Welcome!


Security & Cloud Computing

Businesses have IT because apps deliver value to their customers. This can be direct value - a user-facing app. Or it can be indirect - an internal app for managing sales, marketing, or even HR transactions. Either way, the idea is that the app will make the business more efficient and...
There’s been plenty written and predicted about the future of cloud and Software-as-a-Service, and it’s hard to argue with its benefits – for both organizations and users. If our cloud-based future is to come true though, we must pay closer attention to the service levels users are get...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...
The new wonder metal, graphene, is being looked at as a building block for communications and electronic devices on the level of what the transistor was sixty years ago. Graphene is a one-atom thick, mesh-like (think hexagonal honeycomb or chicken wire), semi metal that will add more ...
“Software-defined,” like any new trend that technology companies rush to attach to has suffered from marketing hype. Starting in mid-2012 with the acquisition of Nicera by VMware, most traditional infrastructure technology vendors across compute, networking, and storage have some messa...
Out-of-band metadata and business context outside hypermedia applications are by definition exterior to the contract, and thus aren’t amenable to any distributed computing architectural style that relies too heavily on static APIs. Therein lies the essential challenge of the API. To th...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...
The cloud’s main story so far has been one of horizontal providers, such as salesforce.com, Microsoft and Amazon, offering one-size-fits-all solutions. While these providers had some success in the financial services sector, their products weren’t specialized enough to address the need...
Worldwide IT spending is projected to rise US$3.8 trillion in 2014 according to recent Gartner research, a 3.1 percent increase from spending in 2013, which was $3.7 trillion. While not a huge jump in dollars, it does indicate that companies have been conserving cash over the past few ...
How can your business benefit from using the cloud? We hear the term all the time in the tech world, but it's never really clearly defined. Those of us who are using social media or saving data with online sources are already using it. Perhaps you just didn't know it. Amazon is one of ...
Given the business expectations at each stage of the SDLC, Continuous Testing delivers a quantitative assessment of risk as well as actionable tasks that help mitigate these risks before they progress to the next stage of the SDLC. The goal is to eliminate meaningless tests and produc...
Storing important information around the office has always been the go-to format for saving essential data. Of course, having it somewhere on hand provides peace of mind, as you know it is literally held within your building, so when someone needs a hard copy, you are able to go out an...
Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps. The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the...
A newly released report from McKinsey & Company, Risk and Responsibility in a Hyperconnected World: Implications for Enterprises, highlights the findings of a year’s worth of McKinsey research conducted in partnership with the World Economic Forum. Based on the interviews with over 200...
Over the past few years, enterprises have been moving to the cloud to streamline processes and operations. A study last year by TheInfoPro indicated that there is no sign of cloud investment slowing down – predicting an average growth rate of cloud spending of 36 percent from this year...
So many organizations switched to third-party help desk solutions without really putting in place any performance measures or tracking mechanisms to really measure how good – or bad – the support is. Some executives got a big bonus for “thinking out of the box” and coming up with a c...
In the race to implement Continuous Delivery, emphasis on build-and-deploy has overshadowed Continuous Testing. Service Virtualization's simulation technology allows you to test your component in a complete environment—any time you want. "Part of the problem with service virtualizati...
“Cloud computing” is more than just a buzzword – it has transformed the tech industry. Having been in the business of building enterprise infrastructure for over 15 years, I’ve had the opportunity to witness how cloud has altered the landscape, including most recently at my company, Ne...
Much of the dialog over net neutrality seems rather dated. This is understandable, since the debate has been going on since last century. The January 14th Federal Appeal Court decision in favor of the Internet access providers gave those companies (apparently) a degree of latitude to ...
We all know the story of Goldilocks and the three bears, but have you heard the one about Goldie Locks and the three clouds? This tale is playing out throughout the IT marketplace. Goldie Locks – an IT executive for a state government – has once again found herself in a dilemma. “If o...
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
As companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy. During the recent bout of intense...
Recent reports of a massive data breach affecting popular sites like Facebook, Twitter, Google and Yahoo have many companies rethinking security practices and wondering how to protect vital data. If your company uses cloud services to conduct business and manage data or is contemplatin...
2013 was a banner year for cloud backup adoption. It was also a year of wake-up calls: simple cloud backup doesn't constitute DR, transfer speeds are vital, and beware cloud as a commodity. Let's look to 2014 for more trends in cloud backup and DR in the cloud. This trend showed up in...
Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expe...
I had the privilege of interviewing mobility expert Vaidy Iyer today. He is the founder and CEO of AppsFreedom, a company focused on providing enterprise mobility solutions in the form of Multi-Channel, Multi-Device Platform as a Service solutions to the SAP community. I asked if the...
In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
With the "API economy" dominating the headlines in 2013, it's no surprise that Parasoft saw a surge of interest in how to ensure API reliability, security, and performance. Here's a recap of the 13 most-accessed API Integrity resources from 2013... API Integrity: How Buggy Are Today's...
We live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business ...
It’s been a great 2013. Out of the global $1.2 trillion dollars’ worth of business conducted online in 2013 across the globe, SOASTA is trusted with protecting 10% of that figure – or $150 billion. Based on the hundreds of brands SOASTA worked with this year and listened to the challen...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
Recently large numbers of consumers in the US were understandably upset and angry when online purchases that they made in the days just prior to Christmas were not delivered in time. Yet it was not so long ago that online (and traditional mail order) purchases almost always took a very...
Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
As the significant benefits of SaaS and hybrid cloud services become more evident, it’s no surprise that organizations are moving more mission-critical applications – e.g., email, VoIP, online meetings, document storage/collaboration, etc., – to the cloud. This is different than CRM ap...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...
As regulatory oversight across the financial landscape continues to drive greater transparency and stricter penalties, outsourcing to the private cloud has become an integral resource for hedge fund and private equity managers. Cloud infrastructure services are now synonymous with incr...
Enterprises are seeing a great potential in cloud-based services. However, security is a primary concern that keeps enterprise from harnessing the full potential. Identity management is one of the most important aspects of security. There is always an authentication required in an appl...