Welcome!


Security & Cloud Computing

Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
Securing your data comes down to making both physical and virtual changes to your data center. From interior and exterior surveillance systems to software that detects system-level changes across remote and distributed locations, you must make use of any and all available strategies to...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
The proliferation of cloud-based applications for the enterprise grows each day, and more and more professionals have grown dependent on these apps as the consumerization of IT flourishes in today’s mobile enterprise. With the consumerization of IT, employees have become their own IT e...
Traditional methods of software development went over the waterfall in a barrel and smashed on the rocks below. The Agile Manifesto was written more than a decade ago. Agile adoption has worked wonders for software development. New products leap from concept to market faster than ever ...
Application logs contain a massive repository of events and come in many different formats. They can have valuable information, but gaining useful insight can be difficult without the assistance of machine learning to help reveal critical problems. Transaction logs can contain gigabyt...
Enterprise organizations are looking for service providers to be a trusted partner with them throughout the entire transition through steady state process. The key for cloud providers is to develop ongoing relationships with their customers using hands-on engagement processes from begi...
Businesses have IT because apps deliver value to their customers. This can be direct value - a user-facing app. Or it can be indirect - an internal app for managing sales, marketing, or even HR transactions. Either way, the idea is that the app will make the business more efficient and...
There’s been plenty written and predicted about the future of cloud and Software-as-a-Service, and it’s hard to argue with its benefits – for both organizations and users. If our cloud-based future is to come true though, we must pay closer attention to the service levels users are get...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...
The new wonder metal, graphene, is being looked at as a building block for communications and electronic devices on the level of what the transistor was sixty years ago. Graphene is a one-atom thick, mesh-like (think hexagonal honeycomb or chicken wire), semi metal that will add more ...
“Software-defined,” like any new trend that technology companies rush to attach to has suffered from marketing hype. Starting in mid-2012 with the acquisition of Nicera by VMware, most traditional infrastructure technology vendors across compute, networking, and storage have some messa...
Out-of-band metadata and business context outside hypermedia applications are by definition exterior to the contract, and thus aren’t amenable to any distributed computing architectural style that relies too heavily on static APIs. Therein lies the essential challenge of the API. To th...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...
The cloud’s main story so far has been one of horizontal providers, such as salesforce.com, Microsoft and Amazon, offering one-size-fits-all solutions. While these providers had some success in the financial services sector, their products weren’t specialized enough to address the need...
Worldwide IT spending is projected to rise US$3.8 trillion in 2014 according to recent Gartner research, a 3.1 percent increase from spending in 2013, which was $3.7 trillion. While not a huge jump in dollars, it does indicate that companies have been conserving cash over the past few ...
How can your business benefit from using the cloud? We hear the term all the time in the tech world, but it's never really clearly defined. Those of us who are using social media or saving data with online sources are already using it. Perhaps you just didn't know it. Amazon is one of ...
Given the business expectations at each stage of the SDLC, Continuous Testing delivers a quantitative assessment of risk as well as actionable tasks that help mitigate these risks before they progress to the next stage of the SDLC. The goal is to eliminate meaningless tests and produc...
Storing important information around the office has always been the go-to format for saving essential data. Of course, having it somewhere on hand provides peace of mind, as you know it is literally held within your building, so when someone needs a hard copy, you are able to go out an...
Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps. The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the...
A newly released report from McKinsey & Company, Risk and Responsibility in a Hyperconnected World: Implications for Enterprises, highlights the findings of a year’s worth of McKinsey research conducted in partnership with the World Economic Forum. Based on the interviews with over 200...
Over the past few years, enterprises have been moving to the cloud to streamline processes and operations. A study last year by TheInfoPro indicated that there is no sign of cloud investment slowing down – predicting an average growth rate of cloud spending of 36 percent from this year...
So many organizations switched to third-party help desk solutions without really putting in place any performance measures or tracking mechanisms to really measure how good – or bad – the support is. Some executives got a big bonus for “thinking out of the box” and coming up with a c...
In the race to implement Continuous Delivery, emphasis on build-and-deploy has overshadowed Continuous Testing. Service Virtualization's simulation technology allows you to test your component in a complete environment—any time you want. "Part of the problem with service virtualizati...
“Cloud computing” is more than just a buzzword – it has transformed the tech industry. Having been in the business of building enterprise infrastructure for over 15 years, I’ve had the opportunity to witness how cloud has altered the landscape, including most recently at my company, Ne...
Much of the dialog over net neutrality seems rather dated. This is understandable, since the debate has been going on since last century. The January 14th Federal Appeal Court decision in favor of the Internet access providers gave those companies (apparently) a degree of latitude to ...
We all know the story of Goldilocks and the three bears, but have you heard the one about Goldie Locks and the three clouds? This tale is playing out throughout the IT marketplace. Goldie Locks – an IT executive for a state government – has once again found herself in a dilemma. “If o...
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
As companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy. During the recent bout of intense...
Recent reports of a massive data breach affecting popular sites like Facebook, Twitter, Google and Yahoo have many companies rethinking security practices and wondering how to protect vital data. If your company uses cloud services to conduct business and manage data or is contemplatin...
2013 was a banner year for cloud backup adoption. It was also a year of wake-up calls: simple cloud backup doesn't constitute DR, transfer speeds are vital, and beware cloud as a commodity. Let's look to 2014 for more trends in cloud backup and DR in the cloud. This trend showed up in...
Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expe...
I had the privilege of interviewing mobility expert Vaidy Iyer today. He is the founder and CEO of AppsFreedom, a company focused on providing enterprise mobility solutions in the form of Multi-Channel, Multi-Device Platform as a Service solutions to the SAP community. I asked if the...