Top 25 European Rising Stars 2012: ComodIT

Top 25 European Rising Stars 2012: ComodIT

Top 25 European Rising Stars 2012: ComodIT

The Top 25 European Rising Stars is a special annual series by CloudTweaks, where we seek to celebrate new cloud startups that have demonstrated the strongest impact across the year. These have earned little or no press coverage nor loquacious claims but they are indeed rising. To authoritatively arrive at the top 25, we have applied a criteria pegged on critical parameters like the quality of management, current funding, valuable service provision, European based and professionalism in all respects.

We welcome you to join us in this year’s tour de force where as you will discover, every rising star has a unique angle that just serves to demonstrate that the potential of the cloud could be more gigantic than most of us can possibly imagine.

ComodIT

…Commandeers how a single perfect click should provision on orchestrated servers

ComodIT is an example of a rising IT firm that crunches big data through open source provisioning either on cloud or private servers. The firm is based in Liege in Belgium and was among the top five firms that attended a critical IT Automation as a Service ceremony in Europe, October 16. Details are next.

Provisioning is one of the key areas of ComodIT which aptly drives the automated part of infrastructural deployment of resources. This technological opus helps to leverage all resources in a datacenter ranging from new applications, documents, encryption needs and user control, from top to bottom. It eliminates the traditional orchestration method of attaching alter egos of the same software at thousands of layers. The latter is time-intensive, laborious and has many manual requirements. The provisioning of ComodIT is cutting-edge because of its automated integrating factor, which creates simultaneous commands along the data and user streams at a single click.

The exponential rise of this cloud computing startup has seen it earn respect from various authoritative quarters. The statement below attests to this:

ComodIT has been chosen for “groundbreaking technologies and business models driving the future of the cloud industry.” This is according to GigaOM’s Structure: Europe 2012 LaunchPad statement upon the ITaaS startup making the shortlist. The latter is a sophisticated contest that arrays on the tech map the best startup in the cloud and related niches.

Its orchestration software known as ‘commodity-agent’ helps to automate and sample network resources in a mind-boggling universe of data, ranging from the end-users to intranets and from project managers to encrypted databases. Instead of former cumbersome apps that had to deploy to each layer, whether for the user or for the filing system, one now uses an omnipresent orchestration tool whose utility is quite abstract. It can locate any piece of information, rummage through the stacks of data in seconds, isolate Internet Protocol addresses for the right one and also govern who accesses what at a given layer. Thus, this is a gagging tool against the users as much as it is a split-second resource manager-cum-retriever.

Alternatively, it is possible to bring together multiple hosts who are in diverse deployment environments through the Synapse orchestration tool. It operates just as in the ComodIT-agent.

The golden retriever of cloud computing is proper deployment. However, this may fail and where does one go? It happens where one so trusts the cloud efficiency that they forget that there is something like documentation. At ComodIT, there is assertion that documentation keeps all technological, management, operational and deployment secrets of an organization by virtue of ‘design.’ It is like saying that without chronological facts, the past never existed: and for a fact, the ComodIT servers seek to pile up all designative elements that cross-tie to the infrastructure of a virtual entity. In case of an error, only the mapping that is in store with the rest of the data will act as a lead. This overcomes possibilities of leaving recovery options to IT consultants who did the deployment.

Recovery options, indeed, are some of the major concerns with ComodIT.com. There might be a thousand data bases but all of them have a core design that networks them. It remains the central focus of the tech kaleidoscope that will be consulted for doing any repairs without missing a detail on the specific virtual infrastructure of the organization. Secondly, the documentation offers regular updates without dousing the remnants of previous versions in case of a fallback. It is like shaping the future of recovery by creating layers of the past in an orderly design. When one needs to investigate a missing detail he or she needs to slit open the contrivance and choose the backdated layers hidden in the core. Still, the above argument makes one question the practicability of the notion that mere design can save a whole infrastructure.

Another breakthrough of this Rising Star is its open source cloud provisioning. ComodIT is a one-click-facilitation that breaks icy barriers between various storage providers. To mention but two, the site reveals compatibility with VMWare and Amazon EC2 compute, all fine examples of quintessential cloud industry platforms.

There is also the breakthrough of tracing the source of a backlog through a different machine altogether. It might be a 404 denial to some off-limit database which requires provider authorization. In this circumstance ComodIT follows parametric regulations that seek permission to penetrate a network without delay. The site’s software can also pay in the same coin to another network if a client so decides to barricade his or her database using firewalls and the like.

Though this might reflect subjectivism, it is essential to give a tidbit of what industry users of the platform are saying. An Information and Communications Technology research firm, CETIC, has affirmed that the ComodIT facilitation influences its gains in “configuration management automation.”

Looking back at the above presentation, it is irresistible to pass the buck to ComodIT as a Rising Star in Europe. It passes the test on simple, instantaneous documentation through its provisioning cloud model.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comics
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…