Veaam is forging a series of interesting agreements with competitors as well as infrastructure players. It has also added into its core product features considered to be more legacy than future, such as tape support. In essence, it is becoming the center of the data protection space within any organization. Veeam Availability Suite augments existing sets of tools to let them do more than they could alone. Veeam has founded its own ecosystem.
We all need performance and capacity management tools to fine tune our virtual and cloud environments, but we need them to do more than just tell us there may be problems. Instead, we need them to find root causes for problems, whether those problems are related to code, infrastructure, or security. The new brand of applications, if designed for the cloud à la Netflix, or older technologies instantiated within the cloud need more in order to tell us about their health. Into this breach comes a new set of tools, as well as an existing set of tools.
I agree that containers will be the future of computing. However, that may not happen anytime soon. Containers have many hurdles to get over before they can take over the world. Some of these hurdles are related to politics within organizations, and others are technical. Let me discuss the technical ones.
SaaS is supposed to be ubiquitous, and never go down. But what if the SaaS you are using suddenly goes away, closes up shop, or places the part you are using in an unsupported mode? For some SaaS offerings (such as a game) this may not be a big deal, but for others (such as a CRM) it has huge consequences—ones that can affect your business in subtle and major ways.
Android devices recently suffered a spate of attacks. Similar attacks have been made against Apple devices and nearly every other brand of smart device. Does this mean that this is the end of Android or of mobile devices? Or does this mark the rise of mobile device management (MDM) and other software specifically designed to secure end user computing (EUC) devices? EUC security has two failure points: the handheld device and further in the network. But does an insecure device imply loss of data? Perhaps. Loss of credentials? Once more, perhaps. But do we really care? That is not known. So, let us look at a typical use case. Continue reading Should We Care If the Handheld Is Secure?
There are many reasons to use cloud resources, and there are many reasons to enter the cloud, of which we have spoken about fairly regularly as part of our IT Transformation series. The real question is: “When should you use cloud services?” Or, more to the point, “When should you use new cloud services in control of IT and not the business?” That is really the crux of the discussion; business users use cloud resources all the time. The choice to use them is based on getting your job done and not IT’s decisions. We often call this “shadow IT,” but is it? Let us look at a few examples and decide—is it shadow IT (as in, should be in IT’s hands to control?), or is it part of doing business and therefore a business decision? Does the definition change as we grow a business or change the scale of the business? Continue reading IT Transformation: SME
Join my Circle on Google+
Plugin by Social Author Bio