terry.freeman@dlt.com'

Terry Freeman

August 17, 2012
Big Data: Crops vs. Weeds premium
Big data is just two words and yet these two words are driving hysteria throughout the known world at a level not seen since Y2K. We supposedly create 2.5 quintillion bytes of data every day now and at this rate we can conclude that 90% of the data in the world today has been created in the last two years alone. This does sound apocalyptic as it suggests that we could drown in data far before global warming floods our coastal cities into oblivion. Are we being rational? I think not and this calls for an explanation.
premium
terry.freeman@dlt.com'
Online Identity: Evolve or Perish! premium
The following noteworthy identity management statement comes from the Cyberspace Policy Review issued last year by President Obama: “Build a cybersecurity-based identity management vision and strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the Nation.” To be clear, I am an avid opponent of “anonymity for all” on the web. I do not think it is in our common interest to have anonymous communication in the public sector. I know that I will draw the ire of many who view the Internet as a constitutional right, but I persist with this view because the very nature of our constitution provides for the free and open exchange of ideas in the public forum. With this protection in place why would we need anonymity given the extreme handicap that it places on us in processing information?
premium
terry.freeman@dlt.com'
Privacy vs. Security premium
Privacy vs. Security The AFCEA Global Intelligence Forum was scheduled for this June but given the ongoing debate in Congress on the conference topic and the FY13 budget uncertainties, the event has been postponed. Nevertheless, they have proposed some interesting questions: • What does it mean to be a citizen of the information nation? • Who are the protectors of that nation and what is the appropriate balance between personal privacy and public security? • Is the choice between security and privacy a false one? Can technology itself enable safe and secure citizenship? • Who and how should the ethics of information technology be determined? How does the next generation – the generation of cyber “citizens” – view the issue of privacy and security? It is easy to believe that there are more questions than answers but that is not a particularly useful ground to stand on for analysis. Let’s explore these questions.
premium
terry.freeman@dlt.com'
April 10, 2012
Access control challenges are cloud’s nemesis premium
This year’s RSA conference was a deluge of technology centered on the usual security suspects with an addition of recent year themes surrounding the challenges of cloud computing. Two years ago the conference was all about cloud, last year it was “Bob and Alice” (the challenges of compliance vs. defection surrounding lack of trust in cyberspace).This year’s “Mightier than the Sword” theme was the next logical step towards cyber warfare. After all, regardless of the strength of security controls, the presence of global information availability coupled with the absence of trust inevitably tends toward war. Perhaps it is time to work on this “trust” problem. After all, it’s all about risk… right?
premium
terry.freeman@dlt.com'
January 31, 2012
Disaster Recovery Gets Some Fresh AIR premium
When it comes to disaster recovery, there has historically been a limitation on disk storage. While tapes can easily be sent offsite to be used for restores after a site outage, disks do not offer the same flexibility. Some OpenStorage technologies, support out-of-band replication in which the contents of the disk storage are replicated between devices. In these instances, NetBackup has no knowledge of the data, which complicates recovery in a NetBackup protected environment because the replicated data can only be accessed after recreating the NetBackup catalog. Replication is done by importing the entire contents of the disk storage at the remote site using the bpimport command. The nbcatsync utility, introduced in NetBackup 6.5.6 and 7.0.1, can address this challenge as well, but it relies on being able to restore the catalog from a catalog backup and then post-processing it to reconcile the disk device mappings, resulting in a very time consuming process.
premium
terry.freeman@dlt.com'
December 13, 2011
Cloud and Continuous Monitoring premium
Continuous monitoring involves assessing an agency’s information security posture based on changes to risk resulting from new threats or newly discovered vulnerabilities. The National Institute of Standards and Technology’s (NIST) Guide for Applying the Risk Management Framework to Federal Information Systems (Special Publication 800‐37, Revision 1) specifies continuous monitoring as one of the six steps in information security. As agencies begin looking at cloud initiatives, the challenge is implementing a continuous monitoring program that reduces risk and ensures compliance with NIST and other relevant guidance in an environment of decreased control. The solution begins with knowing where compliance ends and risk begins.
premium
terry.freeman@dlt.com'
November 7, 2011
Virtualization, the dark side premium
The race to virtualize everything has created a host of unintended consequences, not the least of which is how to meet the SLAs (service level agreements) for application backup. As we move into cloud alternatives this problem will only grow since your cloud provider will have to provide this to you on an application by application basis. Every virtual machine is essentially a set of large files such as VMDKs in a VMware context. These large files are typically stored in storage arrays which can be connected via iSCSI or Fiber Channel or on NFS volumes. Traditional data protection techniques such as VMware's VADP, or VMware VCB rely on an agent to protect VMDK files associated with virtual servers.
premium
terry.freeman@dlt.com'
October 7, 2011
Time for Basic Discipline premium
Much ado is being made these days about consolidation and reducing the cost of IT, with virtualization being the drivers for storage management improvements. The truth is that storage management, as well as application management and OS management, has always been a critical component of data centers. The fact that virtualization puts more pressure on these tasks is no excuse for overlooking them to date. Virtualization and “cloud” initiatives are increasing the demand on data centers to the point that they have no choice but to seek efficiencies. Or perhaps it is budget pressure that offers no choice and the storage demands of virtualization and cloud initiatives are making it harder to realize the savings.
premium
terry.freeman@dlt.com'
September 7, 2011
Symantec and NetApp…more than the sum of the parts premium
Data protection is an essential part of every IT strategy. A good data protection plan minimizes the risk of downtime and data loss as well as the risk of a compliance incident. Most enterprise level data protection implementations are complex, costly and require thoughtful planning to ensure that the risk of data loss is reduced to an acceptable level. As with any technology there is no shortage of catch phrases to distract the overburdened administrator as well as the budget conscious executive. Phrases like “Integrated Data Protection”, “Industry Leading”, “End to End” and yes, even “cloud”. Let’s face it. The only reason you spend a dime on this stuff is to reduce risk because risk adds cost to your operation. The cost of data re-entry, the cost of down time or the cost of compliance fines. How simple or complex the system that you create to deal with risk is not the issue. The issue is whether the cost of the system is less than the risk of doing nothing.
premium
terry.freeman@dlt.com'
July 27, 2011
Why NetBackup Appliance? premium
Data protection architectures are by necessity complex in nature as they involve the cold calculus of many factors. There is not a “one size fits all” approach to data protection because the operational requirements of each organization dictates how data is used and the local risk assessment process dictates to some extent how it will be protected. Part of the data protection strategy is the backup / restore process. The simplest of these architectures involve a management tier, a process tier and either a storage tier (disk, tape or both). Symantec’s answer to this is the Netbackup Appliance; a 4U 32TB raid 6 stack that includes all three layers in an appliance form factor. It comes with 2 1GigE ports, 2 10 GigE ports and 2 4Gig fiber hbas. It also has a direct out to tape capability for off-site backup replication. Symantec’s de-duplicate anywhere capability is an integral part of this appliance which extends the scope of data protection significantly.
premium
terry.freeman@dlt.com'