Virtualization and Enterprise Architecture: The Security Architect

November 30th, 2007 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
This video file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the video file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

Data centers today are under pressure from rising compute requirements, demand for storage capacity and energy costs. In this video podcast from IT@Intel, Alan Ross, principal engineer and enterprise architect with Intel IT, shares experiences, technology assessments and best practices around data center efficiency, virtualization and consolidation.

Transforming the data center requires understanding the underlying domains: facility, network, server, storage and how security interacts with manageability and other technology. The security architect has to evolve plans for business continuity and disaster recovery, as well as jump into emerging threat and risk arenas like Web application security. Facilities monitoring and management and energy savings require understanding and balancing customer service levels with the need to pinpoint where, when and how much compute power is needed, and migrating workloads accordingly. Virtualization is another game-changer in the data center, increasing capacity and manageability while decreasing energy consumption.

Alan Ross comes to enterprise architecture from an unconventional background. He holds a number of patents, has worked with electrorheological fluids to change the behavior of automotive dampers, and hopes someday to be part of future innovations in energy efficiency, photovoltaics and photolytics.

Blogs IT@Intel

Some images courtesy of:

Andrew Wales, Gisela Francisco, John Trainor, Koshy Koshy, Refracted Moments, Les Chatfield and Robin Hutton via Attribution 2.0 Generic; Bill Stilwell, Jamie Beverly, Craig Rodway, Fod Tzellos, Eric Schmuttenmaer, Stan Wiechers, gailf548, Andy Melton, Dawn Endico amd Mike Lowell via Attribution-Share Alike 2.0 Generic; Hans Splinter via Attribution-No Derivative Works 2.0 Generic


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , ,
 
Posted in: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel