Category Archives: Education

Cybersecurity Camps Teach Students How To Counter Online Threats

Cybersecurity Camps Teach Students How To Counter Online Threats

Cybersecurity Camps Teach Students

A US federal government cyber-security camp pilot program, launched recently to show students how to counter online security threats, has been hugely successful and could lead to an unprecedented increase in the number of people wanting to become computer scientists specializing in cyber-security.

The camps, launched in 2014 and which offer a new solution to this problem, were the brainchild of Steven La Fountain, dean of the College of Cyber at the National Security Agency. His idea  was not only to train people who would become part of a successful future cyber-security force, but also to improve teacher skills and inform civilians about what was required.

cybersecurity

(Image Source: Shutterstock)

The cyber-security camps, specifically, are a result of a program funded by the National Science Foundation (NCF) and National Security Agency (NSA), GenCyber, that have a mission to increase the body of cyber-security experts needed by both private companies and government agencies. These organizations maintain that by teaching young people about potential online threats at an early age, they will gain respect for online information and make sure that they don’t misuse it later in life.

Associated Press reported that hundreds of students in various parts of the USA would be participating in GenCyber camps in Vermont, South Dakota and southern California. This presumably means that the program is growing.

The first prototype camps were launched late 2014, and at the time the NSA stated it hoped that there would be an eventual “presence” in schools in all 50 American states. Today Josh Pauli, associate professor at Dakota State University, where 200 students are reportedly joining the program, said it was important for students to be “really cyber aware,” or at least “be ready for the next wave of the cybersecurity workforce.” He also said he believed around 200 students would enroll in the next summer program.

Last year (2014) the pilot program ran six camps. This summer the goal was 30, and according to LaFountain, already more than 43 camps have been held at a cost of $4 million. LaFountain initially nominated a goal of 200 camps by 2020, but now says he realizes that this will happen a lot sooner than anticipated.

CybercampAccording to Dr.Victor Piotrowski, lead program director of CyberCorps’ Scholarship for Service program that the NCF runs, every company now has cyber-security on its radar, and everyone wants to hire computer science specialists to deal with the problem. But, “unfortunately we don’t have the capacity.”

The camps are clearly a new way that could prove to be the answer to the need for more cyber-security specialists.

With the probability of cyber-attacks increasing worldwide, the Information Systems Audit and Control Association (ISACA) has warned that it is vital to prepare as best as possible. The problem, though is that there is a lack of “skilled talent,” says an ISACA report. A global survey indicates that 16 percent of IT and cyber-security managers think that at least 50 percent of the people who apply for jobs are qualified, another 53 percent say it takes on average three to six months to find applicants who fit the qualifications they require. In addition to this, there are many organizations that have very little confidence in the cyber-security abilities of their existing staff members.

attempts-security

The study reveals “a high-risk environment” that is made a lot worse by “a lack of skilled talent.” It seems that the biggest problem is a lack of ability to understand the business, followed by skills deficiencies in both communications and technical skills. Further, more than half (52 percent) of the IT managers responding to the study believed that not even a quarter of those applying for jobs were qualified.

This particular study also reported a large number of security breaches, most of which (33 percent) were considered to be the result of personal gain.

It is certainly clear that education is key, and that cyber-security camps have a vital role to play.

By Penny Swift

Considerations For Your Business’ Cloud Computing Plans

Considerations For Your Business’ Cloud Computing Plans

Your Business’ Cloud Computing Plans

While you can easily access your cloud data from any spot in the world, you must be rather cautious when using it within your business. You must keep your access plans for your cloud network in check so you will not be at risk of having your data becoming compromised at any point.

data-issue

  1. Manage your passwords the right way.

As useful as passwords can be for your cloud access needs, you must be careful when going anywhere with such passwords. In addition to having complicated or detailed passwords that are hard to predict, you must also use several passwords within your cloud. You can add different passwords for specific access points or even have different passwords for specific accounts that want to reach your cloud setup.

cloud_200

  1. Use a two-factor authentication plan.

A two-factor authentication plan can work by using two different steps in the login process. For example, you can start by working with a password. After that, you can enter in a particular PIN or other code that has been generated through something like a private email or text message. You could even use a fingerprint swipe if you’ve got a mobile device with a touchscreen and the capacity to read such a movement. Anything that adds an extra layer of authentication will always come in handy.

  1. Find the best possible encryption program for your cloud.

A good encryption program may help to scramble all data that is on you network while descrambling it when the right login standards are used. A quality 256-bit setup may be perfect for your security needs. This ensures that your data is protected and will only be read by those who have legitimately logged into your account. This is especially critical for businesses that might have sensitive bits of data on their cloud networks.

  1. Delete old files when you are done using them.

The access standards that you’ll use for individual files must be reviewed too. You must delete old files when you are done using them and you no longer have a need for them. This is to keep others who have access to your cloud setup from accessing data that may no longer be relevant or useful. While it is true that you will have an extensive amount of space to work with when storing things on the cloud, that does not mean that everything related to your business has to be there all the time.

  1. Watch for any automatic log-off features.

Try to find an automatic log-off feature on your cloud program. This feature will automatically sign a user off after the program interface or device is closed or turned off.

If this is utilized then the user will have to log back into the cloud program if the device is ever restarted or if the program was shut down or closed for any reason. This might sound inconvenient to some but it’s critical as it ensures that the program will not stay active even if it has been closed off. This is to reduce the potential for unauthorized users to get into your cloud system.

  1. Be selective about who you share your cloud access data with.

This sounds like a sensible rule of thumb but it’s one that must be emphasized. You must make sure you only share your cloud access data with those who are easy to trust and actually associated with your business. Don’t just go out there and give your cloud access information to anyone. Only let people within your business know how to log into your setup.

Your plans for cloud computing need to be explored with care. As great as it can be, you must make sure you are cautious when allowing people to access whatever you have on your cloud network.

By Sameer Bhatia

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud

Learn how to get to grips with cloud computing in business 

Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business. 

Any new technology can appear daunting, and cloud computing is no exception. There’s a lot to be learned about the Cloud, but understanding its basic principles is certainly doable, even if you’re not the most IT literate! Best of all, once you’ve figured out how the Cloud works, you’ll open up numerous possibilities that could ultimately lead you to a more efficient and profitable business.

cloud-teach

You’ll be pleased to know there are a wealth of resources available to help you along the way. Read on to learn how you too can become a cloud pro in just five easy steps!

  1. Read up online 

Several websites offer guides to the Cloud which will tell you all about the basics, as well as offering you a glossary of the sometimes-confusing cloud terminology. Guides such as these will tell you all you need to know to in the early stages, while this glossary will help with some of the tricky definitions.

  1. Experiment with free cloudware 

Now you understand the Cloud a little better, Readwrite suggests a good way of first experimenting with cloudware is to set up a Google Docs account. Using this platform, you can share and edit office applications in a live environment. This gives you a good, hands on introduction to how cloudware works on a practical level. What’s more, you don’t even need to download anything. The service is available online and all your data is there whenever you need it.

  1. Make the most of free trials 

Once you’ve played around with Google Docs for a while, it may be worth trying out different cloud products that you think could be useful for your business. You can download cloud-based tools that can assist with all parts of your business, including email platforms, office suites, project management software, accounting tools and pretty much anything else you can think of. Websites allow you to download free trials of their products without making a commitment straightaway; this allows you to see whether a new cloud-based system will indeed suit you and your business. Ultimately, free trials can even help you save money and crucial time adapting to the product in the future.

online-course-teach

  1. Sign up for an online course 

By now you should be fairly clued-up when it comes to working in the Cloud. But if you’d like to understand the intricacies even better, luckily for you, several websites offer courses on the cloud. Microsoft offer varying levels of private cloud training, as do Alison, as part of Amazon Web Services. At the end of the latter course you even get a qualification and will certainly be far more knowledgeable of how you can best utilise cloud systems within your business.

  1. Learn about more niche elements of cloud computing 

The great thing about cloud computing is that you can adopt as many or as few cloud systems as you want. But should you want to introduce more complicated software into your setup, you will need to undergo more in-depth training if you want to make the most of more specialised products.

There’s little reason not to expand your knowledge and discover how you could be using the latest cloud technology in your organization. You’ll soon find out that, when it comes to the Cloud, a little bit of knowledge goes a long way!

(Image Source: Shutterstock)

By Gary Gould

Are You SURE You Are Ready For The Cloud? Cloud Readiness

Are You SURE You Are Ready For The Cloud? Cloud Readiness

Cloud Readiness

Over the last three months, we have discussed the reasons why you may have wanted to move to the cloud.  Maybe the decision wasn’t yours to be made in the first place?  Either way, you are now getting ready to start down that road of cloud enlightenment!

cloud-prepare

(Image source: Shutterstock)

The question is, what is the first thing you should be in possession of when starting a cloud project?  The answer may or may not shock you, but it is knowledge.

cloud-provider-selection

Why would I say that?  Or maybe, knowledge of what might be the other question.  Having knowledge of what some specific terminologies are will help you get started, or truly understand what is happening.

Being thrust into a new model of operations based on virtual resources can be quite challenging.  The difference between vCPU and a physical CPU in a cloud environment needs to be understood.  Also, you have vRAM and physical RAM, along with its block storage use in a cloud management tool and what is presented at the physical level.

So, what is the number one thing I tell my clients before they get started?  It is a simple question, “Where is your test cloud?”  Not all clouds need to be hosted by third party companies.  You can have a test cloud setup with something as small as a single laptop, or two larger machines depending on the cloud management software and virtualization software that is used.

So you now have a test cloud, error free of course, so what are you going to do with it?  You will be running many different tasks, all based on using the full potential of the cloud management software you have chosen.  Let’s review a few tests that you should perform, so you get a better idea of the cloud and the cloud management software.

  • Create an Instance: This means spinning up a virtual device (server or desktop) and assigning resources to it (vCPU, vRAM, etc.…)
  • Destroying an Instance: This means deleting it from inside your management software and returning the resources it had allocated back to the overall pool.
  • If you have it available, try mounting shared/unshared volumes to an instance and then remove it. You can also try your hand at shared storage so you can create clusters in the cloud.
  • Create a virtual network, and assign subnets to it. Make sure your subnets have proper routing and each one has a default gateway.
  • Create projects/tenants within your software so you can create separation of data and groups based on name AND network.
  • Create users to take advantage or trying out various authentication and authorization modes. Are you going to connect your cloud to Microsoft AD or
  • Once you create a few instances, start monitoring them with software that will tell you its overall performance. You want to see how to refine the build process of the instance is so it will have the horsepower you need it to without having to redo the instances later when they hold data.

This is just getting ready for the cloud.  Again, all engineers MUST understand these principles, and managers SHOULD understand them.  Next month we will talk about what to do with your new knowledge of the cloud!

By Richard Thayer

Cloud Infographic – Advantages of Online Learning

Cloud Infographic – Advantages of Online Learning

Advantages of Online Learning

The explosive growth of Online learning, MOOCs and Nanodegrees is taking the world by storm. Based on a report by Docebo “E-Learning Market Trends & Forecast 2014 – 2016 Report”

  • The worldwide market for self-paced e-Learning reached $35.6 billion in 2011.
  • Expected revenues to reach $51.5 billion by 2016.

There is a great deal of potential for elearning startups to solidify their place in this burgeoning and exciting market. Below is an excellent infographic by skilledup which helps provide some insight into the required and expected technologies of tomorrow.

Online-Courses-Infographic

Making Technology Work In Elementary Schools

Making Technology Work In Elementary Schools

Making Technology Work

Since its invention, personal computer technology has radically changed classroom instruction. At the very least, teachers recognize that computer literacy is an essential skill for the 21st century, and so mandatory computer classes have been added to the middle- and high-school curriculum in schools across the country. Ideally, these classrooms employ 1:1 technology, giving each student his or her own computer to work with. But the potential benefits of computerized learning are not limited to computer literacy alone – digital resources can also be of help to students in areas as diverse as mathematics, foreign languages, and even social studies. At the same time, there are obvious drawbacks to giving each student a personal computer during class time. For today’s teachers, then, integrating 1:1 technology presents a serious challenge and an unprecedented opportunity. Nowhere is this more critical than in elementary schools. Just like foreign languages, computer skills are best learned at an early age; but increased screen time may detract from children’s learning of social skills and personal communication, which are traditionally among the main goals of elementary school education.

The Problems with Technology

elearningAny parent knows that problems can arise when young children spend too much time on a computer, tablet, or smartphone. For one thing, interacting with these devices is a physically passive activity: it requires very little movement. As a result, too much time with technology may mean too little time exercising and moving their bodies. This is unhealthy for a child’s developing body, and also may have detrimental psychological effects, leading to hyperactivity and irritability. Computer programs also stimulate the brain’s “reward” centers through bright colors, satisfying sounds, and constant movement. The possibility for instantaneous gratification is heightened with a computer, and so children may not learn the skills of patience and self-control. Children who spend too much time in front of a computer may grow accustomed to this instantaneous gratification, and may be easily bored or distracted as a result. Constant electronic stimulation can even have an addictive effect, leading children to neglect all other activities in favor of the computer. Finally, students sitting in front of a computer are probably not interacting with each other or with their teacher, which prevents the development of essential social skills.

The Benefits of Technology

On the other hand, there are plenty of reasons to be excited about the prospect of 1:1 technology in elementary school classrooms. The most obvious consideration here is that students enjoy learning this way. Although electronic stimulation is detrimental and potentially addictive in large doses, it is certainly very enjoyable! Because kids enjoy interacting with computers, they will be more motivated in their studies and more likely to continue learning outside of class. 1:1 technology also gives teachers the opportunity to personalize students’ assignments based on their own level of preparation. For example, a math app could be programmed to learn what tasks students have the most trouble with, and adapt itself to focus on those tasks. Or a social studies app could periodically quiz students on their knowledge of history, and automatically link back to information that was not retained, allowing for an automatic, tailor-made review session. The computer can, in some ways, act like a personal tutor for each student.

How to Capitalize on Technology

Is it possible to get the best of both worlds? Can a classroom be designed so that children get the benefits of technology without its risks? Perhaps. If such a system is to work, though, its approach will have to be:

  1. Balanced: Technology in a classroom is not a bad thing unless it becomes so dominant that it crowds out other activities such as exercise, personal interaction, and dealing with physical objects.
  1. Fun, but not too much fun: Obviously, school will be more productive if students enjoy learning than if they hate it. But students must also learn that not everything in life is fun, and sometimes they must patiently work through something difficult in order to reap the rewards at the end. Thus, computerized learning must not be too heavily dependent on games and other fun activities – challenging, even boring material is an essential part of the curriculum.
  1. Interactive: Even if each student has an individual computer, this does not necessarily mean that they are all working separately. Educational programs can be designed to be collaborative, with each student working on a separate terminal but contributing to a central project. Similarly, a teacher can easily sit with a student to explain the program individually, thus creating opportunities for direct personal communication.
  1. Personalized: Just as each student has different social skills and physical abilities, children differ in their ability to work with technology (and to cope with its detrimental effects). Thus, it is essential that teachers be attentive to their students’ individual needs and behavior, rather than relying on the computer as a “babysitter.” In short, the computer can only be a tool for teachers, not a replacement for teachers.

By Brent Anderson

Choosing A Cloud Hosting Provider With Confidence

Choosing A Cloud Hosting Provider With Confidence

Choosing a Cloud Hosting Provider

Since cloud computing hit the commercial market, cloud service providers have exploded in popularity, with a huge variety of different services each tailored to its own unique variety of client. For clients, though, this presents a challenge: how to find the right provider? Out of all the numerous options, which one is best for your business?

Of course, in order to answer that question, you first need to know what needs a cloud provider will serve. In other words, what is your unique set of priorities in making the selection? For most people, the primary benefit of cloud computing is that it reduces costs, and so price will be a prime consideration in choosing a service provider.

Free Report

Cloud Hosting Provider - Free Report!

Price, though, cannot be the only consideration. For some firms (those with a large quantity of data), size and efficiency are key. For others, the availability of customized service packages is important.

But the most important priority for any firm, and the one too often overlooked by smaller businesses, is security. Security in cloud computing is a serious matter, as cloud servers cannot be protected through traditional means (i.e. by maintaining direct control over the physical server). In order to choose a cloud provider effectively, managers and CIOs need to understand the security provisions of each provider – and this can be difficult, since so few people have a security background!

The problem is compounded by regulatory demands: if a firm is attacked through the cloud, it may be legally responsible for any damage or data loss that affects customers. For example, if customers’ credit cards are stolen from the cloud, the firm that stored them can be sued for enormous damages, unless adequate security measures were taken from the beginning. Failure to comply with these regulations places a firm at tremendous, and largely unnecessary, risk.

Key Industry Standards

Fortunately, there are a few key industry standards that even a non-expert can easily use to identify which providers meet at least the minimum security needs. SSL (Secure Socket Layer) is the industry standard security protocol that all cloud providers should offer. This protocol involves a complex exchange of private and public keys between the domain and the browser, in what security professionals call the “SSL handshake.” This handshake opens up a secure channel for data transfer, preventing third parties from intercepting, tampering, or eavesdropping.

In order to reach minimum industry standards for security, cloud providers should offer at least 128-bit SSL encryption (ideally 256-bit encryption), along with robust guarantees regarding the physical security of data centers.

If you can follow these guidelines in choosing a cloud provider, you can minimize your risk of data loss, theft, or online attacks, and thus serve your customers better while ensuring regulatory compliance.

Contact CloudTweaks for more information on our consulting services and whitepaper listing opportunities.

By Brent Anderson

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market 

We’ve talked a fair bit about e-Learning and MOOCs (Massive Open Online Courses) technologies here on CloudTweaks over the past number of years. The industry is expected to continue to grow at a brisk pace as more and more firms and educational institutions start to adopt cloud based services.  Docebo has an excellent PDF report from last year for those who may have missed it outlining some of the major e-learning providers.

What Are The Cloud Benefits?

Cloud computing provides a low cost solution to academic institutions for their researchers, faculty and students. Some of the key benefits are:

  • Cloud provides QoS-guaranteed infrastructures, e.g., time, cost, reliability, and hardware performance like CPU bandwidth and memory size, and sustains SLA-oriented resource allocation.
  • Cloud provides the support for variety of applications, making it convenient and rapid to get the required computation and storage resources.
  • Through the automatic resource management, emergencies can be solved rapidly, and labour-intensive jobs can be achieved.

Infographic source: Docebo

e-learning

CloudTweaks Comics
Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

The CloudTweaks Archive - Posted by
Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…