Cloud Computing on Ulitzer
Last time we saw the difficulty in Predictive Rightsizing, a
frustrating exercize based on "guesstimation" aimed at predicting
future SLA in an everchanging business environment...
So what's the answer?
The solution is a truly dynamic, elastic, real-time on-demand SLA with a
provisioning that is transparent to the users.
Provided that you stay within some reasonable boundaries, you can use as many
resources as you need, or as few as required, ramping up and slowing down
resource usage, without having to provision SLA in advance of usage.
This is the ultimate enabler for your business, because services are
delivered at the exact level required, whenever needed, and without
preoccupation of advanced provisioning.
This is called "pay per use", or "usage-based cost".
You pay for every network packet sent, generated or consumed, or for every
Are we growing immune to bad news about security breach?
I sure hope not, although it's hard to keep up with all of them.
Did you read about the Blippy Data Breach at http://bit.ly/cyR5aU?
You know, Blippy, that up-and-coming startup that allowed very sensitive
information to leak out and then tried to downplay the incident. Not good.
And when their users fled and tried to cancel service, their canceling
service went down. Oops...
Blippy should have known better, too... their business model is based on
manipulating very sensitive data - including credit card information. And
Not all Log Management solutions are created equal... Trusting your logs.
Log Integrity is at the core of using logs for such purpose as building
Trust, providing non-repudiation and indisputable proof in business
relationships between Customers and Providers, but also to provide for
evidence admissible in a court of law. We saw that not all Log Management
solutions are created equal, and we saw some high-level requirements in terms
of log collection and log reporting. We need a solution that is simple to
deploy - we want an enabler, not a disabler - and a solution that allows a ... (more)
This article discusses some of the main defensive security solutions used
today and explains the reasons why employing a Log Management and
Intelligence solution is critical to complement these protection methods.
Let's first look at the most common defensive security solutions that have
been popular these past few years. This is not an exhaustive list of all
existing technologies, but rather a high-level view of some of the prevalent
These corresp... (more)
ISACA, the Information Systems Audit and Control Association just surveyed
1 529 of its members across 50 countries in EMEA.
It turns out that UK businesses are leading Europe on Cloud Adoption 40% to
33%. But a whopping 35% of respondents do not plan to use Cloud for any IT
services (actually 35.6% in Europe and 31.8% in the UK). This is a huge
impediment to the growth of ItaaS – IT as a Service, such as SaaS, IaaS and
PaaS respectively Software as a Service, Infrastructure as a Service and
Platform as a Service.
Let’s spin this another way: 60% of respondents are not using Clou... (more)