My software never has bugs. It just develops random features.

I came across a great article from CSO Online that talked about how cloud has created a new movement called DevOps. Normally when you think about how cloud is affecting the way businesses operate from an IT perspective, the usual culprits at the centre are the security folks, and maybe the IT infrastructure guys. What we tend to forget is that these groups aren’t the only ones who are looking at how cloud can make business processes more nimble. The DevOps movement is showing organizations how changing the way they run development can lead to some astounding results. Continue reading

What can I say, I failed sharing in preschool.

After spending several hours this weekend formatting and reinstalling my Linux distribution on my laptop, I came to realize something. If it wasn’t for cloud-based services, it would have been a lot more painful. Between my cloud-based email client and dropbox account, I was back up and running in no time. In fact, if it wasn’t for these types of services, in particular cloud storage services, just the day to day running of this blog would be a lot more painful. I’m probably not alone in saying that these services have become critical in ensuring access to files from multiple devices. So why aren’t organizations using an enterprise solution for the same purpose, such as the latest release from OpenText, Tempo? Continue reading

If at first you don’t succeed; call it version 1.0.

If someone asked you what the biggest problem with cloud is, how would you answer? Would it be security? Complexity? Personally, I think it comes down to the fact that cloud involves so many systems, data centres, networks, security controls that it’s almost impossible to create clear segmentations of where cloud environments begin and end. Cloud is a global entity made up of fenced-off clusters of information. Continue reading

Worst. Episode. Ever.

DLP is always a strange thing for me to talk about, since I remember the first round of solutions that ended up causing more headaches than solving the problem of data leakage. But with cloud, it’s all of a sudden a new conversation and DLP is right at the forefront in classifying the types of data that are the centre of the cloud design. All of a sudden DLP cannot be ignored anymore, it’s become a critical part of the new cloud landscape. Continue reading

Greetings, programs!

The other day I was asked about application whitelisting as a way to deal with endpoint issues in virtual and cloud environments. I never really thought about it in this space, as usually application whitelisting was a technique used to control rogue users who like to install anything and everything on their desktops and laptops. So how does this practice affect virtual and cloud environments, and more importantly, does it make sense? Continue reading

I’m a leaf on the wind…watch how I soar!

I recently met with a Canadian cloud innovator, DataGardens, to provide some input on how their solutions would benefit different market segments, and be used for different key continuity and security functions. If you haven’t heard of DataGardens (I have to admit, I wasn’t familiar with them either) or their flagship solution, DataGardens WAVE, you might want to take a look at them again. Especially if you have need for virtualization or cloud business continuity services. Continue reading

Other than that Mrs. Lincoln, how did you enjoy the play?

Do you feel like no matter how much you invest in IT security, you are losing the battle? There has been a lot of talk that security specialists are facing an uphill battle for the foreseeable future thanks to the speed of mobile device evolution and cloud development. Personally, I feel the pain of security folks. Virtualization has made things more complicated, and now with tablets and smartphones, it’s never going to return back to the network security days. But there is something that cloud is bringing to security that will make it easier for security folks, and that is Big Data. Continue reading

I find your lack of faith disturbing.

I stumbled upon a post via Twitter the other day from Scott Lowe of Tech Republic on IDV (yes, I thought at first I was getting a mild case of dyslexia, but no, it is IDV) and the difference between VDI and IDV. IDV stands for Intelligent Desktop Virtualization and although it essentially delivers the same idea as Virtual Desktop Infrastructure (VDI) it’s actually not just more efficient, it’s really quite brilliant. Continue reading

I’m going to give you a little advice. There’s a force in the universe that makes things happen. And all you have to do is get in touch with it, stop thinking, let things happen, and be the ball.

It’s Technology Tuesday yet again, and I wanted to cover the latest news around EMC’s security arm, RSA. RSA had a lot of attention in 2011, mostly around their SecureID breach, but it gave them an opportunity to step back and focus on where the next move would take them. Last month, RSA Security executives announced that that move would focus on three key areas, anti-threat, mobility and cloud security. We’ve seen RSA partner with hardware manufacturers before (anyone look at their Wii? There’s a nice RSA logo on the console), so partnering with one of the most dynamic hardware industries is a very smart move for the EMC folks. Continue reading

Come on, you scuzzy data, be in there. Come on.

I wrote a few weeks back about the theme of Big Data and organizations such as EMC’s GreenPlum and Apache’s Hadoop ushering the way for the application of large data in cloud environments. It reminds me about the debate years ago on whether we would ever see a paperless society, which we realized sadly isn’t going to happen. Data just seems to compound and we cannot begin to imagine how the rates of data usage and creation will increase.

But in order to embrace big data, we need to figure out the barriers to adoption. David Asprey, a regular on the cloud expo circuit, notes that there are 2 key elements missing in the log management space right now: real scalability and security. Continue reading