Parallels RAS Selected as Finalist for the 2015 Stratus Awards

Featured image courtesy of the Business Intelligence Group. Parallels, a leading provider of virtual desktop and application delivery, is pleased to announce that the company’s virtualization product, Parallels Remote Application Server (RAS), has been selected as the finalist for the 2015 Stratus Awards for cloud computing by the Business Intelligence Group. Business Intelligence Group offers […]

The post Parallels RAS Selected as Finalist for the 2015 Stratus Awards appeared first on Parallels Blog.

Public and Private Cloud Platforms | @CloudExpo #Cloud #BigData #IoT #API

For the past few years, enterprises have grappled with the personal cloud dilemma: “Should we use private or public cloud?” To some degree this has moved beyond a binary, either-or decision and now many enterprises are using both, but the question still remains on a per-workload basis: “Should I run this workload on public or private cloud?”
To help enterprises weigh up the pros and cons of public and private clouds it’s useful to find comparable attributes and to consider their pros and cons. The original five cloud characteristics, as stated by the National Institute of Standards and Technology (NIST), are a great starting point for such a comparison

read more

Disruption Day – the Skills Revolution By @DinkoEror | @CloudExpo #Cloud

In my last post I discussed where to start when it comes to addressing the software-driven enterprise challenge head on as we see each industry’s “disruption day” draw closer. In my view, perhaps the biggest challenge for the established players of the day – in the industrial revolution it was the cottage industries, today it is the incumbents in virtually every market – is one of change management, and the skills required in the new world order.

read more

IoT for the Enterprise By @ChrisFleck | @ThingsExpo #IoT #M2M #API #InternetOfThings

Many of the early examples tend to highlight smart cities or home automation. For most enterprises, however, the ability to connect and integrate everything together can solve current problems and open up new opportunities.
Most enterprises have complex combinations of legacy systems, SaaS services, thousands of devices, multiple locations and unending new requirements from business leaders looking to expand revenues or cut costs. Having the ability to integrate and connect all these systems, services, people and things into automated workflows can make a lot of sense.

read more

JFrog Artifactory 4 From @JFrog | @DevOpsSummit #DevOps #Docker #API

JFrog has announced a powerful technology for managing software packages from development into production. JFrog Artifactory 4 represents disruptive innovation in its groundbreaking ability to help development and DevOps teams deliver increasingly complex solutions on ever-shorter deadlines across multiple platforms
JFrog Artifactory 4 establishes a new category – the Universal Artifact Repository – that reflects JFrog’s unique commitment to enable faster software releases through the first platform-agnostic approach to storing and sharing binary artifacts.

read more

What Does an SLA Mean to You? | @DevOpsSummit #DevOps #SLA #ContinuousDelivery

Even though you are running an agile development process, that doesn’t necessarily mean that your performance testing is being conducted in a truly agile way. Saving performance testing for a “final sprint” before release still treats it like a waterfall development step, with all the cost and risk that comes with that. In this post, we will show you how to make load testing happen early and often by putting SLAs on the agile task board.

read more

Unlocking the Software Driven Enterprise | @CloudExpo #Cloud #BigData #IoT #API

Through this series I’ve considered the changes disruptive technology is having on traditional models, the routes businesses are taking to embrace transformation and the skills challenge they are facing as a result. It’s clearly a complex and all-encompassing challenge for business leaders, but here I try to boil it down to the five key things we talk to senior leaders in business about when considering their change; from legacy, to next-generation, software-defined businesses:

read more

The Next Evolution Beyond Today’s Cloud | @CloudExpo #Cloud #BigData #IoT

As businesses around the globe seek desperately to transform their business model and get them focused on increasing customer value, they need to rely on IT organizations, systems, and infrastructures that are specifically thought to delivery the tangible business benefits they desperately expect. Are CIOs and IT organizations aware of the business line expectations? Why the major IT vendors and consulting brands do not offer a model of the next IT organization? What is exactly the Complete ITaaS Delivery Model™? How CIOs can take advantage of it to meet business lines expectations are some of the key questions answered in this article.

read more

IBM launches Cloud Security Enforcer to counter employee data leakage failures

Security concept with padlock icon on digital screenIBM has created a Cloud Security Enforcer service to give companies a more commanding view of all third-party cloud apps used by their employees and new powers to secure them. The Enforcer aims to give companies more control over granting access to corporate data and applications.

Most companies can only see a fraction of the cloud applications used by their workforce, according to IBM’s research. An Ipsos poll, conducted on behalf of IBM in July, found that one-third of employees at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. These employees increasingly engage in risky practices on these tools, such as signing in with their personal email addresses, using weak passwords or re-using corporate log-in credentials, says IBM.

The cloud’s productivity dividend for companies is being undermined by the loss of control of corporate data and the lack of employee protection, it says. The Millennial generation (those born between 1982 and 2002) are the worst offenders and the biggest users of cloud apps, according to IBM’s study. By 2020 half the employees at Fortune 1000 companies will be millennials and of these 51 per cent use cloud services at work. One in four employees links these apps to his or her corporate log-in and password, leaving loopholes through which hackers can gain access to company networks.

Rogue activities on unsanctioned apps, known as ‘Shadow IT’, lead to a loss of control that IBM’s new cloud-based tool combats by scanning corporate networks, finding the apps that employees are using and providing a more secure way to access them. The system was built in partnership with file sharing app maker Box, which aims to strengthen the security of files shared over mobile devices and the web. IBM has also built secure connectors into Box’s file-sharing cloud app for Cloud Security Enforcer, as well as Microsoft Office 365, Google Apps and Salesforce with more apps connectors to be added to its catalogue.

The Cloud Enforcer users deep threat analytics from IBM X-Force Exchange, IBM’s global threat intelligence network, which is manned by a global network of security analysts which monitors the internet for malicious activity and analyses 20 billion global security events daily.

Apple allegedly planning to unify web services on Mesos open source infrastructure

Mesos logoNews of significant numbers of Apple device crashes have fuelled industry speculation that Apple is planning to unify its variety of online services into one open source system built on Mesos infrastructure software.

According to web site The Information Apple is recruiting open source engineers. The recruitment could support a strategy to pull all its web services, including iCloud and iTunes, out of their separate technical silos and looking to merge them into one cohesive whole. Apple is said to be concerned about the lack of interoperability between Apple’s online services.

The plan to run internet applications across an ‘orchestrated infrastructure’ could be disruptive in more ways than one, according to Quocirca analyst Clive Longbottom.

“It’s a good idea that would enable Apple to more closely integrate various capabilities and offer new services around search, buy and store function,” said Longbottom. “The two main problems are around migrating all existing services over, and in ensuring high availability for all services when they are all in the same basket.”

According to Reuters, significant numbers of Apple customers are reporting their mobile devices have crashed as they tried to upload the new iOS 9 operating system. This is the latest in a number of technical challenges Apple is facing as its cloud software portfolio becomes more ambitious and difficult to manage, according to Sergio Galindo, General Manager at developer GFI Software, “The rollout of iOS 9 is an ambitious project, particularly as Apple has maintained support for devices that are elderly, in smartphone terms. Devices such as the iPhone 4s are significantly different and underpowered compared to more recent iterations,” said Galindo.

According to GFI’s own research, Apple’s OS X and iOS were the software systems platforms with the most exploitable vulnerabilities, closely followed by the Linux kernel. iOS was found to have significantly more flaws than conventional desktop and server Windows installations.

“Software glitches, vulnerabilities and compatibility issues in an embedded device such as a phone create a challenging user experience,” said Galindo. “This is why testing of new updates before allowing users to update their phones and tablets is essential. Applied to a business context, it is important for IT departments to ensure users do not put their devices or the corporate network at risk.”