There has been a lot of hand-wringing in the past year or so about the threat of Shadow IT. By its very name, it sums up images of darkness, subterfuge, and illegality. But what exactly is meant by Shadow IT, and is it the threat we are led to believe?
Articles Tagged with SaaS
My response to Stephen Foskett’s tweet of a post about the Software-Defined Data Center (SDDC) Symposium led to an interesting conversation about the nature of the SDDC—what it is, what it is not, and why we should care. The software-defined data center is considered by some to be an instrument of vendor lock-in, vaporware, or in many ways just marketing hype. “SDDC” has many different definitions, but I do not believe it reflects any of those commonly used. Instead, I hold that it is a way of thinking, a way of looking at the new world of IT in which we live. This has sparked a quite an interesting Twitter conversation between many interested parties.
In what may have seemed like an eternity, at least in the way time is measured in technology and the cloud space, IBM has been putting the finishing touches on its different acquisitions and the development of the Big Blue Cloud Stack. Although IBM seems to be fashionably late to the cloud party, I believe we are going to be seeing the Big Blue Battle Plan presented and executed in the near future. IBM is getting ready to step into the octagon to take on all comers, with its eye on Oracle, HP, Amazon, Microsoft, and VMware. It seems IBM is not going to settle with the typical as-a-service mode; on the contrary, it seems that it wants to usher itself into the new era with IBM as a Service.
There is an old saying, “the definition of insanity is to repeat the same thing over and over and expect a different result.” The way many enterprises are approaching the cloud, insanity would be a great way of classifying it. When we look across most enterprises, we see a collection of technologies from every era of computing. We have just about every vendor solution imaginable—often multiple versions of products from the same vendor—and a hodgepodge of architectures that makes spaghetti look organized.
Tal Klein of Adallom joined us on the January 16 Virtualization Security Podcast to discuss Adallom’s approach to logging, auditing, and generally gaining visibility within most SaaS applications. Adallom solves two longstanding problems: how can we as tenants obtain appropriate tenant-only logs of actions within a SaaS application, and how do we determine abnormal behavior within a SaaS application? Before Adallom, we had to ask the SaaS provider for log information, and this process would take quite a while, or, if it was readily available, it was not in real-time.
For over a year now, a large number of industry experts have been asking questions like “is PaaS becoming just a feature of IaaS?,” “is PaaS dying?,” “do you really need a PaaS?,” and “is PaaS dead?” This has raised great deal of passionate debate in Twitter-land and other social media outlets, although supporters of stand-alone PaaS solutions are mostly those who are employed by vendors of those solutions.