Blog

Exciting news! Edge Solutions is announcing an updated brand identity, including a new logo, colors, font, and website. You’ll begin to see the new Edge logo on our website, building signs, social media, and more – everything has been updated to reflect the new look and feel of Edge Solutions. While the look is new, the values of the company remain the same. We believe this new look better encompasses the company Edge has become over the past 10 years, as well as where we are headed in the years to come. Since our founding in 2008, we have stuck with the original edge “swoosh,” complete with our signature green color. Over the last ten years, the company has changed dramatically....

Conquering Risk-Aversion in the Age of Digital Transformation In technology, change is a constant. True to form, we’re currently traveling at warp speed on the Starship Enterprise, with the explosion of breakthroughs in Cloud Computing, IoT, Artificial Intelligence, Machine Learning, Virtual Reality and Augmented Reality. These advances, empowered by substantial advances in software, will buttress the creation of new human-machine partnerships1.  The Digital Transformation will rock this planet in ways we can’t even imagine now and not seen since the Industrial Revolution. Of course, there will be winners and losers. The winners will be the ones who step out in front and take the most imaginative risks. In a recent interview with Forbes, Michael Dell points outs "It’s important to recognize that Cloud...

What Is Your QSA Missing? Companies of all sizes are using virtual and cloud environments for computing. Both provide a high degree of flexibility to grow and shrink depending on demand loads, allowing companies to right-size their IT infrastructure. On the other hand, virtualized and cloud environments can be exceedingly complex to understand at a fundamental level. But at the end of the day, all the senior executives want to know is whether it works. If your company deals with credit cards or provides IT services to companies that do, you are subject to the Payment Card Industry Data Security Standard (PCI DSS), which includes audits of your IT environments. As with most standards, however, interpretation can be left up to the individual...

Cloud Computing Cost of Capital The weighted average cost of capital not only helps us understand what it costs to raise money from investors, but it also provides the minimum required internal rate of return for any investment made by a company. A semester’s worth of graduate school finance will help you memorize the formula forever, but the multiple uses of the rate itself is what’s truly handy. Suppose we had a similar metric for determining what “rate of return” we needed when we made the decision to migrate workflows to the cloud? How much easier would it be to make our decisions about whether to pursue cloud computing or not for anything from a single workflow to an entire data...

Lately, there has been a great deal of emphasis in the industry press describing data capacity optimization, also known as data efficiency. While many simply discuss the data capacity technology, as an IT solution provider, we look at the offering from a business perspective. Doing so, will help determine that you are getting what you need from the technology or if you are better off focusing on another area of your architecture. Data Capacity Optimization: Questions to Consider When asked what you gain from data efficiency technology, the easy response is disk space. While that sounds great, it is important to also consider the cost. For example, is the cost in the form of additional overhead or potential deployment delay? To determine...

You’re only as strong as your weakest link. This old adage is especially true when it comes to network security and why role based access control is critical. You can purchase the most expensive, ridiculously feature-rich firewall on the market, install it at the WAN edge, and think that you are safe. But without internal network controls in place as well, you run the risk of someone on the inside stumbling into a restricted resource, and that has the same end result as some foreign agent breaching your perimeter. Someone got somewhere that they really shouldn’t have been allowed, and now data has been compromised. Bring Your Own Devices (BYOD) Policies Blur Internal Network Boundaries With the advent of BYOD and the growing...

Mobile devices really are changing everything – how we communicate, where we work, how readily we can find information, and more. The majority of people in the US own between 3 and 4 mobile electronic devices, and most of these devices don’t even have the option to use a network cable. It’s just easier not to have to plug in somewhere. What if you could free your employees to use a wireless connection as their main form of connectivity even while they are at work, while still preserving your needed network performance and security? This is a very real possibility today. The concept is enticing on several fronts. First and most importantly, it gives your employees a lot of flexibility. Most...

Are you tired of console cables and different flavors of PuTTY? Do the sheer number of SSH sessions piling up in your jump server overwhelm you? Considering the advanced features and cutting edge chipsets that today’s datacenter switches provide, it does seem odd that our method of managing them hasn’t changed much over the years. One of Edge’s new technology partners, Arista, offers some much needed improvements on the “hunt and peck” network management style through the use of open standards. For those of you new to Arista (or that missed our earlier blog post), I’ll give a quick summary. Arista is a datacenter focused networking vendor. Unlike some companies that develop products for every market (wireless, voice, security, servers, datacenter,...

Starting November 7th, 2016, HPE announced that they were partnering with Arista Networks for all datacenter networking opportunities moving forward. Arista’s been making a lot of waves in the industry recently, so as strategic HPE partners, we are very excited about the technology that Arista brings. Arista’s networking portfolio uses Fedora Linux at the core. Useful tools like grep, cat, zcat, tcpdump, awk and more are ready to go from boot. Administrators can choose to work in the bash shell if they are familiar with Linux or work in the more conventional Arista CLI. Because of the Linux architecture, common networking protocols like STP, OSPF, BGP all run as individual processes and can be isolated if problems pop up. VXLAN, MLAG...

It can be difficult these days to keep up with all the new product releases and offerings that churn through the technological landscape. It seems that as soon as one technology matures, another technology rises up to take its place. Some of these tech trends don’t make it much further than product marketing, but some actually stick and begin to be widely accepted as practice. From my perspective, the technologies that don’t persist are ones that don’t solve a “real” problem – sure, there might be marginal benefits to the platform, but not enough to change buying behaviors. The trends that stick are the ones that actually solve a big underlying issue, opening up greater efficiency and productivity. Server virtualization is...