{"id":1365,"date":"2004-12-22T00:00:00","date_gmt":"2004-12-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/22\/emc-raises-bar-on-network-management\/"},"modified":"2021-12-30T11:39:14","modified_gmt":"2021-12-30T11:39:14","slug":"emc-raises-bar-on-network-management","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/22\/emc-raises-bar-on-network-management\/","title":{"rendered":"EMC Raises Bar on Network Management"},"content":{"rendered":"<p>EMC&#8217;s bid to acquire Smarts Inc. for $260 million made it the latest systems vendor to add management software that helps customers gain greater visibility into their IT environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysts say the move is in step with an industry trend where systems vendors acquire smaller management software vendor  With these new components, companies like EMC (Quote, Chart), IBM (Quote, Chart), HP (Quote, Chart) and others hope to provide more insight into clients&#8217; computing systems.<\/p>\n<p>So what exactly is EMC getting from network management software maker Smarts?<\/p>\n<p>Passmore said that while management systems from EMC and other vendors work well, the packages tend to ask the administrator to know too much.  Passmore said that after anywhere from 15 minutes to 45 minutes of troubleshooting, a really smart administrator will have figured out that one of those things reported was what actually happened and the rest were symptoms of that actual problem.  What&#8217;s missing in those existing management packages is the ability to filter and correlate all these events and get down to the root cause.<\/p>\n<p>Passmore said EMC&#8217;s No. 1 objective is to take this technology and move it into the storage networking space to simplify the administration and management of storage networks.<\/p>\n<p>http:\/\/www.internetnews.com\/storage\/article.php\/3450991<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1365","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1365"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1365\/revisions"}],"predecessor-version":[{"id":3852,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1365\/revisions\/3852"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}