Category Archives: Security

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Evolution of Enterprise PaaS

Evolution of PaaS

New Technologies Evolving From Older Concepts Concepts of Platform as a Service (PaaS) originate from shared IT services (Shadow IT model), wherein multiple tenants run applications on shared systems (local data center, under your desk…. etc.). Over the recent years, Enterprise IT was understandably reluctant to provision business-critical applications on the cloud. Lately, I found Enterprise community…

Green Data Discussions At This Week’s Consumer Electronics Show (CES)

Green Data Discussions At This Week’s Consumer Electronics Show (CES)

The Node Pole Approaches Cloud Consumer Swedish data center & cloud computing cluster The Node Pole today announces the assignment of two new top-tier senior officers: Renowned innovation expert Karin Nilsdotter, as well as industrial process developer Josefin Hedberg are now onboard and will be talking green data at the International Consumer Electronics Show (CES)…

What Security Threats Should You Expect In 2016?

What Security Threats Should You Expect In 2016?

Security Threats In 2016 Chief Information Security Officers (CISOs) are at the cutting edge of cyber security and are often the first to know when a security breach has occurred. Their ability to stay one step ahead of any potential threats is crucial to their line of work, so it’s immensely valuable to take note…

Learning From Past Mistakes: Predictions For Cybersecurity In 2016

Learning From Past Mistakes: Predictions For Cybersecurity In 2016

Predictions Cybersecurity 2016 From Ashley Madison to the Office of Personnel Management (OPM), hackers did not discriminate between organizations or industries when it came to unleashing cyber-attacks in 2015. This past year, data breaches affected millions of people with headlines of a new hack appearing almost daily. On an individual level, customers’ passwords were compromised,…

Are You Sure You Are Ready For The Cloud? SDI

Are You Sure You Are Ready For The Cloud? SDI

Software Defined Infrastructure Well, we have come full circle with this string of subjects; about making sure you are ready for the cloud. We have talked security, storage, access, connectivity and feasibility to name a few. Now, lets discuss SDI. What is SDI? It simply stands for “Software Defined Infrastructure”. Many people have their own…

Disaster Recovery And Business Continuity In 2016

Disaster Recovery And Business Continuity In 2016

Preparing For Anything With 1,800,000,000 gigabytes of data created in the last year, the various causes of data loss and downtime such as human error, UPS failure, cyber-attacks, natural disasters, and IT equipment failure take on a great significance. Especially since most of these are entirely preventable. According to stats provided by SingleHop, 93% of…

Countdown To A Successful Cloud Migration

Countdown To A Successful Cloud Migration

Successful Cloud Migration The intrinsic benefits of the cloud such as rapid and affordable access to superior technology, reduced operational costs, and the lack of infrastructure overheads means organizations are moving, and will continue to move, from legacy to cloud environments. Though the service providers involved do their best to provide user-friendly products likely to…