ADS BY GOOGLE
Real-World Cloud Computing

Perhaps the only thing worse than a disaster happening is seeing it coming and knowing nothing can be done to stop it. Businesses along the northeastern seaboard had several days of warning before Hurricane Sandy struck, certainly not enough time to implement a disaster recovery plan f...
Backup of enterprise information and associated data protection are fragmented, complex, and inefficient. But new approaches are helping to simplify the data-protection process, keep costs in check, and improve recovery speed and confidence. If you look back 20 years ago, we had heter...
The Cloud market is diverse and highly fragmented – typical of any market in its early stages. The broad range of cloud activities and the frantic pace of new products / services getting launched is driving the need to consolidate and unify cloud services for the end user and for the m...
Technology changes so rapidly that a business will be left behind if it does not constantly consider newer and better ways of doing things. Chances are that if you are not thinking out of the box, looking ahead, and making continuous advancements, your competitors will. The defining ...
Cloud computing has dramatically altered how IT infrastructure is delivered and managed, as well as how IT functionality is consumed. However, security and privacy concerns continue to be major inhibitors for risk-conscious organizations to adoption of cloud computing – whether infrast...
Since ZapThink wrote our ZapFlash on Cloud Brokerages in April 2011, the Cloud Brokerage marketplace has exploded. Or at the very least, the noise level involving such Brokerages has reached a fever pitch, which the vendors in the space want you to think is the sound of an exploding ma...
Businesses must exploit open collaboration advances in procurement and finance to produce new types of productivity benefits, say an industry analyst and Ariba executive. And the benefits of improved data integration and the process efficiencies of cloud computing are additionally hel...
Recently FireScope Inc. introduced the general availability of its Stratis product. Stratis brings all of the FireScope Unify capabilities to the cloud, with the added advantage of a new architecture that delivers near infinite scalability. Moreover, the new Stratis architecture provid...
There's been a resurgent role for service-oriented architecture as a practical and relevant ingredient for effective design and use of cloud, mobile, and big-data technologies. What I see driving it is three things. One is the advent of the cloud and mobile, which requires a lot of cr...
Cloud computing has changed the way we work. People and businesses can now access services, applications and infrastructure over the Internet, with lower costs, higher productivity and an enhanced user experience. While cloud computing has revolutionized many aspects of business, its ...
Many firms still dismiss the importance of social networking and some of them even ban employees from using these services while in the workplace. They think that “social” starts and ends with Facebook, Twitter, MySpace and other networks that might be best described as informal, consu...
While much of the market attention on cloud services adoption tends to be foc...
Some Cloud leaders have declared victory by leveraging the Cloud for infrastructure or software services and using the utility based, on demand capabilities. However, leaders can explore and realize higher levels of reuse and sharing by identifying specific processes that can be transi...
Our headline professional service engagement is Cloud Migration Management (CMM). The issues that the service needs to address were recently identified through an auditors analysis of the progress of the US Government’s Cloud First program. In the GAO report Progress Made but Fut...
A fascinating global ocean studies initiative helps best define some of the IT superlatives around big data, cloud computing, and middleware integration capabilities.
Cloud Replication Services features technology that can mirror your live applications to secondary data centres running Cloud services. Example providers include Allstream, who offer Cloud Replication Services as part of their enterprise IT portfolio. They ask and answer the question a...
Last week one news item that attracted media attention was the hacking of some nearly 450,000 passwords from Yahoo Service called ‘Yahoo Voice'. The communications on the incident state that, SQL Injection is the primary technique adopted by hackers to get the information out of databa...
Working with SAP customers on the cloud has been a rich learning and myth busting experience in many ways. Contrary to popular belief, a number of SAP customers do have a strong affinity for deploying solutions via the cloud. So what are the insights from our first set of cloud custo...
Often we see the workload to a web application measured by throughput. It’s a way of quantifying the volume of requests/responses in relation to time. Transactions per second or TPS is the most common ratio used. A performance test plan usually contains certain throughput goals. The “G...
As the Government’s own Digital Advantage paper recommends, the key to addressing Canada’s innovation gap is for CIO’s to adopt more new technologies like Cloud Computing, and the public sector can ignite this trend by leading the way with their own adoption. Don Drummond makes a si...
"It was my first time at a Cloud Expo show, so I wasn’t sure what to expect. But man, what a blast it turned out to be. Great exhibits, great audience, great floor traffic, great conversations with IT leaders and folks in the channel." With those words, Tom Gaydos - Director, Marketing...
Cloud has dramatically changed how we think about and utilize services. Cloud facilitates rapid deployments due to quick availability of scalable services. It provides the high service velocity to manage changes incrementally and less time for provisioning storage and applications. Clo...
Perhaps the next technological wave that will revolutionize how we live is the communication between devices, known as machine-to-machine (M2M) communication. Humanity has imagined such a world many times in the domain of science fiction, including on TV shows such as “Star Trek” and “...
The need for Encrypting data that is stored on public cloud platform is fully realized by enterprises, as it has got direct legal implications and the credibility of the organisation at stake. As mentioned we may have multiple options like either using specialized middlewa...
The backbone to the consulting services from the CBPN is the CTM best practice – Cloud Transformation Management, and the primary outputs from these engagements will be CTM Roadmaps. CTM Roadmaps enable migration to Cloud Computing through Shared Service-based models. Shared Serv...
Two years ago, Rackspace joined a global collaboration of developers and cloud computing technologists to create an open source cloud computing platform that can be used with both private and public cloud formats. Now the code for the program, OpenStack, is freely available and is bein...
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy ses...
The irony about cloud computing in the higher education environment is that most schools have already been using it to some extent but may not even realize it. Gmail is one example. Yahoo Mail is another. The fact is web-based applications, which many schools rely on for daily commun...
A recent article in Government Computer News raised the topic of FISMA reporting, specifically describing the “pessimism” of many USG agencies over meeting the September 2012 deadline for “using continuous monitoring to meet Federal Information Security Management Act reporting require...
Today, with enterprises migrating to the cloud, the security challenge around protecting data is greater than ever before. Keeping data private and secure has always been a business imperative. But for many companies and organizations, it has also become a compliance requirement and a ...
When an aircraft crashes, investigators are able to retrieve useful information about what went wrong from the flight data recorder, more commonly known as the black box. (The data recorder itself is actually not black, not until it’s retrieved from charred remains.) Statistically spea...
Myron Steves, a small- to medium-sized business, developed and implemented a modern disaster recovery and business continuity strategy based on a high-degree of server and clients virtualization. When Hurricane Ike struck Texas in 2008, it became the second costliest hurricane ever to...
With an estimated $200 million bet on Cloud.com, if nothing else, executing an all-in open source strategy proves that Citrix doesn’t shrink in the face of high-stakes decisions. Cynics call this recent move an act of desperation – a Hail Mary in the absence of a better play. Others se...
Anybody who is considering a move to the Cloud knows that the greatest economic motivation for Cloud Computing is the pay-as-you-go, pay-for-what-you-need utility computing benefit, right? Deal with spikes in demand much more cost-effectively, the public Cloud service providers gush, s...
Only ten weeks to go! Time for an alphabetical summary of the many leading-edge themes & topics to be discussed at Cloud Expo 2012 New York (10th Cloud Expo) - being held June 11-14, 2012, at the Javits Convention Center in New York City and co-located with Big Data Expo 2012 New York ...
The most recent “Megatest” was initiated by Light Reading to assess our CloudVerse architecture. In the second part of the [...]
Key issues can make or break an organization’s strategic cloud adoption. The intersection of cloud computing with business strategy, Big Data, vendor lock-in, globalization, collaboration, security, licensing, virtualization, confidence, and the ‘new normal’ can act as huge points of c...
NIST has released a major revision to the Federal Information Security Management Act (FISMA). The public draft of the Security and Privacy Controls for Federal Information Systems and Organizations provides a set of security standards that are meant to help protect government agencies...
Back in 2009, when I started the Green IT Practice for EcomNets, I was optimistic that every company would adopt the top 10 strategies for Green IT immediately. After gaining no visible business, I realized that I was the consummate early-adopter. Back then, nobody knew there was a c...
The cloud computing model of services-based computing has changed the way we not only ‘architect,’ ‘structure’ and ‘plan’ software applications, it has also changed the way we, subsequently, need to ‘deploy,’ ‘test,’ ‘monitor’ and ‘manage’ cloud-based applications. Now that’s a lot of...


ADS BY GOOGLE