Putting Data In The Cloud? Retain Control
Brocade’s McHugh: VARs Are ‘First Mile To Cloud’
The evolution of cloud computing has raised a host of questions on the survivability of traditional VARs and systems integrators (SIs) in a cloud world, but a key executive with one major networking and data center vendor said that the cloud era represents key opportunities for solution providers to build business and grow.
The Cloud: Tailor-made for Unstructured Data?
The primary reason that cloud computing, and cloud storage in particular, is drawing such high interest these days is the enterprise’s need to handle increasing amounts of unstructured data.
Federal Cloud Initiatives Move Forward As Cloud-First Mandate Looms
Federal cloud computing initiatives are gathering momentum, as about two-thirds of federal agencies have identified applications to move to the cloud and half of those have started the migration process, a recent
Cloud computing: The new game changer
Like gravity, cloud computing is invisibly shaping our changing world. Mobile, affordable technology with third party data storage, delivered to you, via the internet in real time. Where is all this data? Somewhere in the clouds?
Actually it’s somewhere in a data storage facility that a company like Facebook or Google has built. Real steel and concrete buildings that need to power up, cool down, back up and quickly deliver the mountains of data we all generate.
Novell’s Vibe Cloud floats away
After floating it around the market for only three months, Novell has decided to evaporate its Vibe Cloud web-based "social collaboration platform for the enterprise".
The decision to decommission the Vibe Cloud service as of September 30 was announced by Novell’s new president and GM Bob Flynn in a Thursday post on the company blog, optimistically entitled "Defining the Next Chapter of Novell: Focus and Commitment".
SalesForce.com DreamForce ’11: The Cloud Computing Event of the Year
Grazed from SalesForce.com. Author: PR Announcement.
Dreamforce is the cloud computing event of the year. August 30 – September 2, 2011 – Moscone Center, San Francisco
More than just a typical user conference, Dreamforce brings together all the leaders in cloud computing to collaborate, connect, and inspire. Every year attendees feel the excitement as they learn how the next wave of cloud computing can help their businesses soar. We’ve got all the basics—breakout sessions, hands-on training, and networking events—but we’ve also got built-in ways to surround you with learning. You’ll learn from us, from each other, and from some of the greatest minds in technology. Dreamforce features outstanding keynotes, interactive demos, in-depth discussions, technical training, and more…
Cloud Making Businesses More Mobile, Competitive: CompTIA Report
Experts make recommendations on cloud computing
Grazed from EE Times. Author: Rick Merritt.
A group of experts from the industry, as well as the academia, has released a report of recommendations for accelerating the adoption of cloud computing in the U.S. Composed of 71 experts, the TechAmerica Foundation convened at the suggestion of the Obama administration. The group was co-chaired by Marc Benioff of Salesforce.com and Michael Capellas of VCE.
The recommendations called for cloud computing standards, especially in areas such as security, privacy and performance, echoing calls from other groups dating as far back as 2008. The report also called for more clarity in laws about attacks on data services as well as a roadmap for cloud research…
Companies Encrypting Data, But Not Everywhere, Venafi Survey Finds
An overwhelming majority of organizations, 90%, use encryption for data security and systems authentication, according to a survey of security practices conducted on behalf of enterprise key and certificate management firm Venafi. Moreover, the survey showed strong overall security programs in the majority of organizations.
In terms of overall security practice, well over half the organizations surveyed have formal management policies and procedures in place in all eight areas designated by the survey: change, patch, vulnerability, encryption key, IP address, server traffic, network and configuration management.