It's 2013. Cloud computing is another year older. As adopters, we're making fewer mistakes, but I suspect we'll repeat many of the same errors from 2012.
Now it is the time to work on cloud computing improvements, to set reasonable goals and to make sure we live up to them. To that end, here are four cloud computing resolutions for 2013 I suggest we all adopt:
- I resolve not to "cloud-wash."
- I resolve not to use cloud computing for everything.
- I resolve to always consider management, performance, and service governance.
- I resolve not to question cloud security before I understand the technology.
Cloud computing, mobile ushering in "major shift" for enterprise security practices
Gartner Thursday held forth on what it expects to be the top security trends for 2013, citing the rise of cloud computing, social media and employees bringing their own devices to work as among the forces likely to produce radical changes in how enterprises manage IT security. The market research firm also says the "major shift" expected in IT security in 2013 will shake up established IT security vendors as newer players in cloud and mobile challenge them.
The 7 deadly sins of cloud computing
Automation, cost savings, and data redundancy - no wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process. Here CISOs and security buffs round up seven security sins that can undermine cloud computing's benefits.
Understanding The Cloud Computing Infrastructure
As a long time advocate of cloud computing, I already know most of the technology and terms surrounding cloud computing and if someone mentions a new application or feature I might be able to gleam how it works based on the technologies used. This is not necessarily true for most people even if they have been in the IT industry for a long time. That is why I write “simple” articles that the less informed might be able to grasp easily. But to get a real understanding of something, you need to get an understanding of its internal structure, understand how it works and not just what it does. If someone tells you that an airplane flies because of engines and wings, it will still seem like magic because you are not really informed on the how. Same as cloud computing, for many it simply provides them with that service that they take for granted without really knowing how it is done. And to understand it better, we must understand the underlying infrastructure of cloud computing.
Will Cloud Computing Destroy What is Left of Your Free Time?
Computing giants like Amazon and Rackspace are leaders in the virtualization of computer servers, a core element in the development of cloud computing. This technology makes it possible for a single PC that was used 20 percent of the time to be used 80 percent of the time or more, Hardy said. Software that monitored workloads could identify when a machine was free, and assign it a workload that would keep it busy without distracting it from its original function, he said. But until recently, that kind of utilization efficiency was seen mostly in corporate data centers and computer-centric organizations.
We hope these short sum-ups on Cloud Computing are helping you to take a knowledgeable approach towards moving to the cloud. Stay tuned for more sum-ups on in the forthcoming week.
Don’t forget to add your comments and suggestions. I will have more around the cloud a week later.
Santanu Das
Marketing Evangelist, WOLF Frameworks
NOTE: The views expressed above are purely personal and for informational purposes only. WOLF FRAMEWORKS INDIA PVT. LTD. MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Gartner Thursday held forth on what it expects to be the top security trends for 2013, citing the rise of cloud computing, social media and employees bringing their own devices to work as among the forces likely to produce radical changes in how enterprises manage IT security. The market research firm also says the "major shift" expected in IT security in 2013 will shake up established IT security vendors as newer players in cloud and mobile challenge them.
The 7 deadly sins of cloud computing
Automation, cost savings, and data redundancy - no wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process. Here CISOs and security buffs round up seven security sins that can undermine cloud computing's benefits.
Understanding The Cloud Computing Infrastructure
As a long time advocate of cloud computing, I already know most of the technology and terms surrounding cloud computing and if someone mentions a new application or feature I might be able to gleam how it works based on the technologies used. This is not necessarily true for most people even if they have been in the IT industry for a long time. That is why I write “simple” articles that the less informed might be able to grasp easily. But to get a real understanding of something, you need to get an understanding of its internal structure, understand how it works and not just what it does. If someone tells you that an airplane flies because of engines and wings, it will still seem like magic because you are not really informed on the how. Same as cloud computing, for many it simply provides them with that service that they take for granted without really knowing how it is done. And to understand it better, we must understand the underlying infrastructure of cloud computing.
Will Cloud Computing Destroy What is Left of Your Free Time?
Computing giants like Amazon and Rackspace are leaders in the virtualization of computer servers, a core element in the development of cloud computing. This technology makes it possible for a single PC that was used 20 percent of the time to be used 80 percent of the time or more, Hardy said. Software that monitored workloads could identify when a machine was free, and assign it a workload that would keep it busy without distracting it from its original function, he said. But until recently, that kind of utilization efficiency was seen mostly in corporate data centers and computer-centric organizations.
We hope these short sum-ups on Cloud Computing are helping you to take a knowledgeable approach towards moving to the cloud. Stay tuned for more sum-ups on in the forthcoming week.
Don’t forget to add your comments and suggestions. I will have more around the cloud a week later.
Santanu Das
Marketing Evangelist, WOLF Frameworks
NOTE: The views expressed above are purely personal and for informational purposes only. WOLF FRAMEWORKS INDIA PVT. LTD. MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
1 comment:
Thanks for wriiting
Post a Comment