full of ethereal statements, guesses, and ...ahem....insight.
Fluff the popcorn some more to show how full the bin could be.
Never a misconfigured lockout
"..guard against Trevor misconfigured the switch and locked himself out..."
Trevor, it's called
commit confirmed 5
Available on all Juniper network switches. No secondary management network required.
Re: "a little more careful murdering people under the Stand Your Ground law
"... Not everyone who owns an Audi is a tit, I'm sure there are normal Audi owners..."
I'll have to see some statistical evidence from a scientific study before I give that statement full credence. I think it's something that sublimates off the interior which causes this type of mentality; some people may just be naturally immune.
Innoculations are always safe
"...suppresses the body's natural resistance to incompletely established international standards. It's quite safe..."
Priceless, absolutely priceless. The Software Engineers, Quality, and Architects loved this one.
Pull your head out of your AIX
Wunderbar1 sounds like the only storage you have ever managed is IBM or some other legacy storage which has not been engineered recently. 3PAR ASICs-- some may consider ASICs to be a limiting factor in implementation; but the improvement in performance is worth it.
Re: "Demonstrate to men how little they really know about what they imagine they can design."
Incorrect! All assets belong to the people; and the government is allowed to hold certain assets in trust, at the pleasure of, and for the benefit of the people. No we are not "subject" to the government; we allow ourselves to function under guidelines provided by government [until such time as those guidelines mutate into intractable enforcement].
Not Sir Postalot
Can't you find a more mathematically rigorous concept for determining regular readers/commentards? That is a computer you are using and not a civil servant I assume. And, those of us on the other side of the big pond [which includes everyone not on your island] tend to post when the night crew is working.
Here's hoping the moderator is working from the pub or home....
Third party advertising links
Egads, Doubleclick.net? I have those buffoons blocked by default for many years now. If you want to make some secondary revenue thru advertising frames, find a reputable and relevant ad service.
The VDI sales architects state virtualizing the desktop does not deliver the total virtualization ROI if you don't virtualize the apps. A four month project to evaluate virtualizing all the software used in my department found a definitive conclusion: software applications can be virtualized; software tools cannot. 50% failure rate.
And I just saw presentation where the current tool for virtualizing apps is known to be..ahem...difficult. A new app virtualization environment will Be Here Soon; but still does not solve the Software Tools Don't Virtualize problem.
DC protection more than HVAC
That's nice. Will Dell now spend time researching how to protect servers against dust, gravel, mice, spider, crickets, snakes, lizards, Vice Presidents, and Marketing? Cushy controlled datacenters provide more that just heat and humidity control.
The question is which absorbed company or product will be marginalized or diffused into obscurity within the larger behemoths; and then reborn in a slightly different form in another small company?
[the blue eyes are looking at you HP]
Security not in education
Students leave education with no training in security. In fact, exactly the opposite. In order to ensure the student's primary focus is targeted on learning the material [for which the student has paid], secondary detractors -- eg security--- are routinely and aggressively removed from educational systems. Since education cannot possibly provide training in the security required for each and every type of business type, security training must be provided by the employer. For smaller businesses, this is a financial burden which is usually avoided.
Basic security needs to be addressed in education and training.
Race to the bottom
There will be no customer service war with Best Buy in the sense you are hoping for. What you will have is one more sadistic tech mistresses who will take all your money, make you feel inadequate and angry, and leave you feeling hopeless.
- Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
- Analysis Oh no, Joe: WinPhone users already griping over 8.1 mega-update
- AMD demos 'Berlin' Opteron, world's first heterogeneous system architecture server chip
- Leaked pics show EMBIGGENED iPhone 6 screen
- OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs