Why ParElastic Could Raise $5.7 Million

ParElastic Corporation has raised $5.7M in a Series A round financing led by General Catalyst Partners.  The company’s existing investors including Point Judith Capital, CommonAngels and LaunchCapital also participated in the round. The Series A brings ParElastic’s total financing to $8.7M. The ParElastic Database Virtualization Engine “dramatically increases the flexibility of your current relational database, improving performance and reliability while reducing storage and processing costs.”

Read more, watch a video, download a white paper here.

Space Monkey May Be Nearing Public Beta

Space Monkey, the Google-backed P2P start-up that intends to compete against Box and Dropbox not to mention the likes of Google Drive and SkyDrive, seems to be slowly pumping up publicity for its widget so maybe it’s getting close to its promised public beta if it can get the Kickstarter money to bring the thing to market.
Space Monkey aims to put a cloud in every house and says it’s “building a storage network the likes of which have never been seen.”
It involves a local storage device and a $10-a-month subscription for a terabyte of online storage, which is 10 times the storage you’d get from Dropbox for the same money.

read more

Cloud Expo New York: Secret Sauce for a Scalable Enterprise Cloud Model

AMAG Pharmaceuticals’ five-person IT team should bottle its secret sauce for a scalable enterprise cloud model. The public company eliminated its data center in 2008 and has since encouraged employees to adopt cloud applications as they see fit and ramped up security to make this possible – resulting in a reduction of over 60% in IT costs and much more productive (and happy) staffers.
In his session at the 12th International Cloud Expo, Nathan McBride, Vice President of IT and Chief Cloud Architect at AMAG Pharmaceuticals, will explain how enterprises can not only move to the cloud, but create a more productive workforce, sharing the security and infrastructure strategies necessary to do so successfully.

read more

Five Private Cloud Pitfalls

Private cloud may be the right choice for you, though it is not without its potential pitfalls.
There are many reasons to trust the private cloud – from reliability, to security and compliance, to predictability, private cloud can often be the best choice for a business.
But just because it’s private doesn’t mean it’s not susceptible to its own range of pitfalls. While the shortcomings of public cloud have been widely discussed, it’s important to note that private clouds, too, are associated with a range of potential pitfalls you ought to be aware of.

read more

Shadow IT – The Reality Is Here

A recent survey has shown that security policies and rules set down by IT departments are not just being ignored but having a bus driven through them by staff and senior executives, who wish to bring their own device to work so that they can do more, work smarter and be in touch all of the time.
The survey shows that almost three-quarters of respondents would not bet against their own organization having a data breach within the next 12 months.
This along with other responses shows that the IT Department of 2013 is a long way from the IT Department of just five years ago, where what they said may not have been liked but was generally adhered to and, if it was not, sanctions could come into effect.

read more

Cloud Expo New York: Getting the Most from Hadoop Development

The Hadoop framework and SSD technology augment cloud data systems ranging from analytics to on-line transaction processing (OLTP) to data warehousing. The resulting balance of processing, networking, SSD storage, and Hadoop optimization results in improving Big Data sort responsiveness from hours to minutes.
In his session at the 12th International Cloud Expo, Chris Black, a Data Center Solutions Architect at Intel, will review the background of Apache Hadoop, its application, and methods to accelerate data system clusters with Intel SSD technology. He will provide an overview of the genius of Hadoop and an overview of the ecosystem landscape, and discuss the best-known applications of SSD technology to development, real-time query, and main Hadoop clusters.

read more

NEC builds cloud presence in China

Japanese equipment vendor NEC this week signed a memorandum of understanding with Chongqing City, one of China’s four national central cities, with a view to forming a strategic partnership in the smart city and cloud service areas.

Chongqing is a major city in Southwest China with a population of 28.8 million and aims to shift its status from an industrial-oriented economy to a communications industry hub.

Cloud Computing Performance

“The cloud (whether public or private) is a strong driver of Big Data,” noted Michael Kopp, a technology strategist at Compuware, in this exclusive Q&A with Cloud Expo Conference Chair Jeremy Geelan. “A Cisco survey said that 4 out of 5 IT professionals stated that ‘all or some Big Data projects will require cloud computing capabilities.’”
Cloud Computing Journal: The move to cloud isn’t about saving money, it is about saving time. – Agree or disagree?
Michael Kopp: Agree – The move to cloud is about faster go-to-market, more flexibility, more agility and faster deployments. That being said Cloud costs can easily explode if not monitored and if applications are not specifically tuned toward cloud-based cost structures

read more

Cloud Security: From Hacking the Mainframe to Protecting Identity

By Andi Mann, Vice President, Strategic Solutions at CA

Cloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday lives, but with these new technologies comes new risks to the organization.

To understand how recent trends are shifting security, let’s revisit the golden age of hacking movies from the ‘80s and ‘90s. A recent post by Alexis Madrigal of The Atlantic sums up this era of Hollywood hackers by saying that “the mainframe was unhackable unless [the hackers] were in the room, in which case, it was simple.” That’s not far off from how IT security was structured in those years. Enterprises secured data by keeping everything inside a corporate firewall and only granting accessed to employees within the perimeter. Typically, the perimeter extended as far as the walls of the building.

When the cloud emerged on the scene, every IT professional said that it was too risky and introduced too many points of vulnerability. They weren’t wrong, but the advantages of the cloud, such as increased productivity, collaboration, and innovation, weren’t about to be ignored by the business. If the IT department just said no to cloud, the business could go elsewhere for their IT services – after all, the cloud doesn’t care who signs the checks. In fact, a recent survey revealed that in 60% of organizations, the business occasionally “circumvents IT and purchases technology on their own to support a project,” a practice commonly referred to as rogue IT, and another recent study found a direct correlation between rogue IT and data loss. This is obviously something that the IT department can’t ignore.

Identity is the New Perimeter

The proliferation of cloud connected devices and users accessing data from outside the firewall demands a shift in the way we secure data. Security is no longer about locking down the perimeter – it’s about understanding who is accessing the information and the data they’re allowed to access. IT needs to implement an identity-centric approach to secure data, but according to a recent Ponemon study, only 29% of organizations are confident that they can authenticate users in the cloud. At first glance, that appears to be a shockingly low number, but if you think about it, how do you verify identity? Usernames and passwords, while still the norm, are not sufficient to prove identity and sure, you can identify a device connected to the network, but can you verify the identity of the person using the device?

In a recent @CloudCommons tweetchat on cloud security, the issue of proving the identity of cloud users kept cropping up:

 Andi Mann

Today’s hackers don’t need to break into your data center to steal your data. They just need an access point and your username and password. That’s why identity and access management is such a critical component of IT security. New technologies are emerging to meet the security challenge, such as strong authentication software that analyzes risk and looks for irregularities when a user tries to access data. If a user tries to access data from a new device, the strong authentication software will recognize that it’s a new device and extra authentication flows kick in that require the user to further verify their identity.

What IT should be doing now to secure identity

To take advantage of cloud computing, mobility, and the Internet of Things in a secure way, the IT department needs to implement these types of new and innovative technologies that focus on verifying identity. In addition to implementing new technologies, the IT department needs to enact a broader cloud and mobile device strategy that puts the right policies and procedures in place and focuses on educating employees to minimize risk. Those in charge of IT security must also establish a trust framework that enforces how you identify, secure and authenticate new employees and devices.

Cloud computing, mobile devices, and the Internet of Things can’t be ignored by IT and the sooner a trust framework and a cloud security strategy is established, the sooner your organization can take advantage of new and innovative technologies, allowing the business to reap the benefits of cloud, mobile, and the Internet of Things, while keeping the data safe and sound. And to me, that sounds like a blockbuster for IT.

 

Andi Mann is vice president of Strategic Solutions at CA Technologies. With over 25 years’ experience across four continents, Andi has deep expertise of enterprise software on cloud, mainframe, midrange, server and desktop systems. Andi has worked within IT for global corporations, with software vendors, and as a leading industry analyst. He has been published in the New York Times, USA Today, Forbes, CIO, Wall Street Journal, and more, and has presented worldwide on virtualization, cloud, automation, and IT management. Andi is a co-author of the popular handbook, ‘Visible Ops – Private Cloud’, and the IT leader’s guide to business innovation, ‘The Innovative CIO’. He blogs at https://pleasediscuss.com/andimann and tweets as @AndiMann.

 

 

 

AppMesh Moves into Big Hole Salesforce Overlooked

AppMesh, a year-old start-up begun by Salesforce veterans, says it’s the first mobile-only CRM app built for sales reps.
The company has no interest in managers – well, at least not yet – only the under-served sales pro.
AppMesh claims to have what it calls a “post-cloud architecture,” an eye-catching way of saying the user can sync data across mobile devices using whatever connectivity’s available but stores all of the info on the device itself, no cloud needed.
Anyway, the widgetry integrates contextual awareness into core phone, calendar and e-mail applications for a unified always-available view of customer data and interactions. In other word, it’ll set user priorities.

read more