Guest Author


Latest from Guest Author

Ceph and Swift: Friends, not enemies

Most good rivalries begin with some sort of differences, and OpenStack developers are beginning to side with either Ceph or Swift when it comes to choosing a storage solutions. Ceph is a distributed object store and file system designed to provide highly scalable object block- and file-based storage under a unified system, excellent performance, reliability ...

The search for professional services collaboration “zen”

Communication, collaboration and clarity are prerequisites for business success. However, achieving a state of collaboration “zen” – in which a company communicates effectively internally and externally – requires rethinking the way we work. Consider: We live and work in the age of “information overload.” We read hundreds of emails a day on disparate devices, work ...

Privacy and security in the cloud : Fore-thought required

The benefits of migrating IT services to the cloud are well known and compelling, but many enterprises list privacy and security concerns as the number one reason to hesitate. Privacy and the cloud do not have to be conflicting goals. Here are four things companies should really focus on with respect to privacy and security ...

Getting serious about online security

Software developers and system administrators around the world are losing the equivalent of an arms race, trying to detect, fix, and shore up weaknesses exposed by numerous vulnerabilities such as the OpenSSL HeartBleed vulnerability. More than two months after HeartBleed was reported, it is estimated that more than 300,000 servers are still at risk. In ...

The Internet of Things needs a network of clouds

The confluence of social, mobile and cloud has created an “app-etite” for all things tech, laying the groundwork for the next big tech revolution: the Internet of Things (IoT). The IoT has the power to transform lowly mechanical and electronic devices into modern marvels, disrupting entire markets in the process. With disruption comes dollars. According ...

7 steps for moving apps from the data center to the cloud

It’s widely understood that cloud-based environments can bring significant benefits to enterprises including improved cost savings and business agility. In fact, 82 percent of US businesses reportedly saved money by moving workloads to the cloud last year. In its 2014 State of the Cloud report, RightScale reveals that enterprises are adopting cloud computing in record ...

Public clouds befuddled by SLAs? Nonsense!

Bert Latamore wrote recently on SiliconANGLE about Qubole’s Big Data as a Service (BDaaS) offering and echoed some points made by Jeff Kelly on Wikibon who wrote that “[t]he value proposition for Qubole is clear [and] the public cloud is indeed an attractive environment for data scientists and analysts looking to perform large-scale exploratory analytics”. ...

What do the Oculus Rift, self driving cars + the Cloud have in common?

Facebook surprised quite a few people when the tech giant purchased Oculus Rift for $2 billion. It wasn’t immediately clear to everyone why Facebook would make this acquisition. Valve, a popular SaaS gaming company, would have been the more logical choice to make such an acquisition. Gamers know and love Valve’s popular gaming platform and are anticipating their upcoming ...

Inevitably imperfect : Security through vulnerability management

The discovery of a flaw that allows would-be hackers to reuse old security tokens to to access Snapchat services and send bulk messages crippling user’s iPhones (AKA denial-of-service attacks) shows that security problems with Snapchat’s API run deeper than first thought. The flaw was discovered by security researcher Jaime Sanchez earlier this year and highlighted ...

How to communicate IT risk to the business

Managing risk is an essential component of any successful security program. But with the deluge of vulnerabilities discovered on a regular basis, it is a never-ending, uphill battle to mitigate all of the risk within an enterprise network or data center. Ironically, some organizations even shy away from scanning or patching critical data center applications and servers because ...