We are happy to share that we were featured yesterday on BrightTALK. We discussed data centers and what the future holds. What does the future data center look like? Is it racks and racks of computers? Is it heavily automated? Is it just a shim to the larger world of the cloud? Listen in on this dynamic panel discussion in which we delve into the future of the data center with our experts, Edward Haletky and Steve Beaver. We discussed where we are going, how the hybrid cloud fits in, and the ultimate vision of the data center.
Transformation & Agility
Transformation & Agility concerns the utilization of the technical agility derived from the benefits delivered by virtualization and cloud computing, coupled with Agile Development practices that improve business agility, performance, and results. This includes the agility derived from: (Read More)
- The implementation of Agile and DevOps methodologies
- The application and system architectures
- The implementation of IaaS, PaaS, and SaaS clouds
- Monitoring of the environment, coupled with processes for resolving problems quickly
- Having continuous availability through the use of high-availability and disaster recovery products and procedures
Transformation covers the journey from A to Z and all points between: how you get there and the roads you will travel; how decisions made on day zero or one, or even day three, will affect later decisions; and what technical, operational, and organizational pitfalls can be associated with an implementation. We examine what tool sets are required for Agile Cloud Development, and it delves into other aspects of Agile Development that integrate with cloud computing, SaaS, and PaaS environments, including DevOps, Scrum, XP, and Kanban.
As we all know, data protection is not really about how we back up or replicate data. Instead, it is about how we recover our data. Recovery is not just about a disaster; it is also about files and continual testing. Data protection must not be “set and forget.” Our ever-changing hybrid cloud environments require proactive data protection. We need to detect changes to applications. We need software that adjusts backup or replication to pull in more and more of the application. In essence, data protection should not require a human to be involved. Where are we in relation to this goal?
Toward the end of last year, I did a lot of reading around strategy, specifically strategy as the military uses the term, but applied to internal IT. By coincidence, I read both The Phoenix Project and Stephen Wardley’s emerging book on mapping within a few weeks of each other. Apart from meshing very well, the two sets of ideas are a nice jumping-off point for a new year. Before I start to delve into what the cutting edge looks like and is going to look like in years to come—into patterns that repeat and can be predicted—I want to think about where the rubber hits the road in my own world.
How is artificial intelligence development going in your environment? That question might make you pause for a moment as you ponder the idea and then find yourself scratching your head wondering what artificial intelligence (AI) I could possibly be referring to. Let me present this construct. Artificial intelligence, much like cloud computing, has a definition that varies depending on who you are talking to.
I’m going to diverge ever so briefly from my “Reversed Assumptions” posts to share some happenings in this current engagement I’m on and to tie in some of the previous posts on design and architecture. This post focuses on what architecture is and what it isn’t. As I have engaged with many different sizes of customers over the years, one thing remains true: architects and architecture are many things to many people. There has been a lot of talk and debate on this, and I thought it necessary to be sure about what architecture truly is, and who is qualified to practice it.
On January 5, 2016, I was joined by Mike Foley, senior technical marketing architect for VMware vSphere Security, and Kapil Raina, HyTrust VP of product marketing, on the Virtualization and Cloud Security Podcast to discuss moving to a hybrid cloud IaaS model. As always, we strive to provide actionable advice. The key question we tried to answer was “Can you just extend your security into your cloud?” The answer was not as simple as one would expect. Have a listen and let us know what you think. In the meantime, here are our thoughts.