Heroes Of The Cloud – Part 2

Heroes Of The Cloud – Part 2

Heroes Of The Cloud – Part 2

Cloudscaling

As Cloud Computing becomes more pRandy-Biasrominent and influential, a few voices rise to the top to define what it means to operate in a Cloud environment.

One of the most respected and influential of these voices is Cloudscaling co-founder and CTO, Randy Bias. Bias is a recognized expert in IT Infrastructure and one of the leading innovators in the implementation of GoGrid’s Infrastructure as a Service (IaaS) model. GoGrid had launched the beta version public cloud in 2008 and is currently a leading host of Windows/Linux virtual machines.

Bias built one of the first multi-platform, multi-cloud management systems at Cloudscale Networks. He led the way to open licensing of GoGrid’s Application Programming Interface (API), which in turn inspired Sun Microsystems, Rackspace Cloud, Vmware, and others to embrace open licensing.

Along with Adam Waters, whose background is in IP networking, routing and datacenter operations, Bias founded Cloudscaling. The company serves enterprises, service providers, and web application providers with elastic cloud infrastructure. Elastic Cloud refers to services that have the agility and performance of Amazon Web Services, yet are deployable in the customer’s own datacenter, remaining under the IT teams control.

Cloudscaling has embraced OpenStack project as a core technology. Randy Bias is one of Open Stack’s eight gold-sponsor board members.

OpenStack

OpenStack is an Infrastructure as a Service (IaaS) project based on free open source software. The software based on code contributed from NASA/Nebula platform and RackSpace’s Cloud Files platform.

The project is committed to an open design and development process and is scheduled for updates every six months. More than 150 companies have joined the project, including AMD, Intel, Dell, IBM, Vmware, and some significant players in the Linux scene, Canonical (Ubuntu), SUSE Linux, and Red Hat.

Part of OpenStack’s appeal as open source software is that the team has worked hard to make the APIs compatible with the other players in the Cloud Market, especially Amazon Web Services. Applications written for Amazon can usually be used on OpenStack with minimal porting effort.

Currently, The OpenStack Foundation is directed by Jonathon Bryce. Bryce’s older brother was one of the first 12 employees at RackSpace, and he was happy to bring his computer-savvy little brother along. In 2005, the younger Bryce left RackSpace to form his own Cloud Hosting Service, Mosso Cloud. Mosso continued run its servers from RackSpace data centers, and soon the company and its Cloud applications grew at such a rate that Bryce had been invited back to lead RackSpace.

It was Bryce’s vision that led to contacting NASA to share the development of what would become OpenStack, and Bryce was appointed to head the OpenStack Foundation.

By Peter Knight

Sorry, comments are closed for this post.

Comic
Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…

Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…

Ransomware’s Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them, you must pay.” Ransomware has grown recently to become one of the primary threats to…

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…