Category Archives: Security

Utilizing RESTful APIs In The Cloud

Utilizing RESTful APIs In The Cloud Just like Cloud, RESTful APIs have provided a way for system architects to execute services which can seamlessly scale and have modular architecture, ease of integration and extensibility. RESTful APIs are the way to go when it comes to the Cloud because of their ability to deplete latency, security

Enterprise 3.0 From Puppet Labs: The Cloud Hits New Heights

Enterprise 3.0 From Puppet Labs: The Cloud Hits New Heights

Enterprise 3.0 From Puppet Labs: The Cloud Hits New Heights Cloud computing continues to reach greater and greater levels of sophistication and ability, and nowhere is this more apparent than in the remarkably agile world of Puppet Labs. This Portland-based company might not be a familiar name to the average consumer, but it is likely

The Cloud Brings New Meaning To Office Hours, Teacher-Student Collaboration

The Cloud Brings New Meaning To Office Hours, Teacher-Student Collaboration

The Cloud Brings New Meaning To Office Hours, Teacher-Student Collaboration Any of us who spent four years of our life navigating the challenges and intricacies of undergraduate life know that office hours, those precious few minutes of your professor’s undivided attention and assistance, are a particularly rare and in-demand resource.  Standing on a long line

Some Ideas On Optimizing Performance Of A Cloud Deployment

Some Ideas on Optimizing Performance of a Cloud Deployment Cloud is fast becoming one of the primary factors ushering a paradigm shift in technology and the way business is done. With Cloud penetration increasing and big enterprises making the move to the Cloud, there’s a growing discussion around optimizing performance of the infrastructure that powers

Threatening Skies: Cloud Computing And The Managed Service Provider

Threatening Skies: Cloud Computing And The Managed Service Provider

Threatening Skies: Cloud Computing And The Managed Service Provider Business is not easy. Just when you think you have the market figured out, and your business is growing nicely, another new threat comes onto the horizon. Many VARs and MSPs who built successful businesses implementing or hosting computing infrastructure are dealing with that threat today: