So, in the wake of the OMB hack, the federal CIO (Tony Scott) has directed government agencies to get serious about cyber security. The “30-day sprint,” directs agencies to patch all known vulnerabilities; use information provided by Homeland Security to identify and mitigate known threats; limit the number of privileged users and tighten access controls; and “dramatically accelerate” the use of personal identity verification (PIV) cards and other forms of multifactor identification.
Todas las entradas hechas por Latest News from @CloudExpo
[video] Scalability in the Cloud with Charlie Fei | @CloudExpo @AICIncSolutions #Cloud
«AIC is a manufacturer of server products – server storage. With the onset of cloud computing we’re moving toward the full infrastructure solution, including storage nodes, compute nodes and networking,» explained Charlie Fei, product manager at AIC, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
AppZero to On-board Windows Server 2003 Apps to Microsoft Azure | @CloudExpo #Cloud
AppZero has announced availability of the AppZero Service Provider edition for Microsoft Azure (AppZero SP for Azure), a software-as-service (SaaS) portal for quickly moving Windows Server applications to Azure, including those running on Windows Server 2003, which reaches end of support today. Those wishing to try the service can log in at azure.appzero.com and move their first five enterprise applications to Azure at no cost. AppZero, which has added more than fifty new certified partners over the last year to assist customers with Windows Server 2003 planning and migration, also announced new 24/7 worldwide support and the opening of a new European office based in the Netherlands to help meet international demand. AppZero is already Microsoft Azure Certified and can be purchased and deployed from the Microsoft Azure Marketplace.
[slides] Powering a Cloud Economy By @Solgenia_Corp | @CloudExpo #Cloud
The Cloud industry has moved from being more than just being able to provide infrastructure and management services on the Cloud. Enter a new era of Cloud computing where monetization’s services through the Cloud are an essential piece of strategy to feed your organizations bottom-line, your revenue and Profitability.
In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed how to easily offer services such as Big Data Analytics, Enterprise Document management, Business Management and more through innovative options of monetizing the Cloud on a Consumption model. They also discussed how to manage quick provisioning, metering and billing of any service on the cloud through Solgenia’s latest offering, Powua.
Can You Build a Tech Startup with an Outsourced Workforce | @CloudExpo #Cloud
It is often regarded that the core component of a business should always be done in-house. This is not only because it is your intellectual property, but also because the learnings you gain from building the product will give direction to your business’ strategy in the long run. Given this, is it a good idea for a tech startup to outsource their development?
[slides] What, Why & How of IaaS & PaaS By @YungChou | @CloudExpo #Cloud
The essence of cloud computing is that all consumable IT resources are delivered as services.
In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transition into and take advantages of these emerging service models.
Unlike Ashley Madison, How to Avoid Baring It All By @IanKhanLive | @CloudExpo #Cloud
Today’s case of Ashley Madison getting hacked and literally being kept at ransom is a classic case of something not very new, but something we need to take a look at with a fresh set of eyes. It’s not all the trouble all their customers will get into that I’m talking about, but the mere corporate nightmare of having your entire customer data leaked. Today it’s one organization, who know is who is next tomorrow. Want to know how to avoid getting caught with your pants down? Read on.
Cloud Migration: From Monolith to Microservices | @CloudExpo #Microservices
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools.
A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or business processes it is used for.
Secure DevOps Automation for AWS From @PalerraInc | @DevOpsSummit #DevOps #Containers #Microservices
Palerra, the cloud security automation company, announced enhanced support for Amazon AWS, allowing IT security and DevOps teams to automate activity and configuration monitoring, anomaly detection, and orchestrated remediation, thereby meeting compliance mandates within complex infrastructure deployments.
«Monitoring and threat detection for AWS is a non-trivial task. While Amazon’s flexible environment facilitates successful DevOps implementations, it adds another layer, which can become a target for potential threats. What’s more, securing infrastructure and meeting compliance mandates is not all up to Amazon and should be a shared responsibility with the organization using it,» said Rohit Gupta, co-founder and CEO of Palerra. «We have supported AWS since day one and are thrilled to announce we are expanding our support to provide holistic visibility across complex AWS deployments consisting of diverse infrastructure resources globally.»
Docker Logentries Container | @DevOpsSummit #DevOps #Docker #Containers #Microservices
Logentries offers a variety of ways to get logs out of your containerized environment, including our Linux Agent, application plugin libraries, and Syslog. In this post we’ll cover collecting and forwarding logs via our Docker Logentries Container, which requires Docker 1.5 or higher.
To configure the Docker Logentries Container you’ll need to do the following:
Create a destination log in your Logentries account to record your Docker logs.