September 14, 2012 Off

Cloud computing standards debate heats up with CAMP formation

By David

Grazed from TechTarget. Author: Fernanda Aspe.

IT experts and cloud consumers understand the need for cloud standards, but standardization seems like an elusive possibility when the objectives of those standards remain undefined. Typically, standards are created to drive a market; end users or consumers usually have little say in the process of standardization.

"We end up with standards created to service technology providers, not the consumers," said David S. Linthicum, CTO and founder of cloud computing experts company, Blue Mountain Labs…

September 14, 2012 Off

Motorola Targets Chinese Market with new Android-based Cloud Desktop

By David

Grazed from Mobile Magazine. Author: Andrew Grush.

When you think of desktop computing, Motorola is probably one of the last brands that come to mind. Motorola is one of the kings of the Android smartphone and tablet world, right? While that’s true, it’s not stopping Google and Motorola from bringing out a new Android-powered desktop solution.

The new CloudBB is specifically targeted at the Chinese market and is described as a “home entertainment terminal”. As you can probably guess, this is a cloud computing device design to replace a PC…

September 14, 2012 Off

How Amazon Web Services is Pioneering the Cloud

By David

Grazed from CloudTimes. Author: Saroj Kar.

The concept of cloud refers to the paperless computer hardware resources (cloud computing) and software (Software as a Service). This model tends technology strategically to win business. But it could reshape the IT landscape especially professional to lead to a new paradigm – thanks to the emergence of Amazon Web Services (AWS).

As a result, the market for computing resources may be profoundly changed. Why? Because companies no longer need to invest in loss of hardware and software overused. They can now hire Amazon Web Services tailored to their needs. For the two major advantages of this model are its flexibility and measurability…

September 14, 2012 Off

Windows Azure Services allows multi-tenant IaaS cloud

By David

Grazed from TechTarget. Author: Roger Jennings.

Microsoft added another arrow to its cloud computing quiver last month with the announcement of the technical preview of Windows Azure Services for Windows Server. The move enables cloud hosting service providers to offer customers subscriptions to multi-tenant Windows Azure VMs and high-density websites with SQL Server or MySQL databases from a private cloud. Whether enterprise IT can pass down this or similar self-service provisioning features to end users is the question.

The Windows Azure Services for Windows Server (WAS4WS) technical preview (TP) for Hosting Service Providers (HSP) provides only Windows Azure Infrastructure as a Service (IaaS) core services for a private cloud — stateful virtual machines (VMs) and websites with persistent storage and optional SQL Server or MySQL back ends…

September 14, 2012 Off

Cloud Compliance Tech Floods the Market

By David

Grazed from American Banker. Author: Editorial Staff.

Federal agencies are starting to catch up to the risks posed by cloud computing. This is sure to stimulate compliance IT projects at financial institutions. A premium will be placed on data that’s in flight, or traveling the vulnerable path between banks and third parties.

CipherCloud , whose clients include two of the five largest U.S. banks, late this week debuted a new product called CipherCloud Connect AnyApp. The product is designed to encrypt data in transit, in use or at rest for public and private cloud applications — including infrastructure-as-as-service (IaaS), software-as-a-service (SaaS) and platform-as-a-service (PaaS). IaaS refers to the outsourcing of equipment used to support operations, such as storage and servers. PaaS refers to the leasing of operating systems, storage and network capacity over the internet. SaaS is a software distribution method in which hosted applications are delivered to firms over the web. Each of these methods involves some form of data transfer to a host, which places it under FFIEC’s guidance…

September 14, 2012 Off

5 Challenges Enterprise Cloud Computing Can’t Solve

By David

Grazed from Business2Community. Author: Adam Greene.

In the world of enterprise IT, cloud computing is on everybody’s mind. Remote data hosting is helping many organizations streamline daily processes and lesson the burden of IT infrastructure maintenance. The cloud makes our information less expensive, more secure (usually), and more accessible. We hold these truths to be self-evident.

But can cloud computing solve all of our enterprise challenges? The answer, of course, is no. While the arrival of the cloud will help organizations remain competitive over the long term, there are several business challenges that, as much as we’d like to solve them, the cloud is unable to ameliorate on its own. Here are five of them:…

September 14, 2012 Off

Demystifying the Virtual Black Hole: Effective Access, Management and Monitoring of the New Network

By David
Contributed Article.  Author: Ran Nahmias, Senior Director, Virtualization and Cloud Solutions, Net Optics, Inc.
CloudCow Contributed Article
 

Demystifying the Virtual Black Hole: Effective Access, Management and Monitoring of the New Network

 
 
How IT Professionals Can Control the Network In a Changing Landscape: New Ideas and Resources

Living amidst a technology revolution, it’s easy to get the impression that change is outpacing our ability to control and guide it. The growing momentum of virtualization only magnifies its accompanying challenges-and the consequences of failed monitoring or management are not academic but real-world, directly affecting a company’s productivity, competitiveness, and viability.
 
The virtual environment is vast, and will soon become much greater than the physical. Its exponentially growing scope means that IT organizations need a variety of resources to manage and administer their growing network infrastructures.
September 13, 2012 Off

Cloud Leveraged for a Rapid Post-Acquisition Integration of Tate & Lyle Sugars

By David
Grazed from Virtustream.  Author: PR Announcement
 
Virtustream, Inc., the enterprise cloud solution provider, announced that Tate & Lyle Sugars has used Virtustream to migrate its full application landscape to the cloud.
 
Domino Sugar (American Sugar Holdings, Inc.) recently acquired Tate & Lyle Sugars from Tate & Lyle PLC, including refineries in London and Lisbon. Domino Sugar is the world´s largest refined cane sugar producer, and Tate & Lyle Sugars’ operations are the leading refined cane sugar producers in the United Kingdom. Immediately after the acquisition was complete, the two companies sought to leverage Virtustream’s xStream hybrid cloud platform to facilitate the consolidation of mission critical applications required to run the combined business.
 
September 13, 2012 Off

Cloud Security Alliance Launches Effort to Tackle Big Data Challenges

By David

Grazed from Midsize Insider. Author: Prince B Alo.

Despite the growing success of cloud computing and big data service, they are relatively new factors in the enterprise technology market and thus come with their share of unfolding concerns. For businesses, security and privacy-protection concerns could be as big as return on investments and other cost-related factors.

The Cloud Security Alliance (CSA), a nonprofit partnership of about 100 major tech companies (including Google, Adobe, AT&T, and Fujitsu) appears to be the most active organization working to address these concerns. CSA’s latest cloud focus comes with the launching of its Big Data Working Group (BDWG), led by communications and IT specialist firm Fujitsu Laboratories of America…

September 13, 2012 Off

Cloud Chains – Integrating beyond boundaries

By David

Grazed from Computing. Author: Editorial Staff.

If cloud computing manages to evolve to where it should do, the end result for organisations is a mixed environment of internal and external IT platforms that stretch beyond their direct control into the value chain of suppliers and customers, and beyond to others providing services along a complex business-to-business (B2B) chain.

Historically, organisations have been able to exert a level of control through ownership of the IT stack from hardware through operating systems to applications, and have been able to ring-fence their systems through identifying where the responsibilities of their organisation ended, generally at a point defined by the use of a firewall…