Forbes this week published an interesting article written by Ed Sperling titled "CIOs: Be Careful What You Wish For". In it, Sperling posits that virtualisation will cause a shift for IT leadership from technology to data. He writes:
"The virtualisation being implemented everywhere will give way to cloud computing, and cloud computing will unclutter technology to the point where the focus will migrate from technology to data."
He goes on to say:
However, the outlook is better, as 88 percent said they planned to take up the cloud in some capacity within three years.
Cloud computing is here to stay. It has quickly earned a reputation as a powerful business enabler, based on benefits such as scalability, availability, on-demand access, rapid deployment, and low cost. IT-savvy users in development and test functions have adopted the cloud model to accelerate application lifecycles. And with recent innovations in self-service access, users in consulting, training, and sales demo areas are also becoming the direct consumers of cloud services.
It’s not often that the likes of Microsoft, Apple, Oracle and EMC jump in to bed together, so when they do, you have to ask yourself what on earth they are up to.
Late last year Attachmate announced its plans to acquire Novell and that as part of the deal it will sell a whole bucket-load of patents (882, to be precise) to a mysterious outfit called CPTN Holdings for around $450 million. All that was known at the time was that Microsoft was behind CPTN, and Novell would continue to own the rights to UNIX.
Since slashes to funding, governments big and small have been concentrating on making their citizens (or customers) more self-reliant. Without the resources to efficiently tackle every taxpayer dispute, government has concentrated on beefing up self-service options.
The ever-increasing demand on insurance technology systems from multiple sales channels and processing operations makes the leveraging of cloud computing a logical choice for carriers. Businesses need to respond quickly to market demands and to scale resources up or down on demand, while providing customer access to those resources from anywhere at any time — all while reducing costs. In such a high-pressure, competitive marketplace, building availability, flexibility and agility into the IT infrastructure is key.
Last week we looked at Yum Plugins and how to extend Yum’s functionality. This week, I’ll look at a few of Yum’s plugins, in particular the security plugin and the priorities plugin.
As I mentioned last week, I’m using Fedora 14 in these examples. If you’re on another system using Yum, like CentOS, Red Hat Enterprise Linux (RHEL) or Yellow Dog (the original distro to ship Yum, by the way), the plugin behavior might be slightly different — or the plugin may not be available at all.