Page 1



bytes Winter issue

Gary Masada

Reflections of a former Fortune 500 CIO january 2012

visit us at

BB 201111 Issue 1.indd 1

1/6/12 3:36 PM

jn_campus_ad_8.375x10.875.pdf 1 12/12/2011 4:27:35 PM










Today’s campus network requires an open simplified architecture now, but also one that’s ready for tomorrow – even if the future of campus networking demands are unclear. That’s Juniper Networks, simply ready for the now and for the unpredictable.

Take a Survey. Earn a Gift Card. Take a few minutes to answer our survey questions online to earn a $5 Amazon gift card. Plus, you can earn a $100 gift card if you schedule a phone meeting with BEAR Data Solutions.

BB 201111 Issue 1.indd 2

1/5/12 6:56 PM

Don’t just be a cloud builder. Be a rainmaker.

IT thought leaders and over 1 billion end users profit from clouds built on a NetApp storage foundation. To make sure your storage architecture is designed to deliver all the rewards the cloud has to offer, visit

As a proud partner of NetApp, we’re committed to helping you deploy the right storage and data management solution. Call 800.718.BEAR or visit ©2012 NetApp. All rights reserved. Specifications are subject to change without notice. NetApp, the NetApp logo, and Go further, faster are trademarks or registered trademarks of NetApp, Inc. in the United States and/ or other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such.

11NA076.00.NetApp Full Page Ad Cloud Ad.indd 1 BB 201111 Issue 1.indd 3

12/9/11 4:26 PM 1/5/12 6:56 PM


a bit from the CEO I t is with great pride that I write this introduction to our Winter Issue of BEAR Bytes magazine as we close out our 7th full year in business. What an exciting year it has been! We have exceeded the milestone of $ 100 million in overall revenue, we have grown from 50 employees to over 100, and we have opened offices in Australia, Hong Kong, Singapore and the UK. It seems like a lot, but all this has happened in 2011. We also made 3 strategic acquisitions this year to enhance our services portfolio and now have robust offerings for our customers in Managed Services, Staffing Services and Application Development to enhance our other offerings. We believe each of the milestones mentioned above will allow our team to better serve your IT needs in more distinct areas and in a wider geographic foot print. We have now completed IT installations and services projects in more than 20 countries


and we seem to be adding more countries each and every month. With the Holiday Season behind us it is a time to reflect and be thankful for our good fortune of having great customers who have enlisted us with the trust and good fortune to be able to work with them in many areas of their IT departments. Thank you very much! Our success would also not be possible with the vendors and our BEAR Data Solutions Team Members who also make all this possible. While there still seems to be much turmoil in the global economy, we could not be more excited going into 2012 with the support of each of you. Regards, Thank you, and Happy Holidays, Don James Jr., Founder and CEO

we have opened offices in Australia, Hong Kong, Singapore and the UK. It seems like a lot, but all this has happened in 2011.

in this issue

6 simpletext 8 15 minutes 10 security 12 storage 14 virtualization 16 networking 18 the agenda 22 product highlights


BearBytes IS: Founder and CEO Don James

Director of Marketing Shawna Zaw

Sales support Robynn Jenkins, Mark Perez

Editorial ConTent Lauren Ladoceour Bharath Natarajan Paul Byrnes Allan Ramsay

Cover Photograpghy Ron Saunders

BearBytes Magazine TBH: Art+Execution

31 ask the cio 4

BB 201111 Issue 1.indd 4

1/5/12 6:56 PM

SCAle tHe HeigHtS of DAtA growtH A cloud-ReAdy content Solution tHAt cAn SAve uP to 65% in bAckuP coStS. Hitachi Content Platform supports multiple workloads, storage tiers and content types to efficiently manage unstructured data. If you want to: • • • •

Provision data to lower-cost disk for cost efficiency Significantly reduce backup and backup failure Reduce backup cost by up to 65% Enhance your Symantec Enterprise Vault with an integrated solution

Receive a $25 Amazon gift card by scheduling a meeting* to learn more about the Hitachi Content Platform. Call 800-718-BEAR or visit *Offer valid for meetings that happen before February 29, 2012.

© Hitachi Data Systems Corporation 2012. All rights reserved

BB 201111 Issue 1.indd 5

1/5/12 6:56 PM


what is cloud hosting Breaking it down into Byte-sized pieces.

A “cloud” is made by connecting a large number of servers together and arranging them so the amount of computing power available is adjusted to meet the demand.


loud hosting is a popular topic in IT circles these days. It represents a change in how people work with computers. Since personal computers were invented in the 1980’s, we have all become accustomed to downloading and installing programs on our hard drives. Microsoft Office, games and every imaginable kind of software has lived on the hard drive of our PC and used the central processor and memory of the PC to execute its commands. If we want to write a letter using Microsoft Word, or play Urban Terror, the PC’s central processor, memory and hard drive do the work. In the 1990’s there was a model of computing known as “client-server” in which the program doing the work was stored on a server connected via some type of network to the users’ PC’s. Client-server technology never really matured. Yet it provided the foundation for and led the way to the latest computing model, cloud computing and cloud hosting. A “cloud” is made by connecting a large number of servers together and arranging them so the amount of computing power available is adjusted to meet the demand. For example, a large company with thou-


sands of visitors to its web site might use cloud hosting rather than buying dozens of servers to power their site. After all, servers are expensive and require constant attention and management. Using a cloud hosting service, the company does not need to buy servers, and does not need to worry about how many servers might be needed as user demand changes from day to day. To understand cloud hosting in everyday terms, consider the various software applications Google provides: Docs, Calendar, Sites, Shopping, Translation, Voice and many others are all available simply by creating an account and logging in. There is no software to buy or install. Writing a letter with Google Docs, for example, is much like writing with Microsoft Word, however the file is stored in the cloud provided by Google’s many servers. Cloud hosting means you can access your letter from any computer connected to the Internet. Cloud hosting offers many advantages compared to older computing models. Among these are scalability, reduced operating costs and ubiquitous access to files and applications via the Internet and other networks.

BB 201111 Issue 1.indd 6


1/6/12 3:43 PM

When you create a cloud-optimized network, your whole business can do more. You can push high-bandwidth applications to the very edges of the network in seconds. You can reduce complexity and management issues. Imagine a network that works the way you always thought it should.

The answer is Brocade. Brocade can help you create a cloud-optimized network that’s flatter, simpler, and more automated than ever before. 90% of the Global 1000 already rely on Brocade, as do two-thirds of the world’s Internet exchanges.

Find out what Brocade customers already know. Visit

© 2012 Brocade Communications Systems, Inc. All Rights Reserved.

BB 201111 Issue 1.indd 7

Contact your BEAR Data representative at 800.718.BEAR, or email

1/5/12 6:56 PM

talking points

Minding the Gaps Chevron’s former CIO– and current energy and tech consultant— Gary Masada on how IT can make their companies more money.

Do you remember the first time you were someone’s boss? I was a project leader in what Chevron called lubicrants processing. I was three years out of school for my PhD in chemstry, and I was supervising someone 20 years my senior. He held patents for the processes that make the company hundreds of millions of dollars. He knew more than me, but that helped me become a better supervisor because it led me to believe there are more people who are tremendously more qualified than you, and if you can make their life easier or more productive, it would all make you more successul. 8

How did you evolve from chemist to a work-force planner to CIO? One of the things I noticed throughout my career was that the thing I’d least want to do was the thing I did next. I enjoyed it more than I thought I would. Going into HR and workforce planning was the most challenging thing I’ve done. (How do we take care of the future leaders? What do we want the workforce of the future to look like?) Then in 2003, my boss CTO Donn Paul somehow saw me as a CIO even though I had no experience programming.

BB 201111 Issue 1.indd 8

1/5/12 6:56 PM

So how did you get up to speed if you didn’t consider yourself a tech guy? IT there was close to 3000 people, so here was plenty of tech experience when I got there. I started asking questions of my general manager of tech and strategy: What’s the architecture for our IT system look like? What’s the five-year plan going forward? The answer was that we didn’t have either. My response was, well, I want to do something about it. So what did you do? We built on an idea of customer service and made a list of the hundreds of thousands requests Chevron’s departments wanted, prioritized based on what would have the most impact on the corporation’s strategy. That process exposed some things in other parts of the company that weren’t in line with the top’s strategy. It was eye-opening.

What’s the architecture for our IT system look like? What’s the five-year plan going forward?

What’s the best thing IT can do for its company? CTOs need to connect with the C-level team (the leadership of the company), to get an understanding to where the corporation is going. From that, the CIO can figure out what tech needs to do to facilitate where the corporation is going is going. From there, you align what you need to do in terms of investment and people development. How can IT prepare for the future? I left the company in 2008 thinking about how to use social media to the benefit of the corporation. The issue is how Twitter, Facebook, and other media can be used within work in the same way as they are outside work--for people in work to be connected to their projects through social media to stay updated. Some of the social groups were organized by Chevron employees. One was formed in tech and grew on its own enough to where public affairs came in to make this official and fund it.

Data Center Class WAN Optimization Optimize your network for: • Disaster recovery • Data center consolidation • Virtual desktops / servers • Cloud computing / storage • Unified communications © 2011 Silver Peak Systems, Inc. All rights reserved.

BB 201111 Issue 1.indd 9

1/5/12 6:56 PM


who goes there? The question is how do you leverage your existing identity infrastructure as you migrate some of the infrastructure into the Public Cloud?

Identity and Access Management in the Cloud

“ 10

BB 201111 Issue 1.indd 10


dentity and access management (IAM) refers to the processes, technologies, and policies for managing digital identities and controlling how identities can be used to access resources. Typically, IAM includes Identity provisioning and storage, Authentication and Authorization processes. A complex collection of technologies is required for Identity management in a cloud system to manage authentication, authorization and access control across distributed environments. These environments might include assets both on the private cloud and the public cloud and can also cross-security domains.

Claims Based Security Model One possible solution would be to extend an existing claims-based security model to the cloud. Claims-based identity is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet. It also provides a consistent approach for applications running on-premises or in the cloud. When claims-based authentication is used, it does not matter whether the application or service is hosted in the Private Cloud or the Public Cloud; the authentication mechanism is the same. The application simply evaluates the claim provided by the user and determines whether that user has access rights to use the application, and, if so, what portions of the application the user can access. Claims can be much more than just roles or permissions. One of the added benefits of working with a claims-based model is that a claim can carry information about an authenticated user, such as e-mail address, full name, birth date, team affiliation, role within the company and more. Applications and services can also use claims to verify user information. Claims-based security not only centralizes user data stores after a claim has been authenticated, that claim is readable across platforms. This means that the claim can request resources in different trust domains, as long as the issuer is trusted by the other domain.

whether the application or service is hosted in the Private Cloud or the Public Cloud; the authentication mechanism is the same.


1/5/12 6:56 PM

News Criminals are taking over Domains with Typols

Database Activity Monitoring: An Emerging Technology for Audit and Compliance Gaps in existing native database logging and auditing capabilities and lack of intelligence from a security perspective in existing DBMS technology is driving companies to seek new solutions. Among these are enterprise database auditing and real-time protection solutions (database activity monitoring), which offer comprehensive, heterogeneous enterprise wide database auditing and real-time monitoring and alerting (and in some cases blocking) capabilities. A number of different types of DAM systems are currently available and each type provides a different set of features and drawbacks.

Typo domains have in recent years been monetized using methods potentially damaging to consumers. Rather than simply placing payper-click ads on squatted domains, typosquatters are now copying the look-and-feel of websites to trick surfers into signing up for potentially expensive services. As an organization at risk, what should you do? Blocking DNS traffic destined for typo domains can prevent sensitive data leaving the network, but this would not prevent emails sent by third parties from being intercepted. Preemptive registrations of likely sub-domain typos can also make an effective defense. CSO’s need to add robust measures against typosquatting, and not depend solely on their legal and marketing departments to fend off this threat.

Smartphone hacker attacks are becoming an enterprise security headache Security experts say attacks on smartphones are growing fast -- and attackers are

server security in the enterprise, the problem could actually be much larger. There

becoming smarter about developing new techniques. Smartphones have become

are many factors that cause this including unknown developers offering apps and

wallets, e-mail lockboxes, photo albums and Rolodexes. And because owners are

the unique security challenges that make it difficult to build trust on a mobile phone.

directly billed for services bought with smartphones, they open up new angles for

Just as the enterprise has worked to provide increased server security, the mobile

financial attacks.

industry will need to do the same now that the data available on a smartphone can be

Although there may be some similarities between smart phone security and

just as valuable as that on a server. 11

BB 201111 Issue 1.indd 11

1/5/12 6:56 PM


lost and found Big Data Backup and Recovery Challenges


ig Data creates a unique set of challenges around capture, storage, search, sharing, analytics, visualization and protection. Backup and recovery challenges faced by Big Data users today are going to be the same challenges that most enterprise IT shops are going to face in the future. Big Data can be separated into two types—structured and unstructured data and it is clear that unstructured data is growing faster than structured data. IDC estimates that over the next ten years, there will be 75X the number of files and this is the big challenge. Traditional backup has a huge problem with millions of files because it sees the world at the level of the file. That means that whenever a file changes, even a little, it gets backed up again. And worse, the system has to continually scan through all those files to figure out what’s new.  The solution to these problems includes data optimization and Active Archiving

“ 12

BB 201111 Issue 1.indd 12

Data Optimization First, examine what data does not have to be backed up because it can be easily recreated from the source system that is already being backed up. Once identified, this data can be excluded. For the data that needs to be backed up there can be redundancy in the Big Data environment. Disk backup devices are suited for the small file transfers and de-duplication can eliminate redundancy and compress much of the data to optimize backup capacity. Active Archiving Clearly, de-duplicated disk is needed, but it should be used in conjunction with tape to optimize costs. Active Archiving is the ability to merge high performance primary disk storage with secondary disk and then tape to create a single, fully integrated access point. The data that needs to be analyzed would be loaded onto the high performance tier leaving the older data in tape. The Active Archive software would automatically move

Traditional backup has a huge problem with millions of files because it sees the world at the level of the file.

1/5/12 the data between the various tiers based

6:56 PM

News NFS will be increasingly used as VMware storage for SMBs

Are your disaster recovery programs ready?

The significant presence

believes a lack of investment of time and money during

of Network Filesystem

the recent down economy is the root cause. Over the

Storage (NFS) in the

next three years, Forrester believes we will see increasing

datacenter today, as well as

attention on building highly available infrastructure

the lower cost-per-port for

that can deliver continuous services to end users by

IP based Storage, has lead

leveraging technology improvements such as cloud-

to many people wanting

based disaster-recovery services.

In a recent study, Forrester found that many enterprise disaster-recovery and high-availability programs don’t adequately protect against outages and that the majority of companies aren’t prepared for a disaster. Forrester

to deploy virtualization environments with Network Attached Storage (NAS) shared storage resources.  In order to use many of the advanced features in VMware vSphere, you need a

Storage cloud services gains momentum

shared storage device. NFS

As the volume of data grows at an exponential rate we’re

could become the leading

beginning to see a variety of different cloud storage

choice. NFS is built into

offerings become attractive, including private, public

VMware and is easy to set

and hybrid models. All three offer enterprises large scale,

up, operate and manage.

better planning capabilities and more flexibility to meet

NFS is optimized for

unique user demands; but with growing concerns over

random IOPS, which are

the vulnerability of critical information on public clouds,

what virtual machine IOPS

the majority of investment in the near term will go to the

look like.

private model.

Is All Flash storage becoming a reality? For enterprises undertaking the transition to a virtualized environment, flash memory can be an alluring proposition. Faster, smaller and more efficient than traditional disk technologies, flash makes a convincing case. But there’s a problem. Flash is expensive. That’s where new startups are looking to make their mark. They are offering flash storage arrays that delivers enterprisecaliber storage at a price point geared to lure away companies still invested in disk storage or a hybrid disk-flash model. Their success or failure could shape this trend to all flash storage data centers. 13

BB 201111 Issue 1.indd 13

1/5/12 6:56 PM


Limitless? The pros and cons of D the storage hypervisor

ata center administrators have seen the promise of storage virtualization: better capacity, performance and data protection management. But they don’t see why they shouldn’t be able to get these benefits across all their storage assets. A storage hypervisor unifies all your storage assets into an easily managed, high-performance virtual storage pool.

Benefits of Storage Hypervisor A storage hypervisor is the concept of letting the server virtualization hypervisor run an increasingly larger portion of the storage services that are typically found in the array. Hypervisors can transparently move virtual machine disk images to different storage platforms while the VM is still running its application.

“ 14

BB 201111 Issue 1.indd 14

Running more of the storage services in the hypervisor also simplifies storage management for the administrators. Compared to legacy storage virtualization, there are no new servers to deploy, the storage capabilities are in the hypervisor and it borrows resources from each host to accomplish its storage management duties. This means that disk can be bought as a stand-alone system to address the current need. The IT staff doesn’t need to worry about how scalable it is. They just keep adding more storage systems and let the hypervisor be responsible for making them into a cohesive and easy to manage group. The biggest benefit that a storage hypervisor would be able to provide is an almost perfect scaling model. The addition of each host would mean another hypervisor to help out with storage services tasks. This scaling model may be more ideal than even using scale out storage, which needs to be expanded and managed independently from scaling the virtual host environment. The storage hypervisor would scale automatically with the host environment. Shortcomings Weakness of storage hypervisor is in providing advanced storage service features like snapshots, thin provisioning, cloning and replication. Hypervisor managed thin provisioning volumes, like snapshots, perform significantly worse than thick or fully allocated volumes. The solution is to fill in the weak areas with third party software solutions that can run as a filter driver or as a virtual machine. They can improve the performance of dynamically allocated volumes and snapshots while providing unlimited use of those features without performance loss.

Running more of the storage services in the hypervisor also simplifies storage management for the administrators.

1/5/12 6:56 PM

NEWS Two exciting features of vSphere 5 deliver control over storage resources

Enterprises Will Tread Cautiously Into VDI A new survey shows that many companies are looking into implementing client that delivers applications to end point computers virtually, rather than from software on a desktop or server. However, the survey says, companies are finding that client virtualization is more complex to implement than they realized, that ROI is difficult to calculate, and that training end users can be a challenge. The bottom line for IT departments is that while VDI can introduce management savings in some areas, there will always be a trade-off.

The release of VMware Inc.’s vSphere 5 brings many exciting new features and enhancements to the virtualization platform, especially when it comes to storage. Two of the biggest new features in that area are Storage Distributed Resource Scheduler (DRS) and Profile-Driven Storage, which provide some much-needed control over storage resources. In previous versions of vSphere, Distributed Resource Scheduler balanced VM workloads based on CPU and memory resource utilization. Storage DRS extends this capability to storage, enabling intelligent VM initial placement and load balancing based on storage I/O and capacity conditions within a cluster. Profile-Driven Storage, for its part, ensures that VMs are placed on storage tiers based on servicelevel agreements (SLAs), availability, performance and capabilities of the underlying storage platform.

Windows 8 to include Hyper-V virtualization Windows 8 will include Microsoft’s Hyper-V virtualization tool in an effort to

the new Windows 8 Hyper-V, users will need a 64-bit processor, the 64-bit version

attract developers, IT professionals, and other users who need to run, test, or

of Windows 8, and at least 4 gigabytes of RAM. Hyper-V also demands a 64-bit

support virtual environments. Virtualization tools such as Hyper-V allow users to

system that has Second Level Address Translation (SLAT), a feature that helps with

run multiple operating systems and environments on the same machine. To run

memory management. 15

BB 201111 Issue 1.indd 15

1/5/12 6:56 PM


road warrior Keeping up with a network A on the move successful mobile deployment yields compelling benefits— increased worker productivity, lower operational costs, and improved customer service and support. This success hinges on your ability to provide your mobile workforce with secure, real-time access to critical information and applications in the field. A well-executed mobile deployment empowers workers with the resources they need to be effective—resulting in faster business transactions, improved customer service, and ultimately, happier customers and increased revenue.

Mobile VPN Requirements • Make the network appear fixed and constant, regardless of changes • Handle coverage gaps gracefully • Provide security on par with wireline VPNs • Use standards-based encryption • Use standards-based authentication

“ 16

BB 201111 Issue 1.indd 16

At the core of a successful mobile deployment is a Mobile Virtual Private Network (VPN)—a solution providing mobile workers with secure, reliable, remote access to network resources and information from virtually anywhere. Only a Mobile VPN is designed to deal with the unique challenges associated with mobile computing such as wireless security, performance and roaming. Mobile VPNs are used in environments where workers need to keep application sessions open at all times, throughout the working day, as they connect via various wireless networks, encounter gaps in coverage, or suspend-and-resume their devices to preserve battery life. A conventional VPN cannot survive such events. Mobile VPNs are commonly used in public safety, home care, hospital settings, field service management, utilities and other industries. Comparison with Traditional VPNs A VPN maintains an authenticated, encrypted tunnel for securely passing data traffic over public networks (typically, the Internet.) Other common VPN types are IPsec VPNs and SSL VPNs. IPsec VPNs are useful for point-to-point connections when the network endpoints are known and remain fixed. SSL VPNs provide for access through a Web browser and are commonly used by remote workers. Makers of mobile VPNs draw a distinction between remote access and mobile environments. A remote-access user typically establishes a connection from a fixed endpoint launches applications that connect to corporate resources and then logs off. A mobile VPN maintains a virtual connection to the application at all times as the endpoint changes, handling the necessary network logins in a manner transparent to the user.

Only a Mobile VPN is designed to deal with the unique challenges associated with mobile computing

1/5/12 6:56 PM

NEWS Are you ready for Networking Services in the cloud? Cloud service providers have begun offering network and application optimization, security management and virtualized desktops. The advantages of Networking as a Service is that it eliminates upfront capital expense, and gives you the option to upgrade your hardware for no cost at any time, and removes the financial risk of owning too much infrastructure. Cloud networking solutions combine rich enterprise features with intuitive web-based management that eliminates specialized training and certifications. The introduction of these services presents the IT infrastructure group with a new challenge to determine which of the traditional IT services it should continue to provide itself, which ones it should acquire from a cloud provider and which should be provided as a hybrid solution.

Windows 8 security is stronger and less visible Microsoft has added a number of protection features to Windows 8 to better protect the system, all the while making the security less intrusive by limiting the number of notifications a user may receive. For example, the company’s SmartScreen technology for detecting potentially malicious sites -- introduced with Internet Explorer 8 -- will be built right into the OS to allow any file downloaded to a Windows 8 computer to be checked out by the system, yet the protection should not alert the average user more than twice a year, Microsoft says. The higher signal-to-noise ratio will likely make users pay more attention to the truly dangerous incidents. When the users do see a notice, it will signify a higher risk scenario.

OpenFlow is gaining attention OpenFlow is a programmable network protocol designed to manage and direct traffic

management, or inconsistent traffic management between equipment from multiple

among routers and switches from various vendors. It separates the programming of

vendors. OpenFlow is designed to provide consistency in traffic management

routers and switches from underlying hardware.

and engineering by making this control function independent of the hardware it’s

Vendors offer varying degrees of user programmability on their routers and switches. This can lead to limited functionality for traffic engineering and

intended to control. Today, the OpenFlow protocol has moved out of academia and is driven by the Open Networking Foundation. 17

BB 201111 Issue 1.indd 17

1/5/12 6:56 PM

the agenda

Events calendar 2012 Jan 24 - 26

Jan 26 - 28

West 2012, San Diego, CA

Macworld 2012 San Francisco, CA

Feb 14 - 17

Feb 16

FAST ‘12: 10th USENIX Conference on File and Storage Technologies San Jose, CA

Networking Reception at the HIMMS Service Days at the Windows Lounge at Bally’s Las Vegas, NV

May 6 - 10,

Jan 30

Feb 13 - 16

Networking Reception at the MHS Conference in MD

Cloud Connect 2012 Santa Clara, CA

Feb 27 – March 2

March 26 - 29

April 25 - 27

RSA Conference in San Francisco, CA

ESC Silicon Valley 2012 Embedded Systems Conference, San Jose, CA

NSDI ‘12: 9th USENIX Symposium on Networked Systems Design and Implementation, San Jose, CA

June 10 - 14

June 24 - 27

July 2012

Aug 27 - 30

Interop Las Vegas Las Vegas, NV

Cisco Live 2012 is in San Diego, CA

ISTE 2012 International Society for Technology in Education, San Diego, CA

Technology Day at the Del Mar Horse Races in San Diego, CA (date TBD)

VMworld in San Francisco, CA

Sept 2012

Sept 30 Oct 4

Oct 14 - 16

Oct 16 - 19

Nov 13 - 16

MISAC Conference at the Hilton San Diego Resort, CA

CETPA Conference in Monterey, CA

CA World Mandalay Bay, Las Vegas, NV

Annual BEAR Data Charity Golf Event (date & location TBD)

Oracle OpenWorld 2012 in San Francisco, CA

Jan 31 Feb 02 Green Data Center Conference & Exhibition San Diego, CA

Dec 3 - 6 Gartner Data Center Las Vegas, NV


BB 201111 Issue 1.indd 18

1/5/12 6:57 PM

bear around town

BEAR Data Charity Golf Classic Foursomes from all over the industry took to The Course at Wente Vineyards to help raise money for the American Cancer Society and—as you can see—have some great fun! 19

BB 201111 Issue 1.indd 19

1/5/12 6:57 PM

Transforming IT to Save Lives

The story of how Be The Match is leveraging technology to give critically ill patients a chance at life


f patients with life‑threatening diseases such as leukemia, lymphoma, and sickle cell disease, more than 70% need a marrow transplant but don’t have a match in their family. Be The Match is a service operated by the nonprofit National Marrow Donor Program that connects these patients with donors. By providing patients access to a registry of more than 15 million donors, Be The Match facilitates thousands of potentially lifesaving transplants every year.

BB 201111 Issue 1.indd 20

Diseases like leukemia and lymphoma can progress in a matter of months or weeks, so speed is critical. Patients benefit most when Be The Match can deliver the right cells at precisely the right time in the process. The more efficiently donor data flows through the system, the faster critical decisions can be made and the greater the chance that patients can be saved. When Michael Jones was hired as Be The Match’s chief information officer in 2007, he soon realized that the organization’s infra‑ structure was not up to the task. He says, “Without a com‑ plete IT transformation, we knew we simply could not handle the expected data growth and com‑

1/5/12 6:57 PM

plexity with our existing landscape of dispa­ rate systems and storage silos.” Jones looked for a better IT solution and found it in NetApp, a company that specializes in creat‑ ing innovative storage and data management solutions. NetApp has allowed Be The Match to accelerate the transplant process by improving information visibility and speeding up service delivery. Thanks to the seamless scalability and faster data integration of NetApp’s storage infrastructure, Be The Match has reduced capacity requirements and dramati­ cally simplified management, allowing

has reduced patients’ waiting time by 15%, shaving off two weeks on average. A new recruitment portal built on Be The Match’s shared IT infrastructure helped increase donor registrations to about 850,000 per year in 2009 and 2010, more than doubling the annual rate of the previous nine years. With the ability to more quickly integrate information about how patients respond to treatment, Be The Match is improving its algorithm’s matching accuracy and thus boosting survival rates. Finally, the service has become truly international, making its

Join the Registry If you are interested in helping patients who need donors, join the Be The Match Registry today at www.BeTheMatch. org. You could be the one to save a life. we’ve been able to speed up the entire process, help more people in less time, and do it cost-effectively,” says Jeffrey W. Chell, M.D., chief executive officer of Be The Match.

Accelerating Data Flow to Save More Lives Be The Match transformed IT into a catalyst for achieving lifesaving goals. Faster data access speeds the process of matching patients with potential donors.

3,700 transplants per year in 2007

Ac to

Be ach spe pot

5,500 transplants per year in 2011

10,000 transplants per year goal by 2015


its database to scale from 65TB to 350TB without hiring additional employees. “There is no way we could have achieved our growth numbers or gained the efficiencies we have—with no increases in headcount or expenses—without building our foundation on NetApp storage,” Jones says. Not only faster and more efficient, Be The Match’s new infrastructure allows it to improve and expand the system. Since its IT transformation, Be The Match

BB 201111 Issue 1.indd 21

search algorithm and resources available to 525 partners in more than 40 countries via a NetAppbased private cloud. Today, 50% of Be The Match transplants cross an international border. By rethinking its storage infrastructure, Be The Match has freed itself from the limits of its old architecture and unlocked new possibilities for saving the lives of critically ill patients around the world. “With NetApp at the foundation of our IT architecture,

“The need for Be The Match’s work might grow 100-fold over the next two decades, and our cellular therapies could help treat many other diseases. NetApp solutions will allow us to accelerate those opportunities to further improve and save lives.”

1/5/12 6:57 PM

product highlights

Brocade Communications Systems

Brocade ICX 6610 Switch The Brocade ICX 6610 Switch redefines the economics of enterprise networking by providing unprecedented levels of performance, availability, and flexibility in a stackable form factor—delivering the capabilities of a chassis with the flexibility and costeffectiveness of a stackable switch.

Brocade VDX 6730 Data Center Switch The Brocade VDX® 6730 Data Center Switch is a 10 Gigabit Ethernet (GbE) fixed port switch with LAN and native Fibre Channel ports. It supports multiple connectivity options, including classic ToR server deployments, Ethernet fabrics, and Ethernet storage connectivity for Fibre Channel over Ethernet (FCoE), iSCSI, NAS, and bridging Fibre Channel Storage Area Networks (SANs) and Ethernet fabrics.

Brocade NetIron XMR

Brocade BigIron RX The Brocade BigIron RX Series of switches provides over one billion packet-per-second performance for cost-effective scaling in data center deployments, with hardware-based IP routing to 512,000 IP routes per line module. The high-availability design features redundant and hot-pluggable hardware, hitless software upgrades and failover, subsecond link/node failover, and graceful BGP and OSPF restart.


The Brocade NetIron XMR Series of routers provides unparalleled performance in a multi-terabit architecture. The routers offer highly scalable IPv4/IPv6 routing and advanced MPLS capabilities while providing industry-leading wire-speed 100 GbE and 10 GbE density–ideal for Internet backbones and service provider cores. By enabling higher network performance and scalability with the best price/performance, the NetIron XMR helps service providers transform their businesses with highvalue cloud services.

BB 201111 Issue 1.indd 22

1/5/12 6:57 PM

product highlights


NetApp iSCSI SAN Solutions We provide you a full range of proven iSCSI solutions to meet your most demanding performance, security, quality-of-service, and availability requirements. Our high-performance, modular FAS storage, combined with leading-edge data and storage management software, provides you with compelling solutions for storage consolidation, backup, and disaster recovery. Our iSCSI SAN Differentiators • Scale from entry level to high end in a single family • Nondisruptive application scaling • Superior point-in-time copy and cloning • Simple DR at low cost • Thin provisioning • Single management framework, regardless of protocol

• Automated storage management • V-Series product line supports third-party FC storage from EMC, IBM, HP, and others • Data duplication for primary, backup, and archival data • RAID-DP®: High-performance double disk failure protection




Maximum Capacity: 136TB Drive Type: SAS. FC. SATA Maximum Memory: 8GB Maximum Ethernet: 1GbE: 8

Maximum Capacity: 600TB Drive Type: SSD. SAS. FC, SATA Maximum Memory: 32GB Maximum Ethernet: 1GbE: 52 10GbE: 24 Maximum LUN Hosts: 4,096

Maximum Capacity: 2,400TB Drive Type: SSD. SAS. FC, SATA Maximum Memory: 48GB Maximum Ethernet: 1GbE: 100 10GbE: 48 Maximum LUN Hosts: 4,096

Maximum LUN Hosts: 1,024 23

BB 201111 Issue 1.indd 23

1/5/12 6:57 PM

product highlights

Juniper Networks Network Management

Network and Security Manager Central Manager Network and Security Manager (NSM) Central Manager is a Web UI-based appliance that enables large-scale NSM deployment and global policy enforcement. Administrators can use this network performance management system to create a centralized set of corporate network and IT security policies across regional servers and apply them across the entire network.

Campus Networking

J Series Services Routers The J Series Services routers are a collection of modular routers for enterprises running desktops, servers, VoIP, CRM/ERP/SCM applications. It offers up to six PIM slots for additional LAN/WAN connectivity, Avaya VoIP Gateway, and WAN acceleration.

MX40 3D Universal Edge Router NSMXpress NSMXpress is a Web-based appliance version of Network Security Manager (NSM) that is easy to install, maintain, and support. Includes full functionality with hardened OS optimized for network security and network performance management.

The MX40 3D Universal Edge Router supports two MIC slots, two built in 10GE ports in a compact form factor that makes it powerful but cost-effective platform for small scale environments with space and power constraints in both enterprise and service provider networks that need full MX Series features and capabilities. The Ethernet services router supports two MIC slots and is software upgradable to an MX80.

STRM Series Security Threat Response Managers Juniper Networks Security Threat Response Manager (STRM) family of network security appliances provide a converged point of network performance and security management for enterprise and service provider customers. This network performance and security management system offers an integrated log, as well as network threat and compliance management for Juniper Networks environments.


MX240 3D Universal Edge Router The MX240 3D Universal Edge Router delivers increased port density over traditional carrier Ethernet service platforms as well as performance of 200+ Gbps throughput, scalability, and reliability in a space-efficient package.

BB 201111 Issue 1.indd 24

1/5/12 6:57 PM

product highlights

Cisco Systems Cisco UCS B-Series Blade Servers

Cisco UCS C-Series Rack-Mount Servers • • • •

Increase performance, energy efficiency, and flexibility for demanding virtualized and nonvirtualized applications Adapt processor performance to application demands and scale energy use based on need Use network adapters for consolidated access to the unified fabric Reduce the number of adapters, cables, and access-layer switches needed for LAN and SAN connectivity UCS B200 M1 M2 Blade Servers Balanced simplicity, performance, and density for production-level virtualization and other mainstream data center workloads.

Cisco UCS B250 Extended Memory Blade Server Increase performance and capacity and offer a more cost-effective memory footprint for less demanding workloads

UCS B440 High-Performance Blade Server An Intel® Xeon® processor E7-4800 based family of servers that offers new levels of scalability, performance, and reliability.

• • •

Help reduce the total cost of ownership (TCO) and increase business agility Balance simplicity, performance, and density for production-level virtualization, web infrastructure, and data center workloads Extend unified computing innovations and benefits to rack-mounted servers with Cisco Extended Memory and Virtual Interface Card technologies UCS C210 M1 and M2 2-socket, 2 RU servers that offer up to 16 internal disk drives for up to 8 terabytes (TB) of storage.

UCS C260 M2 One of the industry’s highestdensity, most expandable, 2-socket, 2 RU servers

UCS C460 M2 A 4-socket, 4 RU rack-mount server for data-demanding applications; enterprise-critical, stand-alone software; and virtualized workloads 25

BB 201111 Issue 1.indd 25

1/5/12 6:57 PM

product highlights


The Foundation Of A Secure Business Network. The SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, and Application Intelligence and Control with real-time Visualization. The SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet the needs of the most high-performance networks. SuperMassive E10000 Series Utilizing a massive multi-core architecture (up to 96 processing cores), this appliance series provides Next-Generation Firewall protection and advanced application control for large enterprise, government, university and service provider deployments. As the flagship of the SonicWALL lineup, the SuperMassive E10000 Series combines sophisticated software with a massively scalable multi-core hardware design to provide up to 30 Gbps of deep packet inspection performance.. • • •


Next-Generation Firewall. Application Intelligence. Intrusion prevention.

• • •

Deep Packet Inspection for SSL Encrypted Traffic (DPI-SSL). SonicWALL Mobile Connect™ High performance.

BB 201111 Issue 1.indd 26

1/5/12 6:57 PM

[ Tough






Who Makes The highesT PerforMance LoW LaTency nexT-gen fireWaLL?

SonicWALL® enables IT to get back in control and more easily and efficiently stay ahead of today’s constantly evolving threats and application-related issues. An advanced security platform consolidates core Next-Gen Firewall application intelligence, control and visualization, gateway protection, and inspection for SSL encrypted sessions for enterprises along with WAN acceleration for distributed offices. SonicWALL’s low latency platform scans and secures every packet of every protocol, efficiently securing the network, controlling Web 2.0 apps, and optimizing bandwidth. Secure network optimization that minimizes complexity and latency is now within reach. Learn about our SuperMassive ™ E10000 Series and the rest of our network security line-up at

© 2011 SonicWALL, Inc. SonicWALL and the SonicWALL logo are registered trademarks of SonicWALL, Inc.

BB 201111 Issue 1.indd 27


1/5/12 6:57 PM

product highlights


HP ProLiant DL120 G7 The HP ProLiant DL120 G6 Server is an entry-level rack-optimized server providing you with all confidence of a HP ProLiant server.

HP ProLiant DL380 G7 The HP ProLiant DL380 G7 Server continues to deliver on its heritage of engineering excellence with increased flexibility and performance, enterprise-class uptime and HP Insight Control manageability, 2 socket Interl Xeon performance, and 2U density for a variety of applications.


HP ProLiant DL980 G7

HP ProLiant DL580 G7

The HP ProLiant DL980 G7, featuring HP’s PREMA Architecture, delivers the balanced scaling, self-healing resiliency and breakthrough efficiency needed to overcome the challenges of today’s most demanding x86 compute environments.

The HP ProLiant DL580 G7 continues to deliver best-in-class HP performance, manageability, and reliability features with the latest Intel processor technology.

HP ProLiant DL360 G7 Combining concentrated 1U compute power, HP Insight Control, and essential fault tolerance, the HP ProLiant DL360 G7 is optimized for space constrained installations.

HP ProLiant DL370 G6 The HP ProLiant DL370 G6 provides 2 processor compute power in a conviennt, 4U rack optimized chassis designed for businesses who want enterprise class features and performance.

BB 201111 Issue 1.indd 28

1/5/12 6:57 PM

product highlights


HP ProLiant BL2X220C G7 Server Blade

HP ProLiant BL490C G7 Server Blade

HP ProLiant BL680C G7 Server Blade

The HP ProLiant BL2X220C G7, a breakthrough fabric and density server, offers industry leading networking capabilities with an embedded Mellanox QDR Infiniband solution.

Known as the virtualization blade, the HP ProLiant BL490C G7 Server is characterized by its memory density in a half-height form factor.

The BL680C G7 provides maximum performance and unparalleled scale-up expansion never before seen in a 4P x86 blade. This creates an extremely powerful database engine while handling very demanding workloads.

Faster, More Reliable Web-based Applications With Lower IT Costs Akamai makes your applications Internet ready, with a portfolio of application delivery services that fill the gap left when not addressing the Internet cloud. Akamai provides the only solution for addressing application delivery bottlenecks in the "cloud", with a unique globally distributed platform requiring no additional hardware or client-side technology. The result is a fully transparent and optimized architecture for addressing critical application delivery bottlenecks. To learn more, visit

Š2012 Akamai Technologies, Inc. All Rights Reserved. Akamai and the Akamai wave logo are registered trademarks. Faster Forward and The Akamai Intelligent Platform are trademarks. 29

BB 201111 Issue 1.indd 29

1/5/12 6:57 PM



so e l u r the


rkin o w t e

HP Networking Solutions HP Converged Infrastructure helps organizations harness their network’s potential to fuel competitive advantage today and into the future. With HP's networking portfolio, BEAR Data solutions can help you simplify your network, deliver business services and more flexibility. You can aggressively contain costs to open up new opportunities for business growth and fulfill the promise of a unified, converged IT infrastructure. Contact BEAR Data at (800) 718-BEAR or

BB 201111 Issue 1.indd 30

1/5/12 6:57 PM




ask the cio

Just add water and stir…. Lantz Litchfield on the complexities of tech number will lead them to a utopian solution that will forever How many times do we hear someone say, “Oh that’s easy”, “It’s a no brainer”, “It practically configures it’s self”? solve their problems. Nevertheless the fact is that technology is for the most part very complex, and most people do not Those simple little words that are an implication of just understand technology to the degree that would warrant a how easy “something” in technology or otherwise could be satisfactory outcome. If the endeavor is undertaken to gain a yet never live up to the simplicity that is implied. Every time I true and deep understanding of technology and its intrinsic hear those words dark clouds of doubt creep in to the logical underpinnings and if the afore side of my brain ( or at least mentioned has become somethe side that thinks J) and my one’s aspiration this certainly can memory quickly recalls a series be accomplished with considof dreadful outcomes that were erable training, study and a lot derived from those words that in of real world experience. This the beginning were so effortlessly is where the value in the word spoken. Regardless of which part value added reseller should of my world the experience came come into play. I have often told from be it a entire infrastructure clients that we see more in a going down or the mechanic month than they will in their own that uttered those words to me environments in the next year. which afterword resulted in The merit to this statement is losing one of the engines shortly the fact that it is not uncommon after takeoff. And then once for a VAR engineer to work in again, those simple words begin twenty or more clients with in echoing in my mind. a month’s time and in doing so It is pleasant to deem that be engaged in numerous and the world of technology or our diverse solutions, additionally world in general is simple and in that same time frame a engithat we can easily get qualineer has an opportunity to attend fied expert answers to our we as an industry four or more various manufactechnology questions from the have a common tures trainings and on a yearly never ending myriad of people resolve in trying average be trained and certify and websites. Just spend a few to simplify on at least 5 or more product minutes doing Google hacks the solutions lines in their chosen discipline. and you will quickly conclude Var engineers also have access that we really need to consider to other engineers on their team the source of the informawith the same kind of in depth knowledge and experiences. tion. A perfect example of what happens when you dumb Additionally as a VAR we have direct access to the manufacdown complexity occurs in Virtualization offerings. When tures teams of engineers. All of this combined experience is we face a technology as complex as the many facets of just one of the numerous core components of the value we Virtualization, we as an industry have a common resolve in bring to our clients. The bottom line is that we as a industry trying to simplify the solutions regardless of whether we are need to spend more time using this experience helping our trying to explain what is, how it works or just the thin veil of clients understand and deal with complexity of technology in selling various products as a solution . But we often oversimtheir environments and less time concocting Just add water plify it by creating just add-water-and-stir solutions. We lead and stir type mechanisms. the less sophisticated technologist to believe that one part 31

BB 201111 Issue 1.indd 31

1/5/12 6:57 PM

©2011 Cisco Systems, Inc. All rights reserved.

we’re not just making servers. we’re making server history. While innovation comes rapidly in the IT industry, basic server architectures haven’t changed for decades. That’s why Cisco introduced the Cisco Unified Computing System - which integrates compute, networking, storage access and virtualization. IT departments dramatically reduce data center complexity while: • Lowering operating costs by up to 30%. • Reducing deployment times from weeks to minutes. • Harnessing the power of over 30 world-record performance benchmarks. The Cisco Unified Computing System signals the next evolution of the data center - where everything, and everyone, works together like never before.

Find out more at


BB 201111 Issue 1.indd 32

1/5/12 6:57 PM

BearBytes Winter Issue  

In BearBytes relaunch issue, find articles and commentary covering Professional IT Security, Storage, Virtualization and Networking.