Will Streaming Content Drive Scale-out Storage?
Five tips for finding a cloud solution that’s ready for your users
Cloud computing is here to stay. It has quickly earned a reputation as a powerful business enabler, based on benefits such as scalability, availability, on-demand access, rapid deployment, and low cost. IT-savvy users in development and test functions have adopted the cloud model to accelerate application lifecycles. And with recent innovations in self-service access, users in consulting, training, and sales demo areas are also becoming the direct consumers of cloud services.
Does CPTN Spell the End for Open Source Software?
It’s not often that the likes of Microsoft, Apple, Oracle and EMC jump in to bed together, so when they do, you have to ask yourself what on earth they are up to.
Late last year Attachmate announced its plans to acquire Novell and that as part of the deal it will sell a whole bucket-load of patents (882, to be precise) to a mysterious outfit called CPTN Holdings for around $450 million. All that was known at the time was that Microsoft was behind CPTN, and Novell would continue to own the rights to UNIX.
Taxpayers Demand CRM
Since slashes to funding, governments big and small have been concentrating on making their citizens (or customers) more self-reliant. Without the resources to efficiently tackle every taxpayer dispute, government has concentrated on beefing up self-service options.
Gartner Gets It Wrong With Cloud Quadrant
Cloudera Puts Its Money Where Its Tech Is
The Benefits of the Private Cloud
The ever-increasing demand on insurance technology systems from multiple sales channels and processing operations makes the leveraging of cloud computing a logical choice for carriers. Businesses need to respond quickly to market demands and to scale resources up or down on demand, while providing customer access to those resources from anywhere at any time — all while reducing costs. In such a high-pressure, competitive marketplace, building availability, flexibility and agility into the IT infrastructure is key.
More Yum Plugins: Security and Package Priority
Last week we looked at Yum Plugins and how to extend Yum’s functionality. This week, I’ll look at a few of Yum’s plugins, in particular the security plugin and the priorities plugin.
As I mentioned last week, I’m using Fedora 14 in these examples. If you’re on another system using Yum, like CentOS, Red Hat Enterprise Linux (RHEL) or Yellow Dog (the original distro to ship Yum, by the way), the plugin behavior might be slightly different — or the plugin may not be available at all.