Microsoft Steps Up To The Ring With Windows Azure

Microsoft Steps Up to the Ring with Windows Azure in Direct Competition with Amazon Web Service

The land of Infrastructure -as-a-service (IaaS) shook a little bit more this week as another titan rose in competition for the enterprise’s bustling pot of gold. Microsoft has finally delivered their promised revamp on the Windows Azure services which also serves as a direct reply to the already in-motion Amazon Web Service (AWS).

AWS, with its long head start dominates the IaaS market with an estimated $1.8 billion in revenues for cloud services alone in 2012. It is projected to skyrocket to $20 billion by 2020 according to one analyst firm. But the software giant will not be undone; it unshackled Azure from its PaaS origins and has given it full IaaS capabilities with virtual machines and something that not all players in the market offers –support for Linux. The Linux market is important if Azure hopes to stand a chance against the long established AWS.

Microsoft has stepped out of its comfort zone in order to widen Azure’s mobile platform support and entice developers and enterprises. It now supports Android and iOS aside from the in-house Windows and Windows Mobile OS. They also made it easier to manage and deploy Hadoop clusters as well as integrate mobile applications into the cloud. Plus full HTML5 support and allowed Cordova/PhoneGap apps to use Azure for authentication and storage.

Amazon is a known price cutter as evidenced earlier this month when it announced price cuts just a few hours after Google’s announcement to reduce pricing on their Compute Engine. Microsoft is not far behind as showed by Azure’s new pricing schemes. There is a 21% cut on Windows Azure Virtual Machines and a 33% cut on solutions that use Windows Azure Cloud Services for deployment.

Windows Azure is now a comprehensive hybrid cloud solution which expands its built-in gallery of virtual machine images (VMI) with new templates for Windows Server Images. And with the Windows Azure Management Portal, an administrator can create an enterprise’s virtual infrastructure from a single web-based portal.

By Abdul Salam

Sorry, comments are closed for this post.

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…