Yes, the title is a bit caustic, but I have been giving some serious thought about the attitude of pets vs cattle within a hybrid cloud environment, and every time, it boils down to the conclusion that we shoot cattle because the underlying infrastructure is just not robust enough to treat our cattle like a herd. Instead, we treat them as singletons. I do not know a rancher today who will just shoot their cattle because they strayed into the wrong pasture, or because they ate the wrong thing and got sick. They herd the cattle back to where they belong and often call the veterinarian first. Yet, our clouds do not seem resilient enough to handle this type of behavior. Continue reading Pets vs Cattle Is Not Reality
While at EMC World and RSA Conference this last month, I realized something very interesting. The same people I normally see at these shows have moved on to something new and shiny, and as such they were not at the shows. However, what was at the shows was really interesting. There was much more talk about DevOps, scripting, and things code related. This is all for the good and gets more peopled involved in the technology at a deeper level. But how did this happen? Continue reading Technical Arc of Virtualization
Docker recently raised another $95 million in a Round D, even though it is still burning through its Round B cash and hasn’t touched the $40 million it raised in Round C. Docker has now raised roughly $160 million dollars. Analysts have estimated its valuation is somewhere in the $1 billion range. With each round, the investors are higher up on the VC food chain. The latest round includes such big names as Goldman Sachs and Northern Trust. When I asked David Messina, Docker’s VP of enterprise marketing, about this, he said it speaks to Docker’s ability to exceed even its own expectations and to continuously increase the business value of its offerings.
Every new advancement in technology brings security challenges. When the Internet became popular, many people had serious concerns about exposing the enterprise to the outside world. For companies to adopt Internet technologies, they had to accept a tradeoff: taking on new vulnerabilities in return for game-changing business value creation. With the emergence of cloud computing, history is repeating itself. It no longer is feasible to resist the movement to the cloud because of security fears. There must be some acceptance of risk and an effort to minimize that risk with sound architecture, good process, and continuous monitoring. The business value of cloud is too great for businesses to sit on the sidelines.
Distributed cloud service is a growing phenomenon. It fills several roles, distributing data for use by distributed applications, for data protection, and for other reasons. We have been seeing an increase in the number of distributed applications. Non-distributed applications lack the resiliency that is required to work within a cloud, whereas distributed workloads add a certain amount of resiliency to an application. Depending on how they are architected, the lack or failure of one part of a distributed application won’t bring down the entire application. Use of multiple clouds ensures your eggs are not all in one basket, so to speak. Continue reading Distributed Cloud?
At the GPU Technology Conference, NVIDIA CEO Jen-Hsun Huang and Tesla CEO Elon Musk talked about the security of a car. Musk stated that physical access is still required to hack most vehicles and that critical systems such as brakes and steering are segregated from the control display. This got me thinking about the security of the next generation of Internet of Things (IoT) devices.