Transformation & Agility

Transformation & Agility concerns the utilization of the technical agility derived from the benefits delivered by virtualization and cloud computing, coupled with Agile Development practices that improve business agility, performance, and results. This includes the agility derived from: (Read More)

  • The implementation of Agile and DevOps methodologies
  • The  application and system architectures
  • The  implementation of IaaS, PaaS, and SaaS clouds
  • Monitoring of the environment, coupled with processes for resolving problems quickly
  • Having continuous availability through the use of high-availability and disaster recovery products and procedures

Transformation covers the journey from A to Z and all points between: how you get there and the roads you will travel; how decisions made on day zero or one, or even day three, will affect later decisions; and what technical, operational, and organizational pitfalls can be associated with an implementation. We examine what tool sets are required for Agile Cloud Development, and it delves into other aspects of Agile Development that integrate with cloud computing, SaaS, and PaaS environments, including DevOps, Scrum, XP, and Kanban.

Will Virtual Reality Have a Place in IT?

Will virtual reality have a place in IT? Virtual reality (VR) is still in its infancy, currently most associated with the computer gaming industry. However, there is strong interest in it from companies outside computer gaming. As a matter of fact, Mark Zuckerberg over at Facebook has been quite interested in using virtual reality to expand the Facebook platform. Some are predicting that 2017 will be the year when Facebook VR finally emerges.

Read More

Container Security Podcast

There is a recent CVE (CVE-2016-9962) that directly affects container security. A patch was quickly forthcoming. This raised some interesting concerns. Specifically, how do you patch a container infrastructure? What needs to be patched? The “what” is easy; the “how” is more difficult. As we move to cloud-native applications, where we tear down apps rapidly and restart them from whole cloth, patching is a crucial issue. There is risk here; the question is how to mitigate such risk. How do you patch for future issues? This was the subject of the virtualization and cloud security podcast this week.

Read More

Is the GUI the Enemy of Automation?

In IT there is not simply more than one way to skin a cat. There are multiple philosophies describing the methods. Most of these philosophies are based on preference and history, and on how, where, and when we learn, but not so much on what is necessarily the best way. Much of the how and when is linked to cycles that seem to permeate the industry: cycles of ideas that surface, are used, are bettered, and eventually resurface.

Read More

The Future Perfect … Data Center

We are happy to share that we were featured yesterday on BrightTALK. We discussed data centers and what the future holds. What does the future data center look like? Is it racks and racks of computers? Is it heavily automated? Is it just a shim to the larger world of the cloud? Listen in on this dynamic panel discussion in which we delve into the future of the data center with our experts, Edward Haletky and Steve Beaver. We discussed where we are going, how the hybrid cloud fits in, and the ultimate vision of the data center.

Read More

Data Protection Recovery Options

As we all know, data protection is not really about how we back up or replicate data. Instead, it is about how we recover our data. Recovery is not just about a disaster; it is also about files and continual testing. Data protection must not be “set and forget.” Our ever-changing hybrid cloud environments require proactive data protection. We need to detect changes to applications. We need software that adjusts backup or replication to pull in more and more of the application. In essence, data protection should not require a human to be involved. Where are we in relation to this goal?

Read More

The Smeared Edge

Toward the end of last year, I did a lot of reading around strategy, specifically strategy as the military uses the term, but applied to internal IT. By coincidence, I read both The Phoenix Project and Stephen Wardley’s emerging book on mapping within a few weeks of each other. Apart from meshing very well, the two sets of ideas are a nice jumping-off point for a new year. Before I start to delve into what the cutting edge looks like and is going to look like in years to come—into patterns that repeat and can be predicted—I want to think about where the rubber hits the road in my own world.

Read More