May 29, 2013 Off

What will ‘cloud computing’ mean in 10 years?

By David

Grazed from InfoWorld. Author: David Linthicum.

It’s 2023, and you’re going to lunch with a former colleague in your new flying car. The two of you wonder, "Whatever happened to cloud computing?" As a buzzword, like buzzwords of the past, cloud computing will eventually be baked into all our technology and barely discussed as a concept. Cloud computing in 10 years will have gone off in various directions, all systemic to how we handle enterprise computing in the future. Here are just two paths:

In 10 years, pervasive cloud services will be the standard for assembling business solutions. We will leverage core services that either exist within our enterprise or from public cloud providers to assemble and reassemble business solutions. These services will be utility-based, perhaps primitive storage and compute or security and governance or more sophisticated business uses, such as market forecasting services…

May 29, 2013 Off

Using the Cloud? Avoid Risky Browsing

By David

Grazed from Business2Community. Author: Katelyn Roberts.

The cloud is quickly becoming a go-to resource for a variety of computing needs, thanks to the ablity to cut down on IT expenses while expanding your capabilities at the same time. Instead of increasing spending on hardware, storage solutions, bandwidth, and applications, virtualization through cloud computing continues to gain popularity. However, with its popularity lays the increased risk to protecting your company’s important information through increased exposure.

Increased Risk Brings a Change in Focus

With past conventional means of computing, a user on your company’s network would connect to your internal network to access information through a managed infrastructure. This network would have been normally protected by firewalls and software such anti-virus or anti-spam applications. The responsibility of protecting the network for the most part fell on the shoulders of the IT department…

May 29, 2013 Off

Cloud Computing: SAP Revamps R&D – It All Hinges On HANA

By David

Grazed from CRN. Author: Rick Whiting.

Lars Dalgaard, who has overseen SAP (NYSE:SAP)’s expanding cloud computing efforts since the company acquired SuccessFactors early last year, is leaving SAP following a reorganization of SAP’s research and development efforts.

SAP is creating a single development organization it said would put development operations under the direction of Vishal Sikka, a member of the SAP Executive Board and head of technology and innovation. Sikka has been highly visible at such events as SAP’s Sapphire Now conference earlier this month, where he touted the company’s HANA in-memory database technology…

May 29, 2013 Off

SaaS Market Domination: You’re Targeting Too Big of a Market!

By David

Grazed from Business Insider. Author: Scott Maxwell.

Every expansion-stage SaaS company wants to dominate its market, but most founders don’t build and execute a market-dominating strategy. The problem is that they want to win the entire market so they don’t start by getting clear on the market targets that they want to dominate. Since they don’t have the right focus, they can’t build the right product or go-to-market strategy to dominate their market.

This post is all about narrowing your focus and aiming at the right customer segment(s). If you do this, you will have a much better chance of dominating your markets and becoming a great, large company!…

May 29, 2013 Off

Fedora 19 lands in beta with updates for devs, cloud

By David

Grazed from The Register. Author: Neil McCallister.

The Fedora Project has announced the beta release of Fedora 19, codenamed "Schrödinger’s Cat", almost exactly six months since the previous version entered beta. The release brings the Fedora project back on track after the much-delayed Fedora 18, which shipped two months later than expected due to lingering bugs.

Among its major new features, Fedora 19 is the first to bundle Red Hat’s OpenShift Origin platform-as-a-service (PaaS) management software, something that was meant to be included in the previous version but was bumped to give the OpenShift devs time to upgrade their code to run on the new version of Ruby on Rails…

May 28, 2013 Off

Events: ISC Cloud, Big Data Convergence in Heidelberg, Germany

By David

Grazed from Scientific Computing. Author: Editorial Staff.

The phrase “Big data” means different things to different people. Some believe that the big data is hype and will fade away with time, but the same was said about cloud computing four years ago. ISC Events, with its 28 years of experience in organizing scientific computing conferences realized early on that high performance computing (HPC), big data and cloud are converging, prompting far-reaching implications that are changing the worlds of science, engineering and manufacturing.

The fourth ISC’13 Cloud Conference will take place in the Marriott Hotel, Heidelberg, Germany from September 23 – 24, 2013, and the inaugural ISC’13 Big Data Conference will be held at the same venue immediately afterward, from September 25 – 26. As the cloud computing model is proving to be the useful match for big data, i.e. providing virtually unlimited resources on demand, many topics and presentations in both conference programs will reflect on that connection…

May 28, 2013 Off

Cloud Computing: Appurify Raises $4.5M Series A To Automate Mobile App Testing On A Wide Range Of Devices

By David

Grazed from TechCrunch. Author: Darryl Etherington.

San Francisco-based startup Appurify is announcing its $4.5 million Series A round today, funding which will help the company continue to build out its exhaustive and extensive app testing platform, and to expand its sales and marketing teams to help spread the word among mobile developers. Appurify automates the process of wide-scale testing, allowing developers to see how their devices behave on a huge range of gadgets, instead of just on the smaller pool they might be able to get by seeding their beta to friends and contacts.

This is a remarkably different approach from that taken by a company like TestFairy, which I covered earlier today. Where TestFairy is looking at gathering data from a limited number of real world users, Appurify is trying to tackle testing from the perspective of using a battery of lab-controlled tests to throw as much information as possible at the problem. It’s a way to get around fragmentation issues that cost many Android developers users and reviews, and it also helps mobile software encounter a huge range of network conditions, situations and eventualities that would be hard to replicate with traditional testing through simulation, so that apps can be ready to handle any hiccup…

May 28, 2013 Off

Webinar: SaaSifying your apps in the cloud

By David

Grazed from HP. Author: Editorial Staff.

Learn how SaaSifying your app can commercially deliver unique software solutions as a service to end user customers. Cloud-based solutions help both ISVs and their customers shorten sales cycles, reduce capital requirements, and expand addressable markets and reach.

Hear from PzFlex how they leveraged the power and elasticity of cloud computing to realize unprecedented performance and flexibility using Cliqr’s CloudCenter platform for seamless application migration and HP’s Public cloud for secure, scalable and low cost computing…

May 28, 2013 Off

Cloud Encryption: How to Choose an IaaS Encryption Solution

By David

Grazed from Sys Con Media. Author: Gilad Parann-Nissany.

During the past month or so, Rich Mogull, analyst and CEO of securosis has published multiple blogs on cloud encryption best practices, specifically in infrastructure clouds. The final blog IaaS Encryption: How to Choose, provides a good opportunity for us to touch and expand on some of the volume storage cloud security points highlighted on Rich’s article:
“Always use external key management. Instance-managed encryption is only acceptable for test/development systems you know will never go into production”

Instance managed encryption means the encryption keys are kept on the virtual disk. In other words, anyone with access to your cloud instance, has access to your encryption keys – hence to your data. In addition, specific cloud operations, such as disk snapshots, will snapshot the encryption keys with it…

May 28, 2013 Off

Cloud Computing: Analysing the rise and risks of BYOD

By David

Grazed from AppsTechNews. Author: James Bourne.

The acronym ‘BYOD’ has in no small part fuelled the enterprise-related media scene on its own for the past 18 months; and its disruptive potential is tangible. Yet it shares similarities with another hugely hyped technology, cloud computing. Both have moved beyond the embryonic stage – as CloudTech has reported, many cloud computing reports of late have emphasised how the technology is maturing – into more sophisticated discussion.

For cloud, it’s moving on to concepts such as how to deploy multiple clouds, how to alternate vendors, how to get specific ROI from different verticals. For BYOD, it’s analysing more specific security questions, such as managing mobile devices, avoiding data loss, and how to implement human error within an MDM and MAM policy. Symantec, in a report released last month, urged enterprises to take the risks associated with BYOD, as the benefits outweigh the gamble…