Technical Insights: Docker at California’s Child Welfare Digital Service

mwadmin Blog, DevOps

By Thomas Ramirez Note: This is part two of a three-part series regarding work we performed at CWDS, and more specifically our experience with code checking through automation. As in the traditional IT (physical hardware) world, most workloads required more than one component. In our architecture, each container holds one application component, complete with whatever libraries and supporting tools are …

Technical Insights: Docker at California’s Child Welfare Digital Service

mwadmin Blog, DevOps

By Thomas Ramirez This is part one of a three-part series regarding work we performed at CWDS and is focused on containers, and more specifically our experience with Docker containers. Note: Containers are a tool and deployment model which make it possible to isolate applications into compact, lightweight execution environments that share an underlying operating system. Typically measured in megabytes, …

Red River is at AFITC 2018!

RRAdministrator Blog

Red River is excited to attend this year’s Air Force Information Technology & Cyberpower Conference (AFITC) in Montgomery, Alabama. This year we have a new booth and feature presentations on security and networking. Our security practice lead Robert Allende joins us from the trade show floor to discuss our new Device Isolation Architecture (XDIA) solution in the video linked here: …

Has Your Storage Turned into a Three-Ring Circus?

RRAdministrator Blog

There are circus performers who have an easier balancing act than some IT managers responsible for determining the amount of required storage capacity for their department. With needs changing quickly and procurement timelines lengthy, organizations can find themselves tying up unnecessary capital purchasing storage that goes unused if they guess high or scrambling to keep up if they lowball. It’s …

5 Ways to Prepare for a Cyberattack

RRAdministrator Blog, Uncategorized

1,579: That’s the number of data breaches in the United States in 2017, exposing close to 179 million records. The number and sophistication of cyberattacks are only growing. Recently, the United States and the U.K. put out a joint warning for Russian cyberattacks against government and private organizations as well as individual homes and offices. It’s not just an attack …

Augmented Cyber Reality, Part Three: Data Loss Prevention

Rick Friend Blog

What is cyber security going to look like in the years to come? What are the problems with the current approach and keeping the pace set by today’s threats? The reality is that the challenges with securing the network need to be augmented with a strategy to specifically protect and restrict the organization’s most valued asset – the data. The …

Red River Opens Office in Austin, TX

RRAdministrator Blog

Red River recently expanded its geographic footprint, opening a new office space in the up-and-coming area of East Austin. The space serves as the home for the company’s Storage on Demand program, which provides flexible, scalable storage-as-a-service. In addition to employee workspaces, the office includes collaboration areas, a technology sandbox and will soon house Red River’s Executive Briefing Center. This …

Software Defined Networking Mitigates Risk, Provides Reward

Eric Stuhl Blog

Infinite Attack Surfaces Traditional security architectures generally consist of a perimeter that is hardened, while the internal network is left open and is more trusting. This design is perpetuated mostly by focusing on external threats and is driven by limitations around scaling – placing hardware based security devices between all points would be prohibitively expensive and impossible to maintain in …

Augmented Cyber Reality: Part 1

Paul Krein Blog

Introduction:  Augmented Cyber Reality Paul Krein, CTO Red River It’s all about the data Modern cyber security and Information Technology has become all about the data.  Moving, sharing and especially protecting mission and business data.  However, the pace of demand around protecting our mission and corporate data is straining many security teams.  Information security is the new technology landscape, as …

SECURITY INTELLIGENCE: Correlating and Detecting a Threat

Tom Barna Blog, Data Analytics, Network Security Leave a Comment

The 2017 data security landscape is more hazardous and risky than any previous year. Organizations are struggling with the reality that the tools they rely on to protect their network and data can’t keep up with today’s advance cyber threats. To combat these more sophisticated cyber threats, organizations must upgrade their monitoring to an equally sophisticated and comprehensive management tool. …

Guest Wireless: Balancing Access and Risk

Bill Halpin Blog, Wireless Leave a Comment

Two of the biggest technology requirements are often at odds: security and access. As you open the doors to access by providing wireless Internet – and ability to use personal devices – to contractors, staff and guests, you run the risk of also opening the door to security threats or undermining your established networks and infrastructure. Add in the additional …

IT Takes a Village

Richard Ackerman Blog, Managed Services Leave a Comment

Senior Director of Managed Services, Richard Ackerman For many organizations, there’s a skilled engineer or a department head – even a president – who goes to sleep every night with a cell phone by the bed, ready to take a call on the latest IT emergency.  That person never takes a vacation, never turns off their phone, and bears the …

DIVING INTO DEPLOYABLE SOLUTIONS WITH QUENT STRANDBURG

Quent Strandburg Blog, Functional Mobility Leave a Comment

A subset of Functional Mobility, Deployable Solutions are currently garnering a lot of attention – for good reason. These flexible, highly-customizable solutions, which tightly integrate data center, network, unified communications, wireless and security technology into a compact ruggedized container or case, are extending media-rich enterprise IT functionality to remote users on the battlefield, in emergency response scenarios and for community-based …

Meet Data Center Evangelist – Mickey Cullop

Mickey Cullop Blog Leave a Comment

As you may already know from my previous blogs, I’m Red River’s confirmed data center evangelist for the Federal, Healthcare and Civilian markets. I believe that if we solve larger problems that are affected within the data center, we can ultimately ease the workload and burden on all of the users that interface with those systems. I’ve been in IT …

IT WITHOUT BORDERS

Wade VanGuilder Blog, Functional Mobility Leave a Comment

Fulfilling the Promise of Deployable Solutions MOVING BEYOND THE BACK OFFICE The men and women of today’s military, government and public sector agencies require extreme flexibility. Far from being constrained to a traditional brick-and-mortar office space, these individuals and teams are in the field, moving freely within the communities they serve, and oftentimes, spread across the globe as they deliver …

Engineering a Connected World with Wade VanGuilder

Wade VanGuilder Blog, Collaboration, Collaboration Technology Leave a Comment

With so many advancements in mobility, networking, collaboration and unified communications, Federal agencies and business enterprises can quickly increase their overall effectiveness and capabilities by simply investing in new technology. This is especially true with the latest communication systems, which can have a lasting impact on any business regardless of industry. As Red River’s Senior Director of Technical Services, I’m …

Improve your data center with converged infrastructure [Infographic]

Ed Levens Blog, Cloud Leave a Comment

These days, data centers are everywhere and they’re only becoming more prevalent – 87 percent of business with data centers plan to increase spending over the next year, with 1 in every 4 planning to invest within the next fiscal quarter. Converged infrastructure could be that next big investment for data center decision-makers. Let’s take a look at just a few …

Network Data Center

Converged vs. Hyperconverged: Which is Right for Your Organization?

Mickey Cullop Blog Leave a Comment

  Converged infrastructure combines compute, storage and networking technologies for data centers. Although the converged components are all housed together, they each retain their independent functional identities. However, vendors pay close attention to enhanced connectivity by validating compatibility before point of purchase. In short, everything works together right out of the box, either as a connected unit or separate modules. …

Why Switch to Converged Infrastructure?

Mickey Cullop Blog Leave a Comment

Although converged infrastructure has been around for a while now, it’s still viewed by the data center community as the “young upstart” intent on disrupting legacy architectural models. So, what makes converged infrastructure so enticing? As the Senior Systems Engineer and Red River’s resident converged expert, I can help provide an answer. Suits Many Different Use Cases Converged architectures, which …