Stop using software


Wayne Williams

24 Feb, 2020

We all love free software – the joy of discovering a great new program, the satisfaction of a successful installation – but that doesn’t mean we have to rely on it completely.

Thanks to ever-faster broadband connections and cross-platform web technology such as HTML5, it’s now possible to perform an increasing number of previously PC-based tasks without needing to download and install bloated and slow desktop programs. Not only does this save you time and storage space, but it also means you can avoid bundled junk and potential malware threats. 

In this feature, we look at the latest free web-based alternatives to traditional software that let you do everything in the cloud. From security scanners and office tools to image editors and messaging clients – with our recommendations, you can run everything in your browser from any device and it won’t cost you a penny!

Remove junk and free up space

CCleaner is an excellent if controversial (since it was purchased by Avast) system-cleaning tool, but you don’t need to install and download the program. CCleaner Cloud Free offers the same functionality, but runs in your web browser, which means you can completely avoid the bundled junk that plagues the desktop software.

This cloud service lets you manage and maintain up to three PCs remotely (including systems belonging to friends and family), and it can also clean every user profile on your PC, making it more thorough than the desktop version. Other features include the ability to remove junk files, disable unnecessary startup programs, repair Registry issues and defrag hard drives. 

You need to sign up with CCleaner Cloud and run the 14-day trial but, after that expires (no credit card details are required), you will automatically be switched to the free edition. This means losing some functionality, but it’s nothing to be too bothered about.

Software you no longer need: 

CCleaner, BleachBit

Zip and unzip files

Windows comes with built-in zip support, allowing you to compress files and open archives directly in the operating system without needing to install any software. However, it’s not the most elegant of solutions, which is why most people prefer to install a third-party program such as 7-Zip instead. 

An even smarter option, which doesn’t require installation, is ezyZip. This online compression service can create zip files and open archives in a variety of compressed formats including ZIP, RAR, TAR, TGZ and JAR. Usefully, it can also convert one archive format into another – RAR to ZIP, for example – directly in your browser.

Software you no longer need: 

WinZip, WinRAR

Scan your PC for malware

If you suspect that your PC may have picked up some malware but your existing antivirus solution (assuming you have one installed) isn’t finding anything, you can use an online scanner to provide a second opinion, rather than downloading a second security tool that may cause clashes. 

F-Secure Online Scanner is one of the better options and promises to scan and clean your PC for free. To use it, click the blue ‘Run now’ button and it will save a small file to your desktop. Launch this to open the online scanner and click the ‘Accept and scan’ button. This will set up the scanner so it can begin checking for harmful items.

If you don’t want to download anything at all, you can use Chrome to look for malware on your PC. Type chrome://settings/cleanup in the address bar and press Enter. Click the blue Find button and it will begin to look for potential threats. Chrome displays a spinning circle during the process – you don’t get any idea of the progress – so be patient and it will eventually report back with its findings.

Software you no longer need: 

AVG Free Antivirus,

Avast Free Antivirus

Scan suspicious files for threats

The real-time protection offered by reputable antivirus software ensures you’re protected from most threats at all times but, if you’re careful and don’t visit bad sites, download suspect files, or blindly click on unknown email attachments, you may not need this level of security, especially as Windows 10 has Defender built-in.

Google’s VirusTotal service can help keep you safe by analysing suspicious downloads and potentially malicious websites. It uses more than 70 different antivirus engines including AVG, Bitdefender and Sophos. 

To scan an item from your hard drive, click the ‘Choose file’ button and navigate to it. The file will be uploaded to VirusTotal and scanned by all the engines, with the results displayed in your browser. To check a website, click the URL tab and enter the site address.

Software you no longer need: 

Malwarebytes

Q&A: UK Cloud Awards head judge Jez Back


Cloud Pro

24 Feb, 2020

For the past six years, the UK Cloud Awards has been celebrating the best and brightest of the cloud industry’s talent, looking at the projects, products and people that keep this fast-moving sector progressing at pace. 

In that time, the event has seen impressive entries from leading cloud vendors and startups alike, including the likes of Red Hat, Oracle NetSuite, Dropbox and more, with an even more expansive list of entrants expected for this year’s ceremony. The man with the unenviable task of overseeing the selection process to determine a shortlist from all these nominations is Jez Back, who returns as head judge for the second year in a row.  

We sat down with Back to get the low-down on everything you need to know about the UK Cloud Awards, as well as his thoughts on the broader cloud industry.

Please could you tell us a little bit more about who you are and what you do?

I like to describe my situation as having three jobs. I am the Managing Director of Erebus Digital; we’re a small, boutique consultancy that focuses on client business outcomes using technology. Erebus Digital offers 3 main strands in its portfolio; Digital Transformation, Technology Cost Optimisation and Digital Design Services.

My second job is as a board director for a Rugby Club where I lead the strategy, marketing and communications teams. Finally, I am the head judge for the UK Cloud Awards! I often remind myself that I have a family as well.

How would you describe the UK Cloud Awards in three words?

Credibility with Integrity.

This is now your second year as head judge – congratulations and welcome back! What made you want to do it all over again?

Getting to see what people are doing in the market, hearing their stories and seeing how positive outcomes occur is something I really enjoy, so it was a bit of a no-brainer to come back.

I also get to work with some of the brightest and best our industry has to offer as my colleagues on the judging panel. I come away knowing a little more every time I have a conversation with any of them – that’s another great reason.

Finally, to work with my colleagues in the Cloud Industry Forum & Dennis Publishing to promote what our country has to offer in the cloud market is a great privilege and one I take really seriously.

You bring a great breadth and depth of experience to the judging panel in your role, what are you most looking forward to about this year’s awards?

The stories that people have to share. I love to see a great story on how positive outcomes for clients are achieved when I read the entries. I love to see old friends in the industry and make new ones at the awards night as I discover what they have been doing, too. Essentially, it’s the people!

This year’s awards have had a bit of a makeover, with new categories and some other tweaks. Can you share details of the key changes and why they’ve been made?

Obviously, there has been a bit of a shift and I think it very much reflects an outlook that I discussed earlier. It is much more about outcomes and less about the products themselves. That’s why we have reduced the number of product categories and have increased the number of project ones, whilst also adding new people awards.

Given those tweaks, what advice would you give to a) those entering for the first time and b) those returning for another year either to maintain their crown or win one of the accolades for the first time?

I would give three main pieces of advice. Firstly, read the entry criteria carefully. Judges want to give the points but often entrants lose them but simply not answering all of the criteria in the entry. Secondly, provide evidence in everything you say for the entry, backed up with client testimonial. That gives your entry more credibility. Finally, don’t sell the product or service to us by adding marketing brochures – sell the product and service through the stories and outcomes in the entry!

When you’re reading through an entry, what are looking for and is there anything that will really pique your interest?

It is always about the tangible outcomes; that’s what I enjoy the most. The stories of positivity that are backed up with testimonials or delighted customers.

What would you say to those thinking about entering but haven’t fully decided to do so as yet?

Do it – celebrate the achievements of you and your teams, and tell the world about the difference you make.

Do you have a category that is particularly close to your heart?

It has to be the People category, seeing what achievements they’ve made and celebrating them is a major reason why I love being Head Judge.

We’re now in 2020 – how do you think the cloud landscape has changed since the beginning of the decade? What are the key trends and challenges that remain front of mind for you?

Wow, this is a big question and one I could talk for hours on. For me, I would summarise the change in two main areas. Firstly, the evolution and maturation of many of the major providers in the cloud market – look at Microsoft’s transformation as a really obvious example. Second, the acceleration of business value that has come from cloud to businesses both big and small.

That means that the key trends and challenges that lie ahead for the industry will be to tackle the question of cloud security once and for all; it truly bothers me that those perceptions still exist. I also see the major providers doing a lot more co-operation and alliances as the service offerings seek to become more powerful. I’m seeing an increased demand for Cost Management and Optimisation for spend in cloud, especially in manging compliance spend in software licencing in Hybrid and Multi-Cloud. There are more, but these are the ones that are forefront in my mind.

Do you have a standout cloud moment from 2019?

Clearly, it has to be being the head judge for last year’s UK Cloud Awards!

What are your top 3 cloud predictions for 2020?

Cost optimisation will become more important, the major providers will do more alliances and partnerships and finally, Service Meshes will become the next battleground.

Is there anything else you would like to add?

If you’ve got a cloud achievement that you want to celebrate, submit your entry today!

DataOps preparation: It’s time to get your data out of silos and into the action

Are you facing pressure to make better decisions, faster? Are you uneasy about making too many gut-level business decisions? Are you being asked to have a data strategy and wondering how to compete in a data-driven world?

You are not alone. These are common themes emerging in today’s digital economy. Customers of all kinds – from consumers to enterprise businesses – have greater and greater choices than ever before. That means your customers are demanding more service, faster, and at a higher quality. How you decide to meet these needs is becoming very complex. You need to choose among many competing options. Increasingly, making these decisions by trusting your gut is a recipe for disaster.

These difficult decisions are not made any easier with the rise of SaaS. While it’s easy to get up and going with SaaS offerings to handle business productivity needs, with every new SaaS offering you use, you end up siloing your data even more. Every department, every business function, has multiple data silos that make holistic business analysis an uphill climb. How can you tie together customer satisfaction and operations data, if the data is in two different systems?

We know this is a common problem, because we hear it over and over again from our customers. We continue to hear about this problem, despite the relative maturity of “big data” systems. If big data has been a thing for at least two decades, why are we still struggling to make sense of it all? Our diagnosis is pretty simple:

  • Data projects that lack a business goal will fail, and most data projects lack a clear business goal, such as 'increasing customer satisfaction'
  • It's hard to find people to do the hard work of connecting systems and pulling data out

So, despite fantastic big data ecosystems being widely available, if you lack a clear business objective and you can’t assign people to roll up their sleeves and move data to where it needs to be, then unfortunately your data initiative will die on the vine.

Here’s what I recommend:

  • Start with a business goal and never put it on the back burner. Listen for and capture business objectives from your team, and hang onto them tightly, while allowing flexibility when it comes to implementation details
  • Implement DataOps best-practices. We recommend a serverless option, which would allow you to scale to dozens or hundreds of data sources painlessly
  • Connect key data sources out-of-the-gate, such as Salesforce, logs and customer data, or whatever you have identified to support your business use-case
  • Finally, make your analytics production-ready and share the good news around your organisation

These are a number of benefits to this approach. Where before you were trusting your gut, now you have real, relevant, current data to support your decision making. You’re not driving blind. Also, since you implemented a best-practices data catalog, you have a crystal-clear picture of how your data got to its end state. You are not questioning “Is this data real?” because you have clear traceability of data from source to metrics.

Also, your analysis gets better with more data sources. Now that you have a central data lake with easy-to-replicate patterns for bringing in new data, you can make your analyses even richer by adding more sources. Many of our customers enrich their data with a wide variety of internal sources, and even external sources like weather and macroeconomic data, to find new correlations and trends that were not possible before.

It’s also beneficial that you’re feeding a culture of DataOps. Word will get around that your team has the ability to drastically simplify data access and analysis because your DataOps foundation comes with commonsense access rules right out of the box. It is not a threat to give access to the right people – it will help your business operate. This tends to have a flywheel effect. Other departments get excited and want to add their data, analyses get better and richer, then even more people want to bring in their data.

To top it off, you are now AI-ready. If all the analytical benefits were not enough, you are now also ready for AI and ML. It’s just not possible to perform any kind of AI with messy data. With DataOps, you have solved two problems at once: you have action-ready business data, and you have cleared the path for repeatable AI projects.

https://www.cybersecuritycloudexpo.com/wp-content/uploads/2018/09/cyber-security-world-series-1.pngInterested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.

Don’t expect AI software companies to gobble up revenues SaaS-style, warns a16z

The potential of artificial intelligence (AI) revolutionising software is evident, from creating new data models to the improved insights gleamed from the data provided. If you’re a business intelligence (BI) vendor and you are not exploring AI or machine learning in some capacity, for instance, then there is a real danger of missing the boat.

But if you’re expecting AI software companies to eat up recurring revenues like their cloudy, SaaS-y predecessors, then think again.

Martin Casado and Matt Bornstein, of venture capital firm Andreessen Horowitz (a16z), argue that lower gross margins, scaling challenges and weaker defensive capabilities mean AI businesses are not going to resemble traditional software companies going forward. What’s more, the mix means AI companies will more closely resemble services-oriented businesses.

One key area of definition is around cloud infrastructure costs. While SaaS providers are among the many businesses who are likely to use a hyperscaler or other cloud provider, companies focusing on AI software will have much more complex – and subsequently expensive – demands, from training models, to inference, to the rich media being used.

Nascency is also a concern, a16z note. “We’ve had AI companies tell us that cloud operations can be more complex and costly than traditional approaches, particularly because there aren’t good tools to scale AI models globally,” Casado and Bornstein wrote. “As a result, some AI companies have to routinely transfer trained models across cloud regions – racking up big ingress and egress costs – to improve reliability, latency, and compliance.”

As a result, this chunk of cost could put an immediate stop to thoughts of gross margins in the 60%-80% range, with sights lowered to 30%-50%, with scaling ‘linear at best’, rather than supersized. But there are other reasons to consider.

The human factor is an important point to consider, a16z noted. Take the example of the largest social media companies hiring thousands of human moderators to help the AI-based systems. This is not to mention the continually iterative process of training models, securing new training data, and then feeding that back into the systems. The need for human intervention will decline going forwards, but Casado and Bornstein wrote that ‘it’s unlikely that humans will be cut out of the loop entirely.’

Putting together a strong defensive moat, as a16z calls it, is more difficult than it seems. SaaS companies can do so by owning the intellectual property generated by their work, such as the source code. Open source providers have, as the past year has shown, come into problems with their differentiated approach. Yet for AI companies, reference implementations are available from open source libraries, while a lot of the groundwork is conducted in academia. Ultimately, it comes down to who owns the data; in this instance, it is the customer, or in the public domain.

The future of enterprise software is a fascinating one with the emergence of various technologies. In 2018, venture capital fund Work-Bench explored how AI was being incorporated, again noting the roadblock between the academic work being undertaken and the business models being plugged into it. “Despite hopeful promise, startups racing to democratise AI are finding themselves stuck between open source and a cloud place,” the report noted.

While stressing caution, Casado and Bornstein are overall optimistic, so long as AI companies heed the warning signs. “Things like variable costs, scaling dynamics, and defensive moats are ultimately determined by markets – not individual companies,” they wrote. “The fact that we’re seeing unfamiliar patterns in the data suggests AI companies are truly something new.

“There are already a number of great companies who have built products with consistently strong performance.”

You can read the full a16z analysis here.

Editor's note: You can read more news on artificial intelligence, machine learning, deep learning and more at our industry-specific sister publication, AI News.

https://www.cybersecuritycloudexpo.com/wp-content/uploads/2018/09/cyber-security-world-series-1.pngInterested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.

Microsoft touts ‘enhanced AI’ features for Dynamics 365


Keumars Afifi-Sabet

21 Feb, 2020

Microsoft has unveiled an operations-centric module for its Dynamics 365 suite of enterprise resource planning (ERP) and customer relationship management (CRM) applications, on top of enhanced AI capabilities.

Customers are being promised smarter AI-powered business insights in 2020, with additional technology powering new features such as forecasting in Dynamics 365’s Sales and Finance Insights apps. A preview for these features is expected to be released in May.

This is included in a package of 400 new and updated features set to be rolled out over the course of this year as part of Microsoft’s 2020 release wave 1, which spans features touted to be released from April through September.

The Dynamics 365 Project Operations tool, slated for an October 2020 release, is being launched to support project-oriented teams managing data across different data silos to stitch their systems together.

The application connects cross-functional project teams, with Microsoft claiming that it offers the visibility needed to reduce the barriers to efficient working that currently exist.

“The predictive forecasting capabilities enable the proactive decision-making needed to meet sales goals,” Microsoft’s president for business applications James Phillips said, of the suite’s enhanced AI capabilities.

“Dynamics 365 does this by extracting patterns from customer relationship management (CRM) data, current and historical leads, won or lost opportunities, contacts, accounts, customer interactions such as emails and calls, and more data sources, and then projecting these patterns into the future.”

Updates to Microsoft’s customer data platform, meanwhile, aim to help organisations struggling to give their customers a personalised experience. These struggles are largely attributable to disconnected systems and data silos that can’t join together to give a holistic view of the customer journey across websites, purchases, service calls, and app usage.

The company is introducing first and third-party data connections to enrich customer profiles, that can be updated in real-time. These will be laced with insights from third-party data sources, including demographics and personal interest, in order to generate a rich picture of organisations’ customers.

Microsoft is also expanding the availability of customer insights to government cloud computing environments in order to improve the ‘citizen experience’, meaning public sector customers can better interact with employees and citizens.

UK among countries most likely to encounter cloud attacks


Sabina Weston

21 Feb, 2020

The UK is among the most cloud insecure countries in Europe, according to a new survey conducted by Specops Software.

Nonetheless, it is still among the European countries least likely to encounter ransomware attacks and cryptocurrency mining, at 3.82%, making it the 16th most cyber-secure country in Europe – out of the 32 which took part in the study.

Specops’ survey measured European citizens’ cyber security by analysing the percentage of cloud provider attacks on Azure and the monthly percentage of machines that encountered cryptocurrency mining, malware and ransomware attacks to determine who is the most cyber-insecure.

The study found that machines in the Netherlands were most likely to encounter cyber-crimes via the cloud, with 16.28% of Azure accounts in the Netherlands having faced attacks.

Despite being one of the countries least likely to encounter ransomware attacks and cryptocurrency mining, it was still named the most cyber insecure country (17.64%) in Europe, alongside Bulgaria, Belarus, and Ukraine. Specops also revealed that one in ten (10.17%) machines in Belarus encounter malware every month.

On the other side of the spectrum, Ireland, which is famously home to one of  Facebook’s major HQs, was the least likely to experience cyber-crimes – at 1.08%.

Other cyber-secure countries include Norway, Denmark, Switzerland, and Iceland.

Microsoft has also recently conducted separate research into cyber threats in Ireland, revealing that 70% of large Irish firms have experienced problems with phishing, hacking, cyber-fraud, or other cyber-attacks.

Three in four (76%) of senior leaders in large Irish firms worried about digital threats, while only one in four are confident they can respond to any security incident effectively. This proves that, despite Ireland being supposedly the most cyber-secure country in Europe, senior leaders do not feel confident about their level of security.

Human error and misconfigurations primary source of Kubernetes security snafus, report says

StackRox, a provider of cloud-native, container and Kubernetes security, warned in its previous report that the security implications for Kubernetes were beginning to spill over to adoption – and the release of its updated winter study have proved the company right.

The paper, the winter edition of its State of Container and Kubernetes Security Report, was put together alongside 451 Research and polled more than 500 industry professionals.

94% of those polled said they had experienced security incidents in their container environments during the previous 12 months. As is frequently the case with other cloud security snafus, human error – in this case misconfigured containers – can be found as a root cause, a trend which StackRox said was ‘alarmingly common.’

More than two thirds (69%) of those polled said they had experienced a misconfiguration incident; just over a quarter (27%) found a security incident during runtime, with a similar number (24%0 having a major vulnerability to remediate.

86% of respondents said they were running containerised applications in Kubernetes – the same number as in the spring survey. However, the way Kubernetes is being used is changing rapidly, as more organisations put trust in the hyperscalers managing their workloads. Just over a third (35%) of respondents said they manage Kubernetes directly today – down from 44% six months ago – with more respondents (37%) using Amazon EKS. More than one in five (21%) say they use Azure AKS and Google GKE, with both representing a significant increase from spring.

In a similar theme, maturation is increasing in terms of cloud-only environments. While hybrid deployments remain more popular – 46% compared to 40% for cloud-only – it represented a big drop from the 53% who cited it six months ago. For cloud-only, organisations remain predominantly trusting a single cloud, although multi-cloud deployments are becoming more popular.

The previous report, issued in July, gave more of a general warning on container security. Six months prior, two in three organisations said they had more than 10% of their applications containerised – yet two in five were concerned their container strategy did not sufficiently invest in security. This time around, only 28% of organisations polled said they had fewer than 10% of their containers running in production – down from 39% last time.

“One of the most consistent results we get on our own surveys of DevOps and cloud-native security technologies is how important security is for these environments,” said Fernando Montenegro, principal analyst at 451 Research. “It is interesting to see how this observation fits well with the StackRox study, highlighting the need for both engineering and security professionals to have visibility and properly deploy security controls and practices for container and Kubernetes environments.”

You can read the full report here (email required).

https://www.cybersecuritycloudexpo.com/wp-content/uploads/2018/09/cyber-security-world-series-1.pngInterested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.

Security versus productivity: Exploring the double-edged sword of the cloud

Adopting cloud technologies has become a common strategy among organisations across all sectors taking the road towards digital transformation. The benefits are evident: businesses that maximise all that the cloud has to offer often see a significant improvement in productivity.

However, the journey is not without its stumbling blocks and organisations that fail to prepare will all too often end up taking one step forward, two steps back. Migrating to the cloud presents an array of security and implementation risks which must be resolved if the technology is to be truly taken advantage of. The implementation of any new technology often presents plenty of bugs which must be dealt with. Ignore these issues, and businesses will find themselves falling foul of hackers who will capitalise on any chinks in an organisation’s armour. 

So, as organisations transition to the cloud, they face a number of strategic challenges. To what extent should they adopt hybrid multi-cloud technology platforms? How do they keep data safe? And how can they foster a progressive culture that enables them to maintain IT security and drive productivity?

Laying the groundwork

Incorporating any new technology should, of course, be preceded by a well thought out strategy. But businesses striving to gain a competitive edge by speeding up their digital transformation can be tempted into taking shortcuts when migrating to a new technology, and the process can become plagued with mistakes.

Failure to put a robust strategy in place can lead to devastating problems further down the line – a costly error which we’ve seen organisations make far too many times. It’s been reported that in January 2020 alone, 1.5 billion records were breached, highlighting the worrying scale of cyber attacks and data breaches impacting on businesses that continue to operate with a weak IT security infrastructure in place. 

The size of the organisation is immaterial. Attackers have become so sophisticated that no business can claim to be 100% safe. Retail has become one of the most targeted industry sectors, enticing cyber criminals with a rich pool of data where it's all too easy to identify individuals and their payment information. Moreover, what makes this scenario more complex is that retail is undergoing one of the greatest transformations it has experienced in decades. It’s never been more critical for organisations moving to the cloud to develop a robust and secure cloud strategy. 

Security by design

Regardless of size, all businesses need to appreciate that, despite their best efforts, their IT systems will never be entirely secure. As hackers and their methods evolve, organisations will need to stay one step ahead by constantly evaluating and improving security measures. This is only possible if organisations take a ‘security by design’ approach, instead of ‘by addition’. Retrofitting cybersecurity into systems is no longer a sufficient or effective way to operate and will hit an organisation’s back pocket just as hard as it hits its technology infrastructure. 

Since cybersecurity is mission critical, it stands to reason that businesses need to give it the attention, care and resource that it warrants. This means clarifying the separation of layers and functions. In the case of WAN environments, the desired outcome is that they reinforce one another instead of masking blind spots or creating joints that are a point of weakness where threats can infiltrate essential systems. 

Culture: The glue that holds a security strategy together

The concept of a physical office or workspace as a perimeter to be protected is increasingly a thing of the past. Most organisations have capabilities to operate virtually and staff can now work from almost anywhere. And, while the cloud is mostly responsible for enabling these productivity benefits, it creates security threats too.

The reality is that human error is at the root of nearly one in five of data breaches; and whilst almost 75% of attacks are perpetrated from outside an organisation, more than one in four involved insiders. Employees are often the weakest links, and hackers are more than aware of this fact. Educating all colleagues, and not just senior management, about cybersecurity is therefore vital.

Nurturing a security culture across an entire organisation is paramount – if executed effectively, it will transform security from a one-time event and the responsibility of an IT team into being a positive part of the firm’s day to day operations and culture.

Just as organisations need to continuously evaluate the cybersecurity infrastructure in place, they also need to make employee education an ongoing priority. Helping employees to understand the implications of a cybersecurity attack will also highlight the importance of continuous diligence; after all, an organisation’s security will only ever be as strong as its weakest link.

It is only through unifying technology, culture and employees that an organisation’s critical data can remain safe. Succeed at this, and organisations will lay the right foundations in order to confidently explore all the advantages that the cloud has to offer.

https://www.cybersecuritycloudexpo.com/wp-content/uploads/2018/09/cyber-security-world-series-1.pngInterested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.

Google adds migration tools with Cornerstone acquisition


Bobby Hellard

20 Feb, 2020

Google has acquired a mainframe- and database-migration specialist as it continues to add tools to help enterprise customers move workloads to public clouds.

Dutch-based Cornerstone Technology provides tools and project-management services for application and database migration.

The firm will be incorporated into Google‘s mainframe-to-GCP service, which customers can access through its professional services and partner networks.

There are no details about the cost of the deal as yet, but the move is in keeping with the company’s enterprise strategy that focuses on helping its existing clients move their legacy workloads to the cloud.

“Easy mainframe migration will go a long way as Google attracts large enterprises to its cloud,” said Matt Eastwood, senior VP of enterprise infrastructure at IDC. “Google Cloud is listening to its customers and meeting them where they are, steadily improving its services and attracting businesses across industries.”

This is the second deal Google has announced in February after the firm’s $2.6bn acquisition of Looker, a service for data analytics for multi-cloud customers.

Moving mission-critical workloads to the cloud can be complex and the aim is for Cornerstone’s expertise and hands-on approach to slowly modernise customer stacks without the need to re-architect all of their legacy applications.

The company provides a migration roadmap which conducts a mainframe assessment to find a suitable path for upgrading. It also converts code languages and databases that help prepare applications for modern infrastructure, which also includes automated data migration.

“We’re migrating both our AS/400 and z/OS systems to more modern technologies like Java and SQL databases,” said Ricardo Orlando, CTO of Brazilian financial services company Boa Vista. “Google Cloud is helping us realise new revenue streams and more effectively deploy our resources.”

Google Cloud acquires Cornerstone to help customers migrate their mainframes

Google Cloud’s shopping list shows no signs of abating, with the company announcing the acquisition of Cornerstone Technology, a mainframe specialist.

The 30-year-old provider, based in the Netherlands, has an overall remit of ‘helping customers protect and improve their investments in essential legacy enterprise applications’, in Cornerstone’s own words. Cornerstone uses automation to break down programs, turn them into services, and then make them cloud-native.

This includes COBOL, which to the potential surprise of many is still used by many enterprises. A recent study from Micro Focus, the language’s arbiter, noted that for more than two thirds of businesses polled, COBOL app modernisation was a preferred strategy to replacement and retirement.

“As the industry increasingly builds applications as a set of services, many customers want to break their mainframe monolith programs into either Java monoliths or Java microservices,” wrote Howard Weale, Google Cloud director of transformation practice in a blog post. “This approach to application modernisation is at the heart of the Cornerstone toolset.”

Google Cloud made a spree of acquisitions in 2019 under the leadership of CEO Thomas Kurian. The standout deal was for business intelligence platform Looker in June, valued as a $2.6 billion all-cash transaction. Other deals were for data migration service provider Alooma in February, storage firm Elastifile in July, and VMware workload runner CloudSimple in November.

The acquisition of Cornerstone will, as the name suggests, form a significant chunk of Google’s ‘mainframe-to-Google-Cloud-Platform’ offerings.

“For decades, companies have relied on a mainframe architecture to run their mission-critical workloads, but it often holds developers back from taking advantage of new technologies that enable them to innovate more quickly,” explained Weale. “Cloud computing presents the opportunity to modernise your applications and your infrastructure, resulting in better capabilities and allocation of your resources so your organisation can focus on your core business.”

The obvious target for this acquisition is IBM, whose mainframe business remains significantly profitable. At the same time the Cornerstone acquisition dropped, this reporter received a separate communique from IBM which touted the company as a top three cloud vendor ‘far ahead’ of Google.

IBM cites Google’s eventual disclosure of its cloud revenues – $2.6bn for the most recent quarter, compared with IBM’s reported $6.8bn – as key. Yet measuring an apples-to-apples comparison across all services remains tricky. For cloud infrastructure services alone, according to figures from Synergy Research earlier this month, Google holds 8% of the market, compared with 6% for IBM.

Financial terms of the Cornerstone acquisition were not disclosed.

https://www.cybersecuritycloudexpo.com/wp-content/uploads/2018/09/cyber-security-world-series-1.pngInterested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.