3 ways to deploy hyper-converged infrastructure

SCOTT D. LOWE | July 12, 2019

article image
An HCI deployment can be done in one of three ways  full replacement, side-by-side or per application  each with pluses and minus, depending on requirements and resources. So you're adopting hyper-converged infrastructure. You've assessed your vendor options and made the jump into a hyper-converged platform that is intended to solve all of your IT infrastructure problems. This "overnight" decision to deploy hyper-converged infrastructure (HCI) probably took months to accomplish. You had to make a number of decisions along the way, including exactly what type of HCI you want to support. There are stand-alone hyper-converged appliances that integrate everything required for you to go hyper-converged. Another option is hyper-converged-as-a-software layer, which integrates virtualization with storage, networking, compute, management and security on top of the validated hardware or appliances of your choice.

Spotlight

Presidio

We help clients unlock the unlimited potential of a completely connected world. We understand that the backbone of this unprecedented level of connection is Information Technology. At Presidio, we think, architect, implement, and support the practical reality of advanced technologies every day.

OTHER ARTICLES

Storage made simple for hybrid multicloud: the new IBM FlashSystem family

Article | February 12, 2020

In part one of this blog post series, we discussed IBM’s approach for delivering innovation while simplifying your storage infrastructure, reducing complexity, and cutting costs. Now let’s take a closer look at the details of the new IBM FlashSystem family, a single platform designed to simplify your storage infrastructure, reduce complexity and cut costs, while continuing to deliver extensive innovation for your enterprise class storage solutions and your hybrid multicloud environments.

Read More

Xi IoT’s continued journey to be a Multi-Cloud Platform

Article | March 21, 2020

We, the Team Sherlock @ Nutanix, wrapped up year 2019 with amazing line up of platform features for developers and infrastructure admnistrators. Read more about them in my last blog post, titled Xi IoT : Another year in retrospect. Since then we have added many more exciting features that I want to share with you in this new blog post. Xi IoT’s journey started at the Edge with a purpose built platform to manage Infrastructure and Apps at scale but soon this versatile Platform-as-a-Service (PaaS) Stack found its ways into private and public clouds. As we have been talking to our customers and partners, need for such platform to run generic applications in private or public clouds is even more evident.

Read More

We Need to Talk About ‘Cloud Neutrality’

Article | February 10, 2020

We spent a lot of years talking about net neutrality the idea that the companies that provide access to the internet shouldn’t unfairly block, slow down, or otherwise interfere with traffic even if that traffic competes with their services. But there’s an even bigger issue brewing, and it’s time to start talking about it: cloud neutrality. “While its name sounds soft and fluffy,” Microsoft president and general counsel Brad Smith and coauthor Carol Ann Browne write in their recent book, Tools and Weapons: The Promise and the Peril of the Digital Age, “in truth the cloud is a fortress.” Their introduction describes the modern marvel of the data center: a 2 million-square-foot, climate-controlled facility made up of colossal electrical generators, diesel fuel tanks, battery arrays, and bulletproof doors

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Spotlight

Presidio

We help clients unlock the unlimited potential of a completely connected world. We understand that the backbone of this unprecedented level of connection is Information Technology. At Presidio, we think, architect, implement, and support the practical reality of advanced technologies every day.

Events