HYBRID CLOUD

HYBRID CLOUD Now that major enterprises have gotten their feet wet with smaller cloud projects, they’re beginning to focus on migrating large, critical legacy workloads. That’s the take from Stephen Orban, head of enterprise strategy at Amazon Web Services (AWS). In an interview with Computerworld at the annual AWS re:Invent conference here this week, Orban said the next wave of cloud computing could be focused strategically on legacy migration. And while it’s always tougher – and riskier — to move big, mission-critical workloads and services, at least IT departments have…

Read More

CLOUD STORAGE

CLOUD STORAGE For the case of cloud storage Users who need to make sure they can get access to files stored in Dropbox while they’re on the go and away from the web have a new feature to help with that. The company announced Tuesday that users of its mobile apps will soon be able to save files locally for use offline. It’s a move by the cloud storage company to better compete with the other players in this space,  and provide users with functionality that will help them be…

Read More

CLOUD SECURITY

CLOUD SECURITY ABOUT CLOUD SECURITY Earlier this year I switched to Android from iPhone and from Verizon to Google’s Project Fi. My blog post about the experience generated a vigorous discussion comparing Google’s privacy guarantees to Apple’s. The summary of the argument presented to me is that Apple is in the business of hardware and has no interest in monetizing data. By contrast, Google is a “big data company” and it does monetize data. Android, by its nature, may be more vulnerable to malware than iOS. Switching from iPhone to…

Read More

CLOUD COMPUTING

CLOUD COMPUTING ABOUT CLOUD COMPUTING As IT organizations adopt an increasingly complex infrastructure, and an increasing number of diverse applications, they also increase the number of remote administrators accessing their environment. Unfortunately, IT may not always have complete control over and visibility into all its remote admin accounts. If an organization does not have a trusted identity management solution in place to verify these 3rd party insiders, the risk of insider threats to their Windows Servers increases. The Windows Server environment is vulnerable to three common insider threats – but…

Read More