Top 25 European Rising Stars 2012: ComodIT

Top 25 European Rising Stars 2012: ComodIT

Top 25 European Rising Stars 2012: ComodIT

The Top 25 European Rising Stars is a special annual series by CloudTweaks, where we seek to celebrate new cloud startups that have demonstrated the strongest impact across the year. These have earned little or no press coverage nor loquacious claims but they are indeed rising. To authoritatively arrive at the top 25, we have applied a criteria pegged on critical parameters like the quality of management, current funding, valuable service provision, European based and professionalism in all respects.

We welcome you to join us in this year’s tour de force where as you will discover, every rising star has a unique angle that just serves to demonstrate that the potential of the cloud could be more gigantic than most of us can possibly imagine.

ComodIT

…Commandeers how a single perfect click should provision on orchestrated servers

ComodIT is an example of a rising IT firm that crunches big data through open source provisioning either on cloud or private servers. The firm is based in Liege in Belgium and was among the top five firms that attended a critical IT Automation as a Service ceremony in Europe, October 16. Details are next.

Provisioning is one of the key areas of ComodIT which aptly drives the automated part of infrastructural deployment of resources. This technological opus helps to leverage all resources in a datacenter ranging from new applications, documents, encryption needs and user control, from top to bottom. It eliminates the traditional orchestration method of attaching alter egos of the same software at thousands of layers. The latter is time-intensive, laborious and has many manual requirements. The provisioning of ComodIT is cutting-edge because of its automated integrating factor, which creates simultaneous commands along the data and user streams at a single click.

The exponential rise of this cloud computing startup has seen it earn respect from various authoritative quarters. The statement below attests to this:

ComodIT has been chosen for “groundbreaking technologies and business models driving the future of the cloud industry.” This is according to GigaOM’s Structure: Europe 2012 LaunchPad statement upon the ITaaS startup making the shortlist. The latter is a sophisticated contest that arrays on the tech map the best startup in the cloud and related niches.

Its orchestration software known as ‘commodity-agent’ helps to automate and sample network resources in a mind-boggling universe of data, ranging from the end-users to intranets and from project managers to encrypted databases. Instead of former cumbersome apps that had to deploy to each layer, whether for the user or for the filing system, one now uses an omnipresent orchestration tool whose utility is quite abstract. It can locate any piece of information, rummage through the stacks of data in seconds, isolate Internet Protocol addresses for the right one and also govern who accesses what at a given layer. Thus, this is a gagging tool against the users as much as it is a split-second resource manager-cum-retriever.

Alternatively, it is possible to bring together multiple hosts who are in diverse deployment environments through the Synapse orchestration tool. It operates just as in the ComodIT-agent.

The golden retriever of cloud computing is proper deployment. However, this may fail and where does one go? It happens where one so trusts the cloud efficiency that they forget that there is something like documentation. At ComodIT, there is assertion that documentation keeps all technological, management, operational and deployment secrets of an organization by virtue of ‘design.’ It is like saying that without chronological facts, the past never existed: and for a fact, the ComodIT servers seek to pile up all designative elements that cross-tie to the infrastructure of a virtual entity. In case of an error, only the mapping that is in store with the rest of the data will act as a lead. This overcomes possibilities of leaving recovery options to IT consultants who did the deployment.

Recovery options, indeed, are some of the major concerns with ComodIT.com. There might be a thousand data bases but all of them have a core design that networks them. It remains the central focus of the tech kaleidoscope that will be consulted for doing any repairs without missing a detail on the specific virtual infrastructure of the organization. Secondly, the documentation offers regular updates without dousing the remnants of previous versions in case of a fallback. It is like shaping the future of recovery by creating layers of the past in an orderly design. When one needs to investigate a missing detail he or she needs to slit open the contrivance and choose the backdated layers hidden in the core. Still, the above argument makes one question the practicability of the notion that mere design can save a whole infrastructure.

Another breakthrough of this Rising Star is its open source cloud provisioning. ComodIT is a one-click-facilitation that breaks icy barriers between various storage providers. To mention but two, the site reveals compatibility with VMWare and Amazon EC2 compute, all fine examples of quintessential cloud industry platforms.

There is also the breakthrough of tracing the source of a backlog through a different machine altogether. It might be a 404 denial to some off-limit database which requires provider authorization. In this circumstance ComodIT follows parametric regulations that seek permission to penetrate a network without delay. The site’s software can also pay in the same coin to another network if a client so decides to barricade his or her database using firewalls and the like.

Though this might reflect subjectivism, it is essential to give a tidbit of what industry users of the platform are saying. An Information and Communications Technology research firm, CETIC, has affirmed that the ComodIT facilitation influences its gains in “configuration management automation.”

Looking back at the above presentation, it is irresistible to pass the buck to ComodIT as a Rising Star in Europe. It passes the test on simple, instantaneous documentation through its provisioning cloud model.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…

Ransomware’s Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them, you must pay.” Ransomware has grown recently to become one of the primary threats to…

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…