Top 25 European Rising Stars 2012: ComodIT

Top 25 European Rising Stars 2012: ComodIT

Top 25 European Rising Stars 2012: ComodIT

The Top 25 European Rising Stars is a special annual series by CloudTweaks, where we seek to celebrate new cloud startups that have demonstrated the strongest impact across the year. These have earned little or no press coverage nor loquacious claims but they are indeed rising. To authoritatively arrive at the top 25, we have applied a criteria pegged on critical parameters like the quality of management, current funding, valuable service provision, European based and professionalism in all respects.

We welcome you to join us in this year’s tour de force where as you will discover, every rising star has a unique angle that just serves to demonstrate that the potential of the cloud could be more gigantic than most of us can possibly imagine.

ComodIT

…Commandeers how a single perfect click should provision on orchestrated servers

ComodIT is an example of a rising IT firm that crunches big data through open source provisioning either on cloud or private servers. The firm is based in Liege in Belgium and was among the top five firms that attended a critical IT Automation as a Service ceremony in Europe, October 16. Details are next.

Provisioning is one of the key areas of ComodIT which aptly drives the automated part of infrastructural deployment of resources. This technological opus helps to leverage all resources in a datacenter ranging from new applications, documents, encryption needs and user control, from top to bottom. It eliminates the traditional orchestration method of attaching alter egos of the same software at thousands of layers. The latter is time-intensive, laborious and has many manual requirements. The provisioning of ComodIT is cutting-edge because of its automated integrating factor, which creates simultaneous commands along the data and user streams at a single click.

The exponential rise of this cloud computing startup has seen it earn respect from various authoritative quarters. The statement below attests to this:

ComodIT has been chosen for “groundbreaking technologies and business models driving the future of the cloud industry.” This is according to GigaOM’s Structure: Europe 2012 LaunchPad statement upon the ITaaS startup making the shortlist. The latter is a sophisticated contest that arrays on the tech map the best startup in the cloud and related niches.

Its orchestration software known as ‘commodity-agent’ helps to automate and sample network resources in a mind-boggling universe of data, ranging from the end-users to intranets and from project managers to encrypted databases. Instead of former cumbersome apps that had to deploy to each layer, whether for the user or for the filing system, one now uses an omnipresent orchestration tool whose utility is quite abstract. It can locate any piece of information, rummage through the stacks of data in seconds, isolate Internet Protocol addresses for the right one and also govern who accesses what at a given layer. Thus, this is a gagging tool against the users as much as it is a split-second resource manager-cum-retriever.

Alternatively, it is possible to bring together multiple hosts who are in diverse deployment environments through the Synapse orchestration tool. It operates just as in the ComodIT-agent.

The golden retriever of cloud computing is proper deployment. However, this may fail and where does one go? It happens where one so trusts the cloud efficiency that they forget that there is something like documentation. At ComodIT, there is assertion that documentation keeps all technological, management, operational and deployment secrets of an organization by virtue of ‘design.’ It is like saying that without chronological facts, the past never existed: and for a fact, the ComodIT servers seek to pile up all designative elements that cross-tie to the infrastructure of a virtual entity. In case of an error, only the mapping that is in store with the rest of the data will act as a lead. This overcomes possibilities of leaving recovery options to IT consultants who did the deployment.

Recovery options, indeed, are some of the major concerns with ComodIT.com. There might be a thousand data bases but all of them have a core design that networks them. It remains the central focus of the tech kaleidoscope that will be consulted for doing any repairs without missing a detail on the specific virtual infrastructure of the organization. Secondly, the documentation offers regular updates without dousing the remnants of previous versions in case of a fallback. It is like shaping the future of recovery by creating layers of the past in an orderly design. When one needs to investigate a missing detail he or she needs to slit open the contrivance and choose the backdated layers hidden in the core. Still, the above argument makes one question the practicability of the notion that mere design can save a whole infrastructure.

Another breakthrough of this Rising Star is its open source cloud provisioning. ComodIT is a one-click-facilitation that breaks icy barriers between various storage providers. To mention but two, the site reveals compatibility with VMWare and Amazon EC2 compute, all fine examples of quintessential cloud industry platforms.

There is also the breakthrough of tracing the source of a backlog through a different machine altogether. It might be a 404 denial to some off-limit database which requires provider authorization. In this circumstance ComodIT follows parametric regulations that seek permission to penetrate a network without delay. The site’s software can also pay in the same coin to another network if a client so decides to barricade his or her database using firewalls and the like.

Though this might reflect subjectivism, it is essential to give a tidbit of what industry users of the platform are saying. An Information and Communications Technology research firm, CETIC, has affirmed that the ComodIT facilitation influences its gains in “configuration management automation.”

Looking back at the above presentation, it is irresistible to pass the buck to ComodIT as a Rising Star in Europe. It passes the test on simple, instantaneous documentation through its provisioning cloud model.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…