Click here to close now.




















Welcome!

Microservices Expo Authors: Joe Pruitt, Ian Khan, Pat Romanski, Trevor Parsons, Cloud Best Practices Network

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, API Journal, Agile Computing, Cloud Security

Containers Expo Blog: Blog Feed Post

How Many Degrees Separate You and Your Information?

Degrees of separation refer to how you are connected to other people

In case you are not familiar, degrees of separation refer to how you are connected to other people.

When you know somebody directly then you are a first connection, and you are a second degree of separation from people that they are directly connected to. The theory goes that via a mix of the number of people you are directly connected to, as well as how well they are connected to others, that you are only so many degrees of connection separation from many (if not millions of people) and if you go out seven degrees, that could be billions.

If you are familiar with or use Linked In and are directly connected to somebody like myself, which is a first degree. For example in the following image, person A is a first or 1 degree connection to person B, person B is a direct or first degree connection to person C who in turn is a direct connection to person D. Person A is 2 degree from person C and three degree from person D.

Image degrees of seperation

The reason I bring this up is not to say or play games around who is connected to whom, or compare contacts or the number of them, rather to use the idea of degrees of separation in the context of where and how you get your information. For example, you may get your information, insight or experience directly from what you do. On the other hand, you may get information or knowledge directly from the source or person involved with it, which would be 1 degree of separation.

Image degrees of seperation

You could also get the information from somebody else such as a friend, coworker, blogger, analyst, consultant, media journalist, reporter, vendor, VAR or other person who got it directly from the source, which would be 2 degrees of separation. Another example would be you get your information from somebody who cites a report, study, survey or some research that came from another source that involved another party who collected and analyzed the data.

At each point, there is the potential for the information to be changed, adjusted, reinterpreted, misunderstood, or simply adapted to meet particularly needs. What if person A gets their information from person B who in turn got their information from source C, and that comes from person D who got it directly from person E? Assuming that the information was collected and passed along as is, person A should get what was given from person E to person D. However, along the way, various interpretations, more material and views can be applied resulting in a different message.

Image degrees of seperation and information transformation

There is also another variation, which are your spheres of influence or circles of contacts. For example I get to talk with lots of IT pros around the world live in person, virtually and via different venues, those would be direct or no separation. When I hear from a vendor or PR or some pundit telling me what they heard direct, that's 1 degree however if they heard it from their marketing who heard it from a sales rep or other source then it's at least two.

image of ssd technology evolution

Another example of degrees of separation is where you are in relation to technology timelines, evolution, revolution, industry adoption vs. customer deployment. For example, if you are a researcher or development engineer, you are further along on a technology evolution curve than others are. Somebody then takes the researchers work and productize it including making it manufacture able on a cost-effective basis. Along the lines there is also the different degrees of separation between the researcher, initial publicity of a technology breakthrough, general industry adoption and later customer deploy and subsequent success stories. For example, to a research something that they did many years along with those who follow at that point may view what is emerging for real customer deploy as old and yesterday's news.

StorageIO industry trends cloud, virtualization and big data

On the other hand, for customers getting ready to deploy a new technology, product or service, some breaking research may be interesting to hear about, however it may be out several years at best from customer actual use. Also on that theme, the customer of a component can be a manufacturer that in turn test, qualifies and sells a finished solution to their customers. Thus, there are different degrees of separation between industry adoption (e.g. talking about and awareness) and customer deployment (actually buying and using on a mainstream basis) in the technology supply chain.

image of you and your big data and little data and cloud

Yet another degree of separation is between you and your information or data. Some of that data is very close in your own memory (e.g. brain), perhaps others written on note pads (physical or digital) with a copy local or remote including at the cloud. Depending on how your data and information are backed up or protected, there can be added degrees of separation between you and your information.

image of data protection from cloud and virtual data storage networking

Thus, there are different degrees of separation between you and your various forms of information.

Your ability to learn and share information, meet and interact with various people from across different sections of environments is bound by what you are willing to engage via various mediums including social media involvement.

StorageIO industry trends cloud, virtualization and big data

If you are comfortable with where you are at, or what you know, then stay in your comfort zone, or sphere of influence, otherwise, take a chance, venture out, learn what you do not know, meet who you do not know, interact and see new things, or have some dejavu and share what you have seen or experienced before.

After all, knowledge not shared with others is useless if kept only to you. Of course, for NDA material, what is not generally known about, or understood is not discussed and let us leave sleeping dogs lay where they rest. ;)

How good or reliable is your information or G2 that you might be using for forming opinions or making informed decisions around?

Feel free to expand your network getting closer by a degree or two, if not directly too different sources. You can connect with me via Twitter (@storageio), Goggle+, Linked In and Facebook among other means here. Likewise, check out the StorageIO events calendar here for upcoming virtual and live activities. These activities include seminars, web casts, video chats along with in person events while out and about in North America as well as Europe.

Ok, nuff said.

Cheers Gs

Greg Schulz - Author Cloud and Virtual Data Storage Networking (CRC Press, 2011), The Green and Virtual Data Center (CRC Press, 2009), and Resilient Storage Networks (Elsevier, 2004)

twitter @storageio

All Comments, (C) and (TM) belong to their owners/posters, Other content (C) Copyright 2006-2012 StorageIO All Rights Reserved

Read the original blog entry...

More Stories By Greg Schulz

Greg Schulz is founder of the Server and StorageIO (StorageIO) Group, an IT industry analyst and consultancy firm. Greg has worked with various server operating systems along with storage and networking software tools, hardware and services. Greg has worked as a programmer, systems administrator, disaster recovery consultant, and storage and capacity planner for various IT organizations. He has worked for various vendors before joining an industry analyst firm and later forming StorageIO.

In addition to his analyst and consulting research duties, Schulz has published over a thousand articles, tips, reports and white papers and is a sought after popular speaker at events around the world. Greg is also author of the books Resilient Storage Network (Elsevier) and The Green and Virtual Data Center (CRC). His blog is at www.storageioblog.com and he can also be found on twitter @storageio.

@MicroservicesExpo Stories
JavaScript is primarily a client-based dynamic scripting language most commonly used within web browsers as client-side scripts to interact with the user, browser, and communicate asynchronously to servers. If you have been part of any web-based development, odds are you have worked with JavaScript in one form or another. In this article, I'll focus on the aspects of JavaScript that are relevant within the Node.js environment.
Alibaba, the world’s largest ecommerce provider, has pumped over a $1 billion into its subsidiary, Aliya, a cloud services provider. This is perhaps one of the biggest moments in the global Cloud Wars that signals the entry of China into the main arena. Here is why this matters. The cloud industry worldwide is being propelled into fast growth by tremendous demand for cloud computing services. Cloud, which is highly scalable and offers low investment and high computational capabilities to end us...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
Auto-scaling environments, micro-service architectures and globally-distributed teams are just three common examples of why organizations today need automation and interoperability more than ever. But is interoperability something we simply start doing, or does it require a reexamination of our processes? And can we really improve our processes without first making interoperability a requirement for how we choose our tools?
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
You often hear the two titles of "DevOps" and "Immutable Infrastructure" used independently. In his session at DevOps Summit, John Willis, Technical Evangelist for Docker, covered the union between the two topics and why this is important. He provided an overview of Immutable Infrastructure then showed how an Immutable Continuous Delivery pipeline can be applied as a best practice for "DevOps." He ended the session with some interesting case study examples.
Approved this February by the Internet Engineering Task Force (IETF), HTTP/2 is the first major update to HTTP since 1999, when HTTP/1.1 was standardized. Designed with performance in mind, one of the biggest goals of HTTP/2 implementation is to decrease latency while maintaining a high-level compatibility with HTTP/1.1. Though not all testing activities will be impacted by the new protocol, it's important for testers to be aware of any changes moving forward.
One of the ways to increase scalability of services – and applications – is to go “stateless.” The reasons for this are many, but in general by eliminating the mapping between a single client and a single app or service instance you eliminate the need for resources to manage state in the app (overhead) and improve the distributability (I can make up words if I want) of requests across a pool of instances. The latter occurs because sessions don’t need to hang out and consume resources that could ...
The Internet of Things. Cloud. Big Data. Real-Time Analytics. To those who do not quite understand what these phrases mean (and let’s be honest, that’s likely to be a large portion of the world), words like “IoT” and “Big Data” are just buzzwords. The truth is, the Internet of Things encompasses much more than jargon and predictions of connected devices. According to Parker Trewin, Senior Director of Content and Communications of Aria Systems, “IoT is big news because it ups the ante: Reach out ...
At DevOps Summit NY there’s been a whole lot of talk about not just DevOps, but containers, IoT, and microservices. Sessions focused not just on the cultural shift needed to grow at scale with a DevOps approach, but also made sure to include the network ”plumbing” needed to ensure success as applications decompose into the microservice architectures enabling rapid growth and support for the Internet of (Every)Things.
Our guest on the podcast this week is Adrian Cockcroft, Technology Fellow at Battery Ventures. We discuss what makes Docker and Netflix highly successful, especially through their use of well-designed IT architecture and DevOps.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
This week, I joined SOASTA as Senior Vice President of Performance Analytics. Given my background in cloud computing and distributed systems operations — you may have read my blogs on CNET or GigaOm — this may surprise you, but I want to explain why this is the perfect time to take on this opportunity with this team. In fact, that’s probably the best way to break this down. To explain why I’d leave the world of infrastructure and code for the world of data and analytics, let’s explore the timing...
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Public Cloud IaaS started its life in the developer and startup communities and has grown rapidly to a $20B+ industry, but it still pales in comparison to how much is spent worldwide on IT: $3.6 trillion. In fact, there are 8.6 million data centers worldwide, the reality is many small and medium sized business have server closets and colocation footprints filled with servers and storage gear. While on-premise environment virtualization may have peaked at 75%, the Public Cloud has lagged in adop...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
MuleSoft has announced the findings of its 2015 Connectivity Benchmark Report on the adoption and business impact of APIs. The findings suggest traditional businesses are quickly evolving into "composable enterprises" built out of hundreds of connected software services, applications and devices. Most are embracing the Internet of Things (IoT) and microservices technologies like Docker. A majority are integrating wearables, like smart watches, and more than half plan to generate revenue with ...
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. The DevOps approach is a way to increase business agility through collaboration, communication, and integration across different teams in the IT organization. In his session at DevOps Summit, Chris Van Tuin, Chief Technologist for the Western US at Red Hat, will discuss: The acceleration of application delivery for the business with DevOps
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, S...