Cloud Computing

Cloud Computing focuses upon how to construct, secure, manage, monitor and use public IaaS, PaaS, and SaaS clouds. Major areas of focus include barriers to cloud adoption, progress on the part of cloud vendors in removing those barriers, where the line of responsibility is drawn between the cloud vendor and the customer for each of IaaS, PaaS and SaaS clouds, (Read More)

as well as the management tools that are essential to deploy in the cloud, ensure security in the cloud and ensure the performance of applications running in the cloud. Covered vendors include Amazon, VMware, AFORE, CloudSidekick, CloudPhysics, ElasticBox, Hotlink, New Relic, Prelert, Puppet Labs and Virtustream.

12 Step Program to Enter the Cloud

VirtualizationSecurityOn the 11/29 Virtualization Security Podcast Omar Khawaja the global managing principle at Verizon Terremark Security Solutions joined us to discuss Verizon’s 12 step program for entering the cloud (found on slideshare). This 12 step program concentrates on the IT and Security admins working together with the business to identify all types of data that could be placed into the cloud, and to classify that data. Once this is complete, the next steps are to understand the compliance and security required to protect the data and to access the data. It is a Data Centric approach to moving to the cloud. Continue reading 12 Step Program to Enter the Cloud

The Pivotal Initiative — EMC and VMware’s Application Strategy

CloudComputingSo now we know what Paul Maritz’s real job is going to be. VMware has announced on its Executive Team Blog that they will form a new organization, The Pivotal Initiative, which will collect EMC’s and VMware’s application focused people and assets into one group. This will include the people and the technology assets from EMC’s Greenplum and Pivotal Labs organizations, and the people and technology assets from the VMware vFabric (Spring and Gemfire), Cloud Foundry and Cetas organizations. Continue reading The Pivotal Initiative — EMC and VMware’s Application Strategy

Windows 2012 Hyper-V – the hypervisor for your Cloud? Part III

DataCenterVirtualizationWindows 2012 Hyper-V is the hypervisor for the cloud. VMware’s vSphere is a dead man walking?

In parts One and Two I shared a chunk of what I learned from Aidan Finn‘s enlightening and entertaining session “Windows Server 2012 Hyper-V & VSphere 5.1 – Death Match” delivered at the E2E Virtulisation Conference in Hamburg.  We’ve considered pricing, scalability and performance, as well as storage  then gone on to consider resource management, security and multi-tenancy and what a flexible infrastructure can give.

Some have found this a useful comparison. Others have highlighted that this isn’t a feature-by-feature comparison and that if it was, the tables would be very different: they would, they’d be longer for a start.  But more importantly, would they give the high view that many are focused on? Is the goal a technical  Top Trump  victory, or alignment to business goals? If aligned, how aligned? A friend used to often quote the difference between cabinet making, carpentry and joinery is effort and measurement: they each had their place, the trick was knowing what level to apply.

In Part III, lets question further Aidan’s premise that Hyper-V kills vSphere. Here we’ll consider High Availability and Resiliency.

Continue reading Windows 2012 Hyper-V – the hypervisor for your Cloud? Part III

Information Superhighway

CloudComputingI can remember back in the day when we connected to the Internet via a modem and were charged by the minute while accessing the Information Superhighway.  Now, the Internet and really, the network it runs on, has pretty much become invisible to the naked eye. Just as we expect the lights to turn on when we flick a switch, we also pretty much expect the Internet to always be on and available without thinking twice about it. Internet service providers have gone from wanting Wi-Fi only in your house to working on providing connectivity to the entire city, giving the metro user Internet access from inside and outside of your home or office. Continue reading Information Superhighway

Threats and Risks in the Cloud

CloudComputingThreats and Risk in the CloudThere are threats to the cloud and there are risks within the cloud. A recent article from Tech Target Search Security blog spurred several thoughts. The main claim here is that there are not enough people who can differentiate threats and risks enough to talk to business leaders who may know very little about security, but do know the business. I have been known to state that there are prominent threats to my data once stored in the cloud and that we should plan to alleviate those threats to reduce our overall risk. But what is the risk?

An analogy comes to mind. Many years ago I ripped my Achilles tendon, and while talking with the doctors they all said that without surgery there was a 50% more likely chance that the Achilles tendon would rip again. So this got me thinking about what they really meant, 50% of what? My next question to the doctors was “how likely is it to fail if I do not have surgery?” Their response was enlightening, there is a 2% failure rate for naturally healed Achilles tendons. Because of that number, I realized that the failure rate for those tendons that undergo surgery is really only 1% vs 2% without. Well that put a different picture on everything. I went without surgery as that particular area of the body has very thin skin, not as much blood flow, and would take a long time to heal from surgery and there was always the risk of picking up something in the hospital, however remote at the time.

So the real question is what is the true risk to an environment if the threat becomes a reality? Continue reading Threats and Risks in the Cloud