In case you missed it, the first phase of cloud computing has left the building. Thousands of companies are in the cloud. Practically all organizations regardless of size already have production applications in a public, off-premises cloud or a private cloud. Yep. Been there, done that.
And the vast majority of these applications use the classic “SaaS-style” public cloud model. Someone develops a useful service and hosts it on Amazon Web Services (AWS), Microsoft Azure, IBM Cloud Marketplace, Google Cloud Platform (GCP) or one of several other cloud vendors. Accessing this external service ...
Cloud security is at the top of every CIO’s list. It is also the first subject that comes up when you engage in a discussion about the cloud. For those of us who followed the recent Ashley Madison story (from a tech perspective), you would agree that while the breach happened for so many reasons, security is at the heart of it. Here are some key aspects for creating a solid organization, keeping cloud security in perspective.
Today’s business ecosystems span across multiple organizations, security perimeters and trust zones, increasing the number of attack vectors. With the migration of enterprise applications to the cloud, attack surfaces have expanded significantly. Compounding the problem, today’s wave of attacks are more sophisticated and diversified than ever. The combination of enterprise complexity and advanced attacks has broken the traditional enterprise perimeter, creating the perfect storm for threats and information loss, where a new security paradigm is needed.
While the Beatles may not have been too concerned about cloud uptime or network security when they wrote their famous ballad, they had the right idea about turning to friends for a helping hand. It’s a lesson CIOs should take to heart.
After all, the IT department – including network, systems, applications and database administrators – is often the eyes, ears and hands of the CIO, providing front-line information and making recommendations on the latest technology and IT methods to ensure that business is running at optimum efficiency and achieving competitive advantage through technology. ...
When it comes to how trends like Big Data, mobility, cloud computing and social networking have impacted organizations, it’s clear that it has led to a large shift that has paved the way for a new market of startups who boldly embrace these trends and other organizations who are still struggling to keep up. But these trends have only started to pave the way for what we might see in the next 10 years, and the future is exciting.
We’ve seen the impact the four tech mega trends; Big Data, Always-Connected Mobile Devices, Social Networking and Cloud Computing, have on the way organizations oper...
In his session at 17th Cloud Expo, Ernest Mueller, Product Manager at Idera, will explain the best practices and lessons learned for tracking and optimizing costs while delivering a cloud-hosted service. He will describe a DevOps approach where the applications and systems work together to track usage, model costs in a granular fashion, and make smart decisions at runtime to minimize costs.
The trickier parts covered include triggering off the right metrics; balancing resilience and redundancy vs cost, and balancing AWS purchase options like reserve instances and spot instances vs your applic...
Most informed CEOs seem to know intuitively that the most qualified person to lead their forward-looking business technology advancement isn’t likely to have the profile of a typical legacy CIO. In contrast, the role of a Digital Business Transformation innovator has very different requirements to the traditional IT utility infrastructure custodian of the past.
That said, some progressive CIOs are already making the transition to lead the digital competit...
The lines between the corporate network and Internet are getting increasingly blurry. As companies rely on the cloud, employees become more mobile and there is a rise in third-party users who need access to certain applications or resources. Traditional network perimeters, VPNs and the concept of trusting everyone as long as they had the right credentials to log in is simply not enough these days. In fact, this broad trust has resulted in serious breaches, with personal, corporate and government data being exposed to hackers.
IoT is the next development of how the Internet is applied to the world. TAM for M2M/IoT is estimated at $19 trillion. The IoT device count is in the billions but will not traverse the service providers’ networks. Service providers and vendors are struggling to understand how to map the TAM dollars to real use cases, optimal technology approaches, and profitable business models.
In his session at @ThingsExpo, Dennis Ward, IoT analyst, strategist at DWE, will focus on the SP transformations that will occur. In Phase I SP infrastructure virtualization. In Phase II SPs will focus on monetizatio...
Converged infrastructure solutions are hastening the path to big-data business value and cloud deployment options.
We'll also delve into how the right balance between open-source and commercial IT products helps in creating a big-data capability, and we'll further explore how converged infrastructure solutions are hastening the path to big-data business value and cloud deployment options.
“It's important to have control over each module and each service in order to distribute the load and make the whole system flexible. We need to work with every component of the infrastructure and adjust it – and IaaS with its ready solutions helps us and saves both our and our customers' time,” explained MobiDev CEO Oleg Lola and CCO Oleksii Ostroverkhyi, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
While the idea of converged infrastructure isn’t that new, and we’ve seen some strong efforts from vendors over the last few years to drive more adoption, the uptake from enterprises has been met with some challenges. In 2014, and now in 2015, organizations are not just looking to gain bigger returns on their cloud investments, but
Like me, you’re probably familiar with the story of the Pied Piper of Hamelin. A cautionary tale about the consequences of reneging on debt – it sure scared the crap out of me as a kid.
In enterprise IT, we also accrue debt, but of the technical kind. While the results of non-payment aren’t as severe as those suffered by the good folk of Hamelin, not ‘paying the piper’ will have dire consequences for any businesses trying to compete on an economic playing field where the rules are determined by software.
DevOps of course is now being touted as a tune organizations must play if they’re to dig...
Disaster Recovery isn’t a new concept for IT folks. We’ve been backing up data for years to offsite locations, and used in-house data duplication in order to prevent the risks of losing data stores. But now that cloud adoption has increased, there have been some shifts in how traditional Disaster Recovery is being handled.
First, we’re seeing increased adoption of cloud-based backup and disaster recovery. Gartner stated that between 2012 and 2016, one third of organizations are going to be looking at new solutions to replace current ones particularly because of cost, complexity or capability....
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony Corp, Anthem and the Office of Personnel Management experienced data breaches through malware and o...
Join Us at the Santa Clara Convention Center in Santa Clara, California, November 3-5
Cloud computing software is eating the world, and each day is bringing new developments in this world.
Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and Infrastructure as a Service.
Big Data | Analytics and the emerging Internet of Things (IoT) are driving exponentially increased demands on datacenters and developers alike, as we cross the zettabyte horizon this year.
Containers and microservices are now part of every PaaS conversation, and IaaS providers are increasingly competing for platform customers.
WebRTC continues to reform web communications, and DevOps is pushing its way into an enterprise IT world that is increasingly agile, lean, and continuous.
Through all this, Cloud Expo remains the single independent event where delegates and technology vendors can meet to experience and discuss the entire world of the cloud.
Only Cloud Expo brings together all this in a single location:
• Cloud Computing
• Big Data | Analytics
• Internet of Things
• Containers | Microservices
Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.
Cloud Expo offers the world's most comprehensive selection of technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies.
The floor also features a Demo Theater that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.
Attend Cloud Expo. Create your own custom experience. Learn the latest from the world's best technologists. Talk to the vendors you are considering, and put them to the test.