Category Archives: Cloud Computing

Bridging The Gap Between MSPs And The Public Cloud

Bridging The Gap Between MSPs And The Public Cloud

MSPs and the Public Cloud

According to Gartner, Amazon Web Services (AWS) and Microsoft Azure are neck and neck in public IaaS cloud provision, with Google the most likely to challenge these leaders. With the most recent growth of 33%, the market is currently assessed at $16.5 billion, and Gartner predicts this market will grow a further 29% per annum until 2019. Commonly used for development and testing environments, batch processing and high performance computing, web-based apps and internet-facing websites, and non-mission critical internal business applications, it’s surprising that such an obvious disconnect between customer needs and managed service provider (MSP) offerings exists.

Why the Disconnect?

cloud-mgr

The majority of cloud services offered by MSPs are private instead of public. While many attempt to build self-hosted virtualized infrastructures, the need for high-quality service, flexibility, security, and availability is a significant challenge, coupled with expectations of modular service-centric constructions incorporating management and billing capabilities.

Failure may be attributed to a variety of root causes:

  • MSPs believing private or niche data center offerings would be most attractive.
  • The necessity of substantial investment in staff training.
  • Many MSP customers may be smaller, less innovative individuals and organizations who are late to adopt new technologies and trends.
  • Current systems owned and operated are dissimilar to the systems required to manage public cloud services.
  • The three to five year refresh cycle hasn’t yet played out in MSP managed customers.
  • A catalyst customer may be needed to help drive change.

What Clients Want; What Clients Need

According to MSPmentor, most IT decision makers in medium and large US companies want to outsource their public cloud management, and 70% prefer to deal with a single vendor to manage their IT infrastructure. The market is looking for products that move beyond traditionally managed and priced solutions and provide customer-oriented value. Affording quality public cloud management solutions requires MSPs to offer more than lifecycle management and support and instead deliver effective technology business advice. MSPs able to provide support for increased agility, help their clients strategize effectively, and increase revenue are essential.

AWS

Being the first to offer a public IaaS cloud service, based on Xen-virtualized servers, AWS is considered the first and safe choice by industry analysts. Gartner remarks that AWS is the “overwhelming market share leader,” and is “extraordinarily innovative, exceptionally agile, and very responsive to the market.” Statistics also confirm that AWS has held a competitive advantage over both Microsoft and Google for multiple years. However, AWS can be complicated. Users sometimes find pricing structures obscure with some services charged for individually where other vendors package them, and so third-party management vendors are often brought in to help administer costs and implementations.

Build a Bridge

bridge-build

CloudMGR is the leading platform for optimizing and managing AWS cloud resources and could help shrewd MSPs take advantage of the current gap between client needs and MSP offerings. Though the transition to selling and managing AWS can be complicated, CloudMGR simplifies the process and reduces the costs of winning and managing public cloud businesses for MSPs.

With the creation of an easy-to-use interface, CloudMGR provides the necessities that enable L2 engineers to manage customers, and makes the management of costing and billing effortless. Moreover, CloudMGR integrates with existing systems popular with MSPs such as ConnectWise and Autotask that assist in IT business and billing management for increased profitability, efficiency, and control. The assimilation of CloudCheckr adds recommendations on cloud resource usage and optimization and provides easily actionable best practice recommendations, while integration with Lightweight Directory Access Protocol (LDAP) empowers MSPs to easily integrate and manage a third party system. In effect, CloudMGR is providing MSPs with an effective way to change how AWS cloud is managed and delivered, and reach the market’s untapped demand for managed public cloud.

(Sponsored by CloudMGR)

By Jennifer Klostermann

Cybersecurity Survey Reveals Endpoint Risk Five Times Bigger Than Cloud or Networks

Cybersecurity Survey Reveals Endpoint Risk Five Times Bigger Than Cloud or Networks

Cybersecurity Survey Reveals Endpoint Risk

A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled.

Black Hat 2015: State of Security, released by Bromiun Inc. yesterday, also reveals that a large number of businesses find the implementation of patches for “zero-day vulnerabilities” in the software they are using (including Internet browsers and Flash) to be an enormous challenge. While most believed that the recently launched Windows 10 does improve security, a third said these improvements were not sufficient.

Flash has become a prime target for hackers, thanks to the popularity and widespread use of the software, so it’s no surprise an overwhelming majority of those surveyed believe their organizations would be safer without Flash,” Clinton Karr, senior security strategist at Bromium told CloudTweaks today. “This has been a huge topic within the industry as we’ve seen numerous critical patches for the software over the course of this year. As hackers continue to exploit Flash users, it’s extremely important for companies to consider disabling it or to turn to new technology that doesn’t jeopardize productivity and security.”

Bromium, considered a pioneer in threat isolation technology to prevent breaches relating to data, surveyed more than 100 IT professionals at the annual Black Hat conference held in Nevada earlier this month.

cyber-security-survey

They asked participants:

  • To identify the source of the greatest security risks in their organizations
  • State whether their organizations would be more secure if Flash was disabled
  • If their organizations would be less productive and/or if critical applications were likely to break if Flash was disabled
  • How quickly organizations implement patches for zero-day vulnerabilities
  • Which industry is most at risk of cyber attacks
  • Which industry implements the best security practices
  • What they thought about Windows 10 security features
  • Whether they were planning to upgrade to Windows 10

The Endpoint Identified as the Greatest Security Risk

The survey found that most participants were cynical though pragmatic, identifying that end users introduce the greatest security risk. A total of 55 percent selected the endpoint, while 27 percent said insider threats were the biggest problem. Only 9 percent said the cloud was the greatest risk, and 9 percent said networks.

Researchers did not find this surprising, since the human element is an obvious security risk – particularly when people use untrusted networks outside their office or home environment, including coffee shops, hotels, and airports. This human element not only increases the endpoint risk, but also the risk of cyber attack, largely because typical detection-based security solutions like antivirus simply don’t identify malicious content on the Internet or in emails.

Impact of Flash on Security and Productivity

flash

There is no doubt that IT security professionals are ultra-aware of the security threats Flash poses, with 90 percent of survey participants stating that their organization would definitely be more secure if they disabled Flash. This is in keeping with an earlier Bromium Labs report Endpoint Exploitation Trends, that found Flash had been responsible for more “exploits” than any other software during the first half of 2015. Further, Flash vulnerabilities are currently so overwhelmingly problematic that YouTube has switched from Flash to HTML5; Mozilla has temporarily blocked Flash from Firefox; and the new security chief of Facebook, Alex Stamos has called for Flash to be “killed.”

According to the Black Hat survey report, the reason there are so many Flash exploits is simply because of the popularity of the software, just as Java exploits used to be very common.

The challenge for IT security professionals is that disabling Flash is not always an option they can choose – specially since many operations teams insist that it will make the organizations less productive and even “break” some of their critical applications if it was disabled.

Of those who participated in the survey, 44 percent said productivity would be adversely affected.

Implementation of Patches to Overcome Security Vulnerabilities

Implementing patches was reported to be a major problem for many of the information security professionals who responded to the survey. Only 10 percent said they were able to implement patches for “zero-day vulnerabilities” in the first day after patches were released. Considerably more – 50 percent – could get this done within a week; 22 percent said it takes a month or more.
The greatest concern was for organizations running vulnerable versions of Flash since they could easily be compromised by exploit kits like the currently popular Angler.

Industries Most at Risk

While most information security professionals felt critical infrastructure in general was at the most risk of cyber attack, when asked to identify which industries were most vulnerable, 30 percent said financial services. However, ironically, 60 percent felt that financial services had the best security practices, followed by technology (27 percent.)

While 12 percent identified government as being most as risk, 17 percent named health care, and energy equally. Other industries mentioned included retail and transport, both of which were identified by less than half the respondents.

Reaction to Windows 10

windows-10

(Image Source: Anton Watman / Shutterstock)

There was mixed reaction to Windows 10, with many professionals (40 percent) having zero opinion about it. Nevertheless, 23 percent said security was dramatically improved, while 33 percent said the improvement was not sufficient. Only 4 percent said that there was no improvement at all.

Since Windows 10 was released shortly before Black Hat 2015, none of the respondents had upgraded to Windows 10: only about 10 percent planned to upgrade in the next three months. A large percentage (40) had no plans to upgrade, and 31 percent said they would wait at least a year before upgrading.

Ultimately, the Bromium survey found that whilst the endpoint is currently considered to be the greatest security risk, the human element is just one element of the risk. The other major vulnerability is software, which is a trend the company continues to research on an ongoing basis.

By Penny Swift

The Hyperconnectivity Enabled By The Internet of Things

The Hyperconnectivity Enabled By The Internet of Things

Many pundits and security researchers have focused on the security threats posed by the hyperconnectivity enabled by the Internet of Things. The high profile hack of a Jeep Cherokee by security researchers, who were able to take control of the steering, brakes and other critical functions by exploiting a vulnerability in the infotainment system, is just the latest example.

While some CIOs and IT security folks might feel overwhelmed by the security challenges posed by all of these IoT devices connecting to their network, Earl Perkins, research vice president at Gartner, has some advice: “Don’t despair.”

Perkins wrote in a blog post that most IoT security is not esoteric, it is basic IT or operational technology security. “So before too much panic sets in, know that many of the practices, technologies and skills that have been developed over decades are still applicable to securing the IoT,” he observed.

Read Full Article At FierceMobileIT

Why Your Cloud Project Needs A Strong PMO

Why Your Cloud Project Needs A Strong PMO

Cloud Project Needs A Strong PMO

Cloud projects are highly complex. Without a strong project management office, they have a tendency to go off track. As enterprises in all verticals look to modernize application and infrastructure stacks, Project Management Offices (PMO) will de-risk the process and help organizations get to where they want to be on-time and on-budget.

PMO is the Central Brain

PMO

(Image Source: Pinterest)

While the project managers in some enterprises are responsible for planning and meetings, there is often far greater success when project managers are responsible for meeting a project’s core objectives and empowered to make important decisions. Instead of living on the sidelines of a project as facilitators, they are the central brain for ensuring the strategy is executed. They know what is happening on each level of the project, from the status of an engineer’s tickets to understanding the CEO’s vision for the next three years.

Successful project managers for cloud projects should be experienced technologists with PM skills. This gives them a place of authority and allows them to drive the discussion around planning with engineers and business leaders alike.

PMs are normally the first to spot when strategy and execution diverge. After the initial planning phase of a project, CTOs are typically not involved in execution day-to-day. PMs fill the gap and report directly to CTOs and line of business directors. When engineers go off-plan, the PM has the authority to say “no” — and their knowledge of the full plan allows them to back up their case.

Similarly, when business leaders make the case for the engineers to work on a new project, PMs can articulate exactly what the impact of such a decision would be. Because they know the backlog, they can assess what other high-priority items would get pushed back, how this would affect delivery timelines and budgets, and make a business case for either maintaining the current plan or changing it.

Unite 30,000 Feet + Ground Level

cloud-tech

Depending on complexity or scale, cloud plans can take time to execute fully. During this time, strategy can changes. Engineering staff can change. New lines of business can launch.

All too often, there are business leaders operating at 30,000 feet and engineering teams at ground level, and “weak” project managers running in between them. Engineers see a bulleted list of strategies that have little impact on their tickets, and business leaders see a list of in-progress features with unclear ties back to their vision.

Because PMs take part in daily meetings or other interactions, they can answer detailed questions, like, “How many VPCs do we have?” or “How long will it take to install Alert Logic?” PMs then absorb high-level priority discussions and help technical leaders set priorities.

Focus Engineering Time

When a strong PMO is not in place on a cloud project, engineers are often the ones who suffer most. Frequently, it means an overload of tickets for unrelated projects in multiple lines of business, which lowers efficiency and increases dissatisfaction.

Strong PMs set the right priorities and give the business context for engineers. They may even choose to focus certain engineers on certain lines of business to increase their efficiency as well as give engineers the opportunity to build depth while giving them sanity. PMs may also help spot gaps in engineering talent, advise their CTO accordingly and help hire the right engineer(s).

Control Cost

Engineers should not have to worry about how much an instance costs; they should be busy implementing the best technology solution. CTOs should worry about cost, but they cannot and should not get involved in every decision about instance size, backup frequency, dedicated storage, etc. PMs fill the gap.

PMs should understand their cloud platform’s cost structure backwards and forwards. They should be able to balance cost with risk, and know when to escalate a decision or let an engineer choose. They can even be accountable to the CFO’s office to report daily, weekly, or monthly costs.

Mitigate Risk

No matter how much planning happens, the journey to the cloud can be unpredictable. Unforeseen issues and roadblocks can present themselves in any complex undertaking – especially when organizations are new to a paradigm-shifting technology like the public cloud.

PMs identify risks through a big picture lens of strategy, planning and execution. This enables them to proactively identify risks before they happen and put plans in place to address them. PMs also ensure issues get the right level of escalation and visibility, and help come up with the right solution.

Project managers not only act as a single point of contact for both the engineers and the management team, but they also act as a single point of accountability. They are experts at communicating bad news because they can account for why it happened, articulate the exact effects of the failure, and present a plan for preventing future mistakes.

This works both ways. PMs may take flak when business-level strategy changes, and they may be at the front lines of manager frustration when downtime happens. In both cases, they remain focused on the overall success of the project rather than the blame game, and are close enough to the ground to take measurable steps to ensure failure does not happen again.

If you are about to kick off a new cloud project or are struggling to keep your current cloud on track, create a PMO team or outsource cloud orchestration. This team will be worth their weight in gold as your infrastructure scales and grows more complex.

vinny

By Vinny Hu, Sr. Director of Services, Logicworks

Vinny is responsible for client services and service delivery, working to make Logicworks an extension of our clients’ technology teams. Prior to joining Logicworks in 2013, Vinny founded an eSports startup before becoming a Vice President during nine years at Goldman Sachs. Vinny holds a BEng from the University of Manchester.

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry.

ZipRecruiter, an online recruitment and job finder business, has identified the top ten cities that are poised to become the new tech capitals of various US states. They tracked hiring patterns, and analyzed the various metropolitan areas that currently show positive employment growth and appear to be on the verge of a boom in the tech industry.

silicon-valley

(Image Source: Shutterstock)

They also identified common factors these cities share including:

  • A cost of living that is lower than usual, and therefore affordable
  • Reputable colleges and universities that provide an entry level workforce continuously, and also offer good resources for research

Additionally, the company reports that the tech industry as a whole is revitalizing economies that were previously depressed essentially refocusing what has been referred to as the Rust Belt at the forefront of the American economy.

One of the top ten tech cities is Indianapolis, and today we spoke to two Indy-based startups to get an indication of how successful they have been. We also tracked the top tech cities listed by ZipRecruiter, to see which tech jobs are on offer.

Top Ten Tech Cities and Their Top Five Tech Jobs

startup

Business is booming in these ten cities:

1. Austin – Round Rock, Texas, known as “Silicon Hills”, where companies including Google, Facebook, and eBay are currently offering more than 50,000 tech positions for Java developers, development analysts, technical writers, software engineers, and network administrators.

2. Raleigh – Cary, North Carolina, in the so-called research triangle where companies are looking primarily for infrastructure architects, design engineers, tooling engineers, Java developers, and SQL developers.

3. Provo – Orem, Utah, where many software companies operate and which is a pilot location for Google Fiber. There are currently about 8,570 jobs available in IT, the top one offering positions in technical support, and as Python developers, field technicians, software engineers, and net developers.

4. Fort Collins – Loveland, Colorado, that is home to computer companies including Hewlett Packard and Intel. Fort Collins’ top five tech jobs are software QA, SQL server database developer, application software developer, test engineer, and lead systems programmer.

5. Hartford (West and East Hartford), Connecticut, where the top tech jobs are applications engineer, systems analyst, infrastructure engineer, Java developer, and data architect.

6. Indianapolis – Carmel, Indiana, that boasts a high quality of life coupled with a low cost of living, and has recently attracted numerous tech companies to the area. Top tech jobs are available for senior Java developers, infrastructure architects, Java developers, operations managers, and net developers. Startups are more varied (see below).

7. Boise City – Nampa, Idaho, that currently has about 8,180 IT jobs available, the top five being positions for application engineers, firmware engineers, software engineers, mobile software developers, and net software engineers.

8. Manchester – Nashua, New Hampshire, which seems to have an increasing number of tech jobs available. The top five here are for UI software engineers, systems architects, Java developers, senior IT project managers, and sharepoint administrators.

9. Nashville – Davidson – Murfreesboro – Franklin, Tennessee, which while number nine on the list, has more than 20,000 tech jobs available right now. The top five are for senior programmer analysts, information security engineers, systems administrators, IT managers, and iOS developers.

10. Eugene – Springfield, Oregon, known as the Silicon Forest because they manufacture a great deal of tech hardware and they emphasize clean, renewable technologies.

Indy Tech Startups

The two startups interviewed by CloudTweaks were Formstack, an Indy business that provides data capture solutions, and Roust Community, a social network that connects like-minded people.

Formstack started out nearly a decade ago, in 2006, and has subsequently become very involved within the Indy tech community, recognizing the importance of giving back to the city in which they are currently based after relocating from San Francisco.

The company has subsequently experienced a 110 percent increase in new revenue over the last year, and it expects to see a further 80 percent year-over-year revenue growth in 2015. This illustrates how a successful startup can – and has – helped the Indy community develop, and how it is operating on what has become one of the top ten havens for tech startups.

An advantage of headquartering out of Indy, says Ade Olonoh, (Founder of Formstack), is that the city has the ability to “bring in members from all over the world, but still help increase the overall revenue of the city and have an impact on our city’s economy.”

form-stack-ade-olonohRoust Community, created by Mark LaFay to move dialogue off Facebook and provide real value for those wanting “good conversation” relating to polarizing topics including politics, religion and social issues, also has it’s heart and soul in Indianapolis. “Indiana continues to become not only the crossroads of America, but also a growing technology metropolis,” says LaFay.

Certainly these are two startups that are doing their best to nurture talent within their own fast developing tech communities.

By Penny Swift

The Growth Of Cloud Based Phone Systems

The Growth Of Cloud Based Phone Systems

Cloud Based Phone Systems

Cloud based phone systems allow the use of the internet for making and receiving calls and with the growth in cloud computing and cloud services these systems are gaining popularity. With cloud phone system integration with Office 356, the significant savings available are now more accessible. RingCentral Office’s integration with Microsoft Office 365 blends the cloud business phone system with productivity work environments, bridging the divide between communication and throughput. Users will be able to click-to-call numbers within the Office 365 interface, and call both internally and externally using a corporate directory. Online video meetings and audio conferences can be established and will automatically appear in the Office 365 calendar.

Why Cloud Calling

voip
Cloud based phone systems provide a host of benefits, some similar to other advantages in the cloud environment, and others unique to telephony:

  • Amalgamated Communications – with seamless integration between devices, making and answering calls can be directed to whichever device is accessible in the moment, be it mobile, handset, tablet, or PC. You can even check your voicemail from your email inbox.
  • Cost Reduction – as with many other cloud applications, the cost benefits of cloud calling are notable. No PBX system is required, no copper wiring, and hand-in-hand, the only maintenance necessary is of the actual devices used for calling.
  • Management – cloud phone systems can be managed through a web browser from any location, and handling rules, users, and remote details can be changed or updated as. Billing can also be accurately monitored, with all costs specified and reports available for drilling down into the finer details.
  • Feature-rich – small and medium businesses now have access to a host of communication features often out of reach through standard telephony systems. Call diverting, call logs, conference calling, and auto attendant are standard features of most cloud based phone systems.

Implementing Cloud Calling

BYOD

Installing these systems is a hassle-free and inexpensive process. There are a number of cloud communication phone services from providers such as Grasshopper, 8×8, Vonage, RingCentral and Thinkingphones.  Many promise specialist implementation for smooth transitions for both local and remote employees using existing IP phones or rented devices, and PCs and smartphones can be connected to their service applications. Employees no longer need personal and business devices, but can literally bring their own devices to work to be integrated into the corporate system. Many providers are offering advanced cloud based phone systems with message management, call forwarding, voicemail, and both traditional-styled phones as well as mobile phone connection. Benefits to small businesses include the professional appearance created, lowered cost, and a blend of flexible, mobile, and productive features.

Call Revolution And Growth Hacking

Though social media, email, and text interactions are popular methods of communication today, a large percentage of the world still relies on and prefers telephonic communication. Knowing when and how to reach your audience is as important as your infrastructure. While stats show a greater answer rate late at night, the wise man understands that this isn’t the time to offer new telephone services, though it might produce higher sales of death insurances.

ThinkingPhones, an innovator in developing mobile-enabled, analytics-driven business communications has released a report  “Answer Rates in the US: Knowing When to Call,” revealing ideal times for businesses to call prospects and generate qualified leads. The report, which examines over 25 million inbound phone calls, identifies exactly when individuals are most and least likely to answer a call based on their location and whether or not the call originates from a known or unknown number.

ThinkingPhones Infographic - US Answer Rates (FINAL)_001

(Infographic Source: ThinkingPhones.com)

Shrewd businesses are cognisant of the impact of IPv6 and know how to use the cloud for increased productivity in a variety of areas.

By Jennifer Klostermann

Cloud Infographic: The IT Job Market

Cloud Infographic: The IT Job Market

Where The Jobs Are 

It’s Monday and there are a number of people searching classifieds for a career change or to simply break into the exciting tech job market. We’ve covered job trends on a number of occasions over the years here on CloudTweaks. Data Science, Wearable Technology and M2M are just a few of the exciting industries looking for new skilled workers. Attached is an infographic by computersciencezone.org which focuses on some of the more specific and traditional roles in computing science technology.

ComputerJobs

Veracode Recognized as a “Leader” in Gartner Magic Quadrant for Application Security Testing

Veracode Recognized as a “Leader” in Gartner Magic Quadrant for Application Security Testing

 Veracode Well-Known for Its Scalable Cloud-Based Service, Ongoing Innovation and Expertise

BURLINGTON, MA–(Marketwired – Aug 10, 2015)Veracode, a leader in protecting enterprises from today’s pervasive web and mobile application threats, today announced that it has been positioned in the “Leaders” quadrant of Gartner Inc.’s 2015 “Application Security Testing Magic Quadrant1” for the third consecutive year, based on the company’s completeness of vision and ability to execute in the application security testing (AST) market.

Veracode

Highly publicized breaches in the past 12 months have raised awareness of the need to identify and remediate vulnerabilities at the application layer. Enterprise application security testing solutions for web, cloud and mobile applications are key to this strategy.

Veracode’s automated cloud-based service safeguards web, mobile and cloud applications for more than 800 organizations worldwide, including three of the top four banks in the Fortune 100 and more than 25 of the world’s top 100 brands. The company is widely recognized for its demonstrated innovation, strong reputation for service quality, and broad set of automated services delivered on a single scalable platform.

Software has eaten the world. Every enterprise is becoming a software company, regardless of what business they’re in — and it’s no longer feasible to hire an army of specialized experts to secure your global software infrastructure,” said Bob Brennan, Veracode CEO. “Our mission is to secure the world’s software. We view our ongoing recognition by Gartner as further validation that our cloud-based approach and world-class expertise are successfully reducing application-layer risk for the world’s largest organizations, across in-house, outsourced, commercial and open source applications.”

To read the full report visit.

About Veracode

Veracode is a leader in securing web, mobile and third-party applications for the world’s largest global enterprises. By enabling organizations to rapidly identify and remediate application-layer threats before cyberattackers can exploit them, Veracode helps enterprises speed their innovations to market — without compromising security.

Veracode’s powerful cloud-based platform, deep security expertise and systematic, policy-based approach provide enterprises with a simpler and more scalable way to reduce application-layer risk across their global software infrastructures.

Veracode serves hundreds of customers across a wide range of industries, including nearly one-third of the Fortune 100, three of the top four U.S. commercial banks and more than 20 of Forbes’ 100 Most Valuable Brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter.

1Gartner, Inc. 2015 “Magic Quadrant for Application Security Testing” by Neil MacDonald, Joseph Feiman. August 10, 2015

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

CloudTweaks Comics
Smart Connected Cities Must Learn To Efficiently Collaborate

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart City Collaboration A study from research firm Gartner demonstrates how smart and connected cities require a large number of players to collaborate efficiently, in order to unlock the huge potential associated with cities of the future. The study focused on Europe and showed clearly how a number of Northern European and Scandinavian mid-size cities…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Comparing Cloud Hosting Services

Comparing Cloud Hosting Services

Cloud Hosting Services Cloud hosting service providers are abundant and varied, with typical structures affording the reliability of virtual partitions, drawing resources externally; secure data centers; scalability and flexibility not limited by physical constraints; pay-per-use costing; and responsive load balancing for changing demands. While high end (and high price) services offer an extensive range of…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…