Many in the IT industry seem to enjoy arguing exactly what does and does not
constitute a cloud service. As I mentioned in my post on the controversy over
private cloud services, I do not feel that these arguments are productive. We
should focus on results and business value instead of arguing about
semantics. However, the current crop of cloud storage solutions have many
important differences from traditional SAN and NAS storage, something that
seems to surprise many end users I meet. Cloud storage capacity is not your
fathers blocks and files!
Primary, Secondary, and Tiered Storage
Most IT infrastructures contain a wide variety of storage devices, but these
have traditionally been divided into two categories:
Primary or production storage serves active applications and is accessed
randomly. The primary category includes most familiar direct-attached disks
(DAS), s... (more)
In a news release today, Gartner's Neil MacDonald, vice president and Gartner
fellow, says that while "virtualization is not inherently insecure ...
virtualized workloads are being deployed insecurely ... a result of the
immaturity of tools and processes and the limited training of staff,
resellers and consultants."
To improve authentication and access control in virtualized environments,
Likewise today announces a technology licensing agreement with VMware.
Neil MacDonald is quoted in that news release saying, ""Virtualization
platform vendors have realized the need to architec... (more)
Likewise takes the wraps off of its Enterprise 6 software with quite a few
performance improvements and two features, in particular, to call out - Smart
Card support and a command line (CLI) administration tool.
Likewise joins desktops and servers running Linux, Unix, and Mac OS to an
organization's existing network using Microsoft Active Directory (AD). This
provides a single, secure framework for authentication and access control in
These days, many enterprises - and especially government customers - are
turning to dual-factor authentication to further secure th... (more)
When it comes to security, the highest standard to date is the Payment Card
Industry Data Security Standard (PCI DSS), a set of requirements for
businesses that process payment card information.
Developed by Visa, American Express, Discover Financial Services, and other
members of the PCI Security Standards Council, the PCI DSS is a collection of
policies, procedures, and practices to protect customer account data. The
standard includes specific requirements for strictly controlling access to
customer data, authenticating business users, monitoring access, maintaining
a secure n... (more)
Andreessen Horowitz has a model I have not seen at any other Venture Capital
firm, and that model is paying off for a broad ecosystem of companies,
investors and enterprise IT professionals. From the standpoint of an
enterprise technologist, the payoff will come by their support of firms
fielding capabilities that will make a positive difference for organizations.
The best way to learn about their spirit and approach is to review the blogs
of their founders Marc Andreessen and Ben Horowitz. But the best way to
prepare yourself for coming distruption, in my opinion, is to dive right... (more)
Today, Windows Azure Infrastructure Services (IaaS), including Virtual
Machines and Virtual Networking, has reached general availability. These new
services make it possible for you to move your applications into the cloud as
This announcement is a significant step in our cloud computing strategy,
which has been influenced directly by our discussions with customers and
partners around the world. One point holds true in every one of our
discussions with you - the cloud should be an enabler for innovation, and an
extension of your organization’s IT fabric, not just a fancier w... (more)