Keeping up with the complexities and costs of information technology is no easy task and especially true for SMBs. To solve this challenge, many now leverage the cloud for their infrastructure needs. But, as valuable as the cloud can be, IT environments must still be deployed, optimized, monitored, managed, and secured. This is why outsourcing IT managed services in addition to infrastructure has become increasingly attractive. (more…)
IAAS, CLOUD, AND MANAGED SERVICES BLOG
NETSCOUT, the world leader in application and network performance management products and solutions recently sat down in an interview with Cartika CEO Andrew Rouchotas as he gave his thoughts on how business owners should be using cloud services to manage their IT assets. Below is the transcript of that interview.
Cyber-attacks and natural disasters like hurricanes, floods, and fires always grab the headlines. But, what causes the high majority of business interruptions are ordinary, everyday events such as power failures, human error, and faulty software or hardware. As a result, most companies will experience a significant IT disruption at some point. Many are turning to cloud-based backups as a way of providing faster, and more reliable recovery. (more…)
The Internet of Things will bring about an explosion in the number of connected devices and the data we have about the world. The one-off sale of useful objects — long the foundation of commerce — is likely to be replaced by the sale of services and personalized relationships with customers in a data and application ecosystem, bringing about a revolution in business models. (more…)
Many of the people reading these words are at work. They are looking at a screen connected to a computer that contains gigabytes of data and applications crucial to their productivity. Without the device, they are unable to work.
Almost everyone else reading this article will have a smartphone in hand. Smartphones like the iPhone can carry gigabytes of data, but almost all of it will also live in the cloud and be accessible from any other device. (more…)
There has always been a lot of confusion around the exact meanings of the various cloud service models and their intersection with deployment strategies. That’s hardly surprising given that IaaS, PaaS, SaaS, public cloud, private cloud, hybrid cloud, and a dozen other as-a-service modalities are a complex combination of marketing speak and technical jargon.
In this article, I’d like to tease out one confused strand: the relationship between Infrastructure-as-a-Service and public or private cloud deployments. I’ve chosen to address this topic because there’s often considerable confusion around what a private cloud is: I’ve heard people say that a private cloud can’t involve virtualization, that its just another name for traditional in-house deployments, that it’s a form of colocation, that Google Apps is a private cloud, and so on — none of which are remotely accurate or at least not completely so. (more…)
Even the smallest of modern companies use networks that are both heterogeneous and dispersed. Business networks are composed of multiple services spread over many servers in diverse locations. I’m a writer, so you’d think I could make do without much of a network, but when I add up all the services I use to run my small business, I find that I rely on an extensive network of personal computers, mobile devices, backup servers, file servers, cloud storage servers, virtual private servers, SaaS applications, web hosting servers, and email services; hosted in the cloud, in my home, and on traditional hosting; and distributed all over Europe and the US. (more…)
There’s a dream of the cloud in which data flows freely around the globe, available anywhere, stored wherever is convenient, and detached from the normal concerns of information management. Technologically, companies don’t have to care about where their data is stored: it’s in the cloud and the cloud encourages users to be agnostic about which server, which data center, and even which country their data is housed in. But, legally and politically, the location of data matters a lot. (more…)
If there’s one thing that’s obvious to anyone who’s spent even a little bit of time online, it’s that security is one of the biggest hot-button issues on the modern web. As we store more and more information online, cyber-attacks are becoming increasingly lucrative – and the stakes involved in securing our data are rising ever higher.
Not surprisingly, that means cyber-criminals are getting smarter and craftier. Whereas before a business might have to deal with the odd DDOS or man-in-the-middle attack, now there’s a constant risk that someone might jump in to exploit even the smallest security hole. It’s a culture of not-completely-unjustified paranoia – particularly since it seems as though many organizations aren’t pulling their weight as far as protecting their data is concerned. (more…)
There’s probably no one with access to the Internet who isn’t aware that the security of Apple’s iCloud platform was called into question recently. I’m not going discuss the appalling theft of private data that ensued, but I do want to look at a related issue: rate limiting. While we’re not entirely sure of the cause of the leak of celebrity’s private photos—the likely strategy was simple social engineering, research of publicly available information, and the exploitation of poor password choices—we do know that around the same time a vulnerability was discovered in iCloud that made life much easier for any potential hackers. (more…)