As an exhibitor at Cloud Expo New York, EMC Corporation is offering special passes to SYS-CON’s 10th International Cloud Expo, which will take place on June 11–14, 2012, at the Javits Center in New York City, New York.
EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset – information – in a more agile, trusted and cost-efficient way.
Archivo mensual: mayo 2012
Get Your Datacenter Cloud-Ready at Cloud Expo New York
With cloud computing strategies taking shape, IT is now facing the practical challenges of efficiently and safely delivering services from public clouds. Requirements include overcoming network incompatibilities, meeting security and compliance requirements and adhering to tight performance SLAs for cloud-delivered workloads.
In his session at the 10th International Cloud Expo, Craig Currim, Global Architect at Citrix Cloud Networking Group, will demonstrate an architecture to make your network cloud-ready and how to migrate applications to the cloud while protecting your data.
Four strategies for offshore development
Some people think that offshoring software development = outsourcing software development. That’s not the case. You have multiple options. Let’s talk about the main options and how they may or not make sense for you:
1) Outsourcing (Project Based) – If you may have peaks in valleys in your workload (e.g., you have a project that requires a boost in resources for a period of time) it doesn’t make sense to hire full-time staff to address a period of peak demand. In this model, you bid out your project to one or more software development outsourcing companies, and pick a winner.
This is what most people think you are talking about when it comes to doing software development offshore. It makes a lot of sense to outsource if you don’t feel that software development is a particular competence you need in house in your business. Or you …
Guest Post: Moving the Retail Core to the Cloud
24th May 2012
With customers taking charge of their retail experience and seeking the convenience of channel-agnostic shopping, to build and sustain customer loyalty in a tough economic environment, retailers must transform their siloed operations into a multi-channel set-up, as Associate VP for Retail at Infosys, Ramanan Ramakrishna explains.
Intel Cloud SSO Goes from Private Beta to Public
We’re happy to announce general availability of Intel Cloud SSO IAM-as-a-service today after running it in private beta mode for 2 months with select customers. See press release here. Intel has partnered with Salesforce to develop and run this application … Continue reading
CloudTip #15 – MEET Windows Azure
The Cloud comes in many flavors, types and shapes and the terminology can be daunting. You’ve got Public vs. Private. vs. Home grown. You’ve got compute, storage and database not to mention identity, caching, service bus and many more. Then there are the several players including Microsoft, Amazon, Rackspace, Force, and too many others to list them all
Cloud Storage Encryption and Healthcare Information Security
Healthcare data security has been around for a long time, but as cloud computing gains more and more traction, healthcare providers as well as healthcare software vendors, would like to use the cloud advantages and migrate healthcare data, or run healthcare software from a cloud infrastructure. In this blog I’ll focus on specific cloud computing healthcare security concerns and how cloud encryption can help meeting regulatory requirements.
The first step to securing healthcare data is to identify the type of healthcare information and the appropriate cloud storage for it. Visual healthcare data is mainly comprised of large media files such as x-ray, radiology, CT scans, and other types of video and imaging. Such files are often stored in distributed storage, such as Amazon Web Services S3 (Simple Storage Service), or Microsoft Azure blobs. Personally Identifiable Information (PII), such as patient records, is often stored in a relational database as structured data.
Cloud-Based Services Are Transforming Building Energy Management
Technologies that make buildings smarter and more energy efficient continue to evolve at a rapid pace, with new entrants and solutions announced every week. Many of the new products and services center on the big data that buildings produce in real time. Buildings have been producing volumes of information for many years, but today, according to a new white paper from Pike Research, many companies are starting to leverage the cloud as the basis for rich software-as-a-service (SaaS) offerings.
Virtually every leading name in the building services industry has recently launched some form of building energy management system that hosts and manages building data in the cloud, the cleantech market intelligence firm finds. The white paper, which includes 10 key trends to watch in the smart building market in 2012 and beyond, is available for free download on Pike Research’s website.
HP To Fire 27,000 by October ‘14
HP said Wednesday that it would lay off 8% of workforce, 27,000 people,
by October or 2014.
It figures the move will save it $3 billion-$3.5 billion and expects to re-
invest the money in cloud, security and Big Data.
Risk versus Threat
Many see the terms risk and threat as interchangeable. However in the simplest of terms, risk the probability or frequency of doing harm while threat is the actual or attempted infliction of that harm. Tomato, tomahto? It’s all about keeping your IT assets protected, right?
I was chatting with an IT professional about the benefits of cloud-based security and he kept referring to a recent risk assessment he performed. (And if you haven’t done this lately, you should) But what got the gears in my head turning is how interchangeably he used the terms “risk” and “threat.”
Now on the surface they seem like the same component of security management. I tend to disagree. In its simplest of terms, risk the probability or frequency of doing harm while threat is the actual or attempted infliction of that harm. Tomato, tomahto? Splitting hairs? It’s all about keeping your IT assets protected, right?