Privileged Identity Management (PIM) is the lowest common denominator in today’s most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anthem, JP Morgan Chase, the city of San Francisco and many others succumbed to the reality that the identity of a single super-user account can be subverted for the purposes of manipulating sensitive organizational data, correspondence, commercial goods and intellectual property.
In the business world, it’s hard to throw a rock without hitting a compliance requirement. All must be obeyed, but some call for a high level of control and auditability. Governing bodies are exerting their authority like never before, increasing the number of auditors and handing out heavy fines – sometimes as much as $1 million.
This has become the new norm, and it isn’t likely to turn around any time soon. It’s important, then, to be aware of the primary threats that could undermine compliance efforts. The top three such issues are discussed below.
This is a no-hype, pragmatic post about why I think you should consider architecting your next project the way SOA and/or microservices suggest. No matter if it’s a greenfield approach or if you’re in dire need of refactoring. Please note: considering still keeps open the option of not taking that approach. After reading this, you will have a better idea about whether building multiple small components instead of a single, large component makes sense for your project.
This post assumes that you have experience with software architecture and services (you’ll find some words about my experience...
This complete kit provides a proven process and customizable documents that will help you evaluate rapid application delivery platforms and select the ideal partner for building mobile and web apps for your organization.
Monitoring of Docker environments is challenging. Why? Because each container typically runs a single process, has its own environment, utilizes virtual networks, or has various methods of managing storage. Traditional monitoring solutions take metrics from each server and applications they run. These servers and applications running on them are typically very static, with very long uptimes. Docker deployments are different: a set of containers may run many applications, all sharing the resources of one or more underlying hosts. It's not uncommon for Docker servers to run thousands of short-te...
Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting by reimagining positions across several dimensions. The unprecedented explosion of Big Data and cloud services is driving the development of new storage architectures to store the information produced by this web-scale trend. It is becoming increasingly clear that even a linear growth trajectory for storage is insufficient to deliver the quantity of storage needed for data produced by the Internet of Things. Current architectures have bottlenecks t...
As good Venn diagrams always show it's the intersection areas that offer the sweet spot for trends and markets, and an especially potent one is the intersection of Cloud computing, with the blockchain and also digital identity, particularly when considered within contexts such as Digital Democracy.
Given the diversity of each field alone there are multiple perspectives to this, more the start of a conversation rather than a definitive design.
Every time I call up any customer support and hear the familiar 'all our representatives are busy dealing with other customers,' that my call is very important to them and from the more technologically advanced ones that I am 'fourth in the queue and my approximate wait time is 23 minutes,' I wonder why can't they simply call me back when they are free? They already have my contact number. Some of them actually play some music while I wait - which is still better than those who actually take that opportunity to inform me about their new products.
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market.
In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions within your organization.
This is an unusual blog for me. Usually I talk about how organizations can more effectively leverage data and analytics to power their business. However, as I conduct more Big Data Vision Workshops, I have come to realize that a big part of the success of these engagements is the ability to “listen and comprehend.”
Here are some observations and tips for “listening and comprehending” more effectively. I’ve classified this as “facilitation” because I seek to “facilitate” a dialogue with the client where I can learn enough about the client’s business to help them build the right Big Data busine...
The development of your app isn’t something that happens overnight, but rather it is something that takes place over time and through multiple iterations. While you may have developed the framework for your app already, improving engagement and innovating to provide a better user experience is a completely different process. There are plenty of ways that you can improve user engagement, but these five strategies will help you improve your app while also reducing the risk that your “innovative” updates actually decrease user engagement.
No modern enterprise stands alone; each is dependent upon a network of trading partners to remain competitive in today’s global marketplace. But in most cases, the lack of business to business (B2B) integration is holding back efforts to evolve into a true digital business.
A high-performing supply chain is essentially a dynamic digital network, and every link in the supply chain is vital for business. But, remarkably, “over 50 percent of the information exchanged among business partners is still done so manually — not automatically — via email, phone calls and faxes.”1
Many enterprises are...
In the first part of this series, we discussed the evolution of Azure IaaS and role of Azure Resource Manager. The next installment of the series explains the key differences between Azure Service Management (ASM) and Azure Resource Management (ARM) models. We will also take a look at key concepts and terminology related to ARM.
ASM or ARM?
One of the key tenets of cloud, especially infrastructure services, is programmability. Almost every cloud provider exposes a set of APIs to manipulate the virtual infrastructure programmatically. Even before the Cloud Computing term became a buzzword, Am...
Competitors can't compete, and leaders can't lead if they don't know the rules of the game. Understanding how points are scored, and what is required to win is key to any competition. In the age of digital transformation there are key rules to learn:
Data is the modern commercial battlefield
Information dominance is the strategic goal
Join Us at the Santa Clara Convention Center in New York, Santa Clara, November 1-3
Cloud computing software is eating the world, and each day is bringing new developments in this world.
Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and Infrastructure as a Service.
Big Data | Analytics and the emerging Internet of Things (IoT) are driving exponentially increased demands on datacenters and developers alike, as we cross the zettabyte horizon this year.
Containers and microservices are now part of every PaaS conversation, and IaaS providers are increasingly competing for platform customers.
WebRTC continues to reform web communications, and DevOps is pushing its way into an enterprise IT world that is increasingly agile, lean, and continuous.
Through all this, Cloud Expo remains the single independent event where delegates and technology vendors can meet to experience and discuss the entire world of the cloud.
Only Cloud Expo brings together all this in a single location:
• Cloud Computing
• Big Data | Analytics
• Internet of Things
• Containers | Microservices
Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.
Cloud Expo offers the world's most comprehensive selection of technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies.
The floor also features a Demo Theater that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.
Attend Cloud Expo. Create your own custom experience. Learn the latest from the world's best technologists. Talk to the vendors you are considering, and put them to the test.