Cloud Computing

Cloud Computing focuses upon how to construct, secure, manage, monitor and use public IaaS, PaaS, and SaaS clouds. Major areas of focus include barriers to cloud adoption, progress on the part of cloud vendors in removing those barriers, where the line of responsibility is drawn between the cloud vendor and the customer for each of IaaS, PaaS and SaaS clouds, (Read More)

as well as the management tools that are essential to deploy in the cloud, ensure security in the cloud and ensure the performance of applications running in the cloud. Covered vendors include Amazon, VMware, AFORE, CloudSidekick, CloudPhysics, ElasticBox, Hotlink, New Relic, Prelert, Puppet Labs and Virtustream.

Moving to the Cloud: When Does It Make Sense?

CloudComputingOn December 18, I had an interesting Twitter conversation with Mark Thiele (@mthiele10) about moving to the cloud based on cost. There is a cost perspective to consider as cloud services can be very expensive. When does it make sense to go to the cloud? There are two scenarios to consider when talking about going to the cloud. While we were hampered by the 140-character limit, I think the message is clear. Continue reading Moving to the Cloud: When Does It Make Sense?

End User Computing: Using just a Tablet

DesktopVirtualizationRecently I have been trying to lighten my conference going load. To do that, I have been thinking about ways to do without my laptop and all the accessories for it, which got me thinking about what it takes to completely use such a device; to fully embrace the next generation of end-user computing using gesture computing and smaller devices. Other than the technical hurdles, there are also training hurdles as full tablet computing, today, has some serious limitations with respect to security, functionality, and in some ways capability.  So how does one embrace tablet computing as their next-gen end user computing?

Continue reading End User Computing: Using just a Tablet

Cloud API: In-Security?

VirtualizationSecurityThe 12/13 Virtualization Security Podcast featured George Reese, CTO on enStratus, as our guest panelist. We discussed Cloud API security or more to the point the lack of real cloud API security. To paraphrase George: Some got it, others do not. So what makes up a good cloud API? how can we fix broken cloud APIs? Continue reading Cloud API: In-Security?

It Is Time To Expand The Virtual Playing Field

CloudComputingIt is time to expand the virtual playing field. Since the release of both Hyper-V 2012 and vSphere 5.1, there have been an abundant amount of posts comparing the two hypervisors in a head to head fashion.  All the different charts, graphs, and tables point to the fact that when comparing maximum values head to head. This has been the way the two different hypervisors have been compared against each other all along and Microsoft and VMware have gotten to the point where things are pretty much even across the board. It was just a matter of time until we got to this point where Hyper-V catches up with vSphere and now that we have, I believe we need to change the scope of the comparisons beyond the maximum values.  After all, how many people actually get anywhere close to those maximums deployed in your production environments?  “Just because you can do something, does not mean you should.” Continue reading It Is Time To Expand The Virtual Playing Field

Will Cisco Buy Citrix in Reaction to VMware’s SDDC Strategy?

DataCenterVirtualizationTwo things have popped up recently. One is VMware’s full page ad campaign in the Wall Street Journal. The ad states that VMware has saved companies billions of dollars, and promises to save them billions more – through the Software Defined Data Center. The second that has has popped is rumors that Cisco is going to acquire Citrix. Which brings up an interesting question. Is buying Citrix part of Cisco’s reaction to VMware’s Software Defined Data Center (SDDC) strategy? Continue reading Will Cisco Buy Citrix in Reaction to VMware’s SDDC Strategy?

12 Step Program to Enter the Cloud

VirtualizationSecurityOn the 11/29 Virtualization Security Podcast Omar Khawaja the global managing principle at Verizon Terremark Security Solutions joined us to discuss Verizon’s 12 step program for entering the cloud (found on slideshare). This 12 step program concentrates on the IT and Security admins working together with the business to identify all types of data that could be placed into the cloud, and to classify that data. Once this is complete, the next steps are to understand the compliance and security required to protect the data and to access the data. It is a Data Centric approach to moving to the cloud. Continue reading 12 Step Program to Enter the Cloud