Welcome!


SOA & Cloud Computing

The use of in-memory data grids (IMDGs) for scaling application performance has rapidly increased in recent years as firms have seen their application workloads explode. This trend runs across nearly every vertical market, touching online applications for financial services, ecommerce,...
There have been a flurry of "green cloud" announcements recently, and that got us thinking about the relationship between green IT and saving money. Green is also the color of money, after all, and companies are discovering that reducing data center costs leads to substantial green ben...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
Introducing the concept of cloud computing into your existing environments can seem to be a daunting task. Cloud computing is the next generation of computing and taking your first step into the cloud can be revolutionary for you and your company. The question you need to ask yourself ...
When deciding on your preferred method of cloud storage, you will inevitably be faced with storage-based and unlimited storage options. While storage-based “pay as you go” pricing might seem like a way to save some dollars now, it’s important to evaluate what it will end up costing in ...
I had the privilege of interviewing the CEO of Capriza, Yuval Scarlat, last week. We discussed a wide range of topics such as cloud mobility, MADPs, MBaaS, mobile strategies and why he thought the market needed another mobile solutions vendor. On a side note, I think Capriza's websit...
Recent reports of a massive data breach affecting popular sites like Facebook, Twitter, Google and Yahoo have many companies rethinking security practices and wondering how to protect vital data. If your company uses cloud services to conduct business and manage data or is contemplatin...
2013 was a banner year for cloud backup adoption. It was also a year of wake-up calls: simple cloud backup doesn't constitute DR, transfer speeds are vital, and beware cloud as a commodity. Let's look to 2014 for more trends in cloud backup and DR in the cloud. This trend showed up in...
Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expe...
In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
With the "API economy" dominating the headlines in 2013, it's no surprise that Parasoft saw a surge of interest in how to ensure API reliability, security, and performance. Here's a recap of the 13 most-accessed API Integrity resources from 2013... API Integrity: How Buggy Are Today's...
Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partne...
The major strides achieved in IT in 2013 are possibly a hint of what to expect in 2014. The leading players are expected to introduce new and advanced cloud-based solutions, and at the same time keep testing, improving the efficiency of the existing services. Here are some of our top p...
Big-data processing helps to make the best use of dynamic storage resources by taking in all the relevant storage activities data, analyzing it and then making the best choices for dynamic hybrid storage optimization. If, as the adage goes, you should fight fire with fire then perhap...
We live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business ...
It’s been a great 2013. Out of the global $1.2 trillion dollars’ worth of business conducted online in 2013 across the globe, SOASTA is trusted with protecting 10% of that figure – or $150 billion. Based on the hundreds of brands SOASTA worked with this year and listened to the challen...
Recently large numbers of consumers in the US were understandably upset and angry when online purchases that they made in the days just prior to Christmas were not delivered in time. Yet it was not so long ago that online (and traditional mail order) purchases almost always took a very...
Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
As the significant benefits of SaaS and hybrid cloud services become more evident, it’s no surprise that organizations are moving more mission-critical applications – e.g., email, VoIP, online meetings, document storage/collaboration, etc., – to the cloud. This is different than CRM ap...
If you are worried about securing your sensitive data in commercial storage services here is a guide to how you can encrypt your sensitive data. The recent PRISM Data snooping controversies have heightened almost every companies awareness of the potential vulnerabilities of data store...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
IT organizations face a growing demand for faster innovation and new applications to support emerging opportunities in social, mobile, growth markets, Big Data analytics, mergers and acquisitions, strategic partnerships, and more. This is great news because it shows that IT continues t...
Cloud service providers are up against several key challenges when it comes to selling desktop virtualization technology. An understanding of the benefits of desktop-as-a-service (DaaS) rarely exists, and licensing concerns – and their rising costs – are not going away any time soon. K...
Everyone talks about a cloud-first or mobile-first strategy. It’s the trend du jour, and for good reason as these innovative technologies have revolutionized an industry and made savvy companies a lot of money. But consider for a minute what’s emerging with the Age of Context and the I...
Enterprises are seeing a great potential in cloud-based services. However, security is a primary concern that keeps enterprise from harnessing the full potential. Identity management is one of the most important aspects of security. There is always an authentication required in an appl...
The medical needs of developing countries are staggering and come in many shapes and sizes. The trouble is the real issues can only be understood once an individual or organization gets involved. About 10 years ago, our organization was routinely shipping medical supplies to hard-to-re...
One key element that is often missing in the avid discussions on what’s keeping more enterprises out of the cloud is a common recognition that storage in the cloud is simply not what it should be. It may surprise you, but to a large degree the solution to some of the cloud’s biggest co...
With the end of the year buzz around predictions, it's hard not to join in the conversation. Our CenturyLink Cloud leadership team came together for a few predictions for the year head – and to show we are keepin' it real, we scored last year's predictions as well. 1. Enterprise-buye...
Do you like opinions? I have asked my UK based colleague and opinionated enterprise mobility expert, Peter Rogers, to share some of his personal views and predictions for enterprise mobility in 2014 in this guest post. Do you disagree or agree with Peter? We would love your comments. ...
In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
Reserved Instances offer AWS users an opportunity to dramatically reduce costs. However, properly calculating purchases, allocating costs, and calculating ROI is not easy. Here are five key ideas to help users perform those tasks and optimize their RI usage. When evaluating RI purchas...
Now that Big Data has become a household name, 2014 will be the year companies demand solid proof that data can help their decision-making and their bottom line. As the entire web becomes a seamlessly connected data warehouse, I predict that organizations will have the power at their f...
In my last post, we learned that services are only like products if you are willing to oversimplify them. And if you oversimplify them, you can miss out on business opportunities. Services (actions supported by things) differ in several important ways from products (things supported b...
In a recent IDG News survey, high-ranking IT executives in North America and Europe were asked about the effect the NSA snooping practices have had on their cloud computing strategy. Despite the furor over the NSA, these leaders are still committed to the cloud. The Cliff's notes: In...
Agility means being able to change direction rapidly in response to a change in market conditions. As business increasingly moves to online and mobile interfaces, the agility of enterprise applications becomes a critical success factor. With the advent of the cloud, making applications...
We discussed my belief that the nines (99.99…%) are more marketing than the real deal today - What do you think? The market and tools used to measure your uptime immature or do not really exist. The concept of availability in the cloud is determined by the level of responsibility and l...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
We’ve had a lot of people asking for the Log Management Primer for a while now. And, surprisingly, many of these folks have a strong technical background, including developers. Some want it for themselves, and some want it to pass on to a colleague, manager, etc. I’m going to explain w...
Growing trends such as BYOD will fuel the move to more pervasive use of identity and access management as a service, driven by the need for pervasive access and management and broader security concerns. Business trends like bring your own device (BYOD) are forcing organizations to saf...