Related Content
Superstorm Sandy Uncovers the Downside of Cloud Computing While one can argue all day whether Superstorm Sandy was caused by global climate change or not, there is little doubt that the storm again uncovered the lack of real high availability for most online companies and supposedly outage-proof cloud systems. |
||
OpenStack Has Finally Arrived After two years, 550,000 lines of code, 320 contributors, and 180 companies, the OpenStack cloud infrastructure project has finally arrived as a major player in the IaaS space. Beth Cohen explores the latest news from the world of OpenStack. |
||
Open Source Software Strengthens Its Presence in Government Nothing moves fast in government, but embracing open source software is gaining a foothold in many departments in the US. Innovation is being advanced inside of collaborative efforts by scores of developers as the U.S. takes e-Governance to a new level. |
||
J2EE Fails to Reach the Cloud Java cloud technologies are far from commoditization and standardization. When migrating applications to the cloud, development teams should review innovative vendor solutions delivering cloud-aware architecture rather than rely on a Java EE7 imprimatur. |
||
We Have Tons of Data—Can We Learn Anything from It? It is no secret that we produce more data than ever before. Most organizations understand they need to act on this data, but they struggle with the sheer volume. Brian Enochson discusses ways to manage the data avalanche so that you can gain long-term benefits. |
||
Are You Secure in the Cloud? Much has been said about the lack of security in public and private clouds. Joe Townsend gives us the rundown on what is and isn't secure in the cloud as well as some tips to help protect your organization. |
||
Geolocation and the Cloud—An Oxymoron? As cloud computing services become more widely accepted, the regulatory compliance, geolocation, and corporate governance issues have global companies expressing a need to know where their data is actually located. |
||
Bring Your Own Device—Everybody Else Does It! The digital anywhere, anytime, on-any-device workforce means developers and those concerned with enterprise security must navigate increased security risks introduced by personal electronic devices. Because of the potential headaches posed by BYOD, most companies are establishing guidelines. |