Cloud pricing can be a frustrating experience. Everything is charged by different metrics. Some of the prices are spelled out, some are hidden behind paywalls or aren’t clear until you get your monthly bill and realize you forgot to turn off an instance that is chewing up your wallet. Some are charged by usage, others by the month.
I look at some of the issues in keeping track of your cloud costs and summarize the numerous services that are currently available. You can read my post on WindowsITpro here.
I cover a recent white paper from the Cloud Security Alliance about network function virtualization (NFV) in a series of posts for IBM’s SecurityIntelligence.com blog. In the first post, “Security and the Virtual Network: Part I,” I discuss how NFV and software-defined networks (SDNs) are changing the traditional enterprise infrastructure. Part two explored some security challenges and implementation risks involved with deploying new virtual networks and their related technologies. And in the third post, I recommend improvements and certain security frameworks for protecting your virtual networks.
Virtual networks’ dynamic nature means IT staff have to take time to document its topology and data flows carefully and keep up with any changes to its structure.
I join Dell Virtualization Evangelist Hassan Fahimi to provide a complete overview of OpenStack and Foglight for OpenStack, including:
- Understanding OpenStack deployment strategies and issues
- Gaining complete visibility into your OpenStack topology
- Monitoring the performance of specific OpenStack modules and components
- Leveraging alerts to proactively identify issues
- Taking advantage of built-in “FAQs” and reports to immediately get the answers you need
You can download my slides here, and watch the webinar here.
The benefits of cloud computing have been hammered into IT – streamlined processes, improved accessibility, greater flexibility, and so on – but latent concerns around security, performance, and access have kept many organizations from realizing the true value of the cloud.
You need to objectively compare the capabilities and costs of cloud services against those of traditional on-premises infrastructure – even if you’re already doing some mix of the two (in fact, especially if you’re doing a mix of the two).
This five-city event provides that objective perspective by focusing on building a data center infrastructure that realizes the true value of cloud computing across your IT infrastructure – including automation, high availability, appropriate utilization rates – and not just limited, low-impact use cases. Sign up for one of the cities that I will be speaking here.
The days when IT managers used different security products to protect their on-premises and cloud infrastructures are happily coming to a close. There’s a growing awareness that migrating virtual workloads to new IT infrastructure requires different levels of protection with security mechanisms built-in.
In this story for TechTarget’s SearchSecurity, I talk more about this trend and some of the products (such as Catbird’s shown above) that can be used to protect your cloud-based resources.
As CIOs adopt hybrid-cloud strategies, some quickly learn that these environments need new kinds of security models or, at least, contexts in which to apply existing controls and security technologies. Most organizations also find that their environments are not as simple as a pure private plus public cloud. Legacy on-premises systems and SaaS applications come into play.
You can read my article in SearchSecurity here as I interview several CIOs and what they are doing to protect their hybrid cloud deployments.
The market for hyper-converged systems is quickly evolving. Traditional storage infrastructure vendors remain the largest installed base, but software-defined and hyper-converged storage providers represent the fastest growing market segment, with some of the latter vendors rapidly increasing their market share.