Welcome!


SOA & Cloud Computing

Over the past few years, the cloud evolution has answered all questions on the cloud being the right strategy. The key challenge that remains now is leveraging cloud capabilities and features in such a way that they can be used to innovate as well as solve business problems. If we rela...
As the significant benefits of SaaS and hybrid cloud services become more evident, it’s no surprise that organizations are moving more mission-critical applications – e.g., email, VoIP, online meetings, document storage/collaboration, etc., – to the cloud. This is different than CRM ap...
If you are worried about securing your sensitive data in commercial storage services here is a guide to how you can encrypt your sensitive data. The recent PRISM Data snooping controversies have heightened almost every companies awareness of the potential vulnerabilities of data store...
It has been some year in the world of Cloud and Cloud Storage in particular. We witnessed the demise of Nirvanix, as well as the revelations of Edward Snowdon outlining the surveillance of the PRISM surveillance program and the alleged collusion with major US Service providers. Amidst...
IT organizations face a growing demand for faster innovation and new applications to support emerging opportunities in social, mobile, growth markets, Big Data analytics, mergers and acquisitions, strategic partnerships, and more. This is great news because it shows that IT continues t...
Everyone talks about a cloud-first or mobile-first strategy. It’s the trend du jour, and for good reason as these innovative technologies have revolutionized an industry and made savvy companies a lot of money. But consider for a minute what’s emerging with the Age of Context and the I...
Cloud service providers are up against several key challenges when it comes to selling desktop virtualization technology. An understanding of the benefits of desktop-as-a-service (DaaS) rarely exists, and licensing concerns – and their rising costs – are not going away any time soon. K...
Enterprises are seeing a great potential in cloud-based services. However, security is a primary concern that keeps enterprise from harnessing the full potential. Identity management is one of the most important aspects of security. There is always an authentication required in an appl...
The medical needs of developing countries are staggering and come in many shapes and sizes. The trouble is the real issues can only be understood once an individual or organization gets involved. About 10 years ago, our organization was routinely shipping medical supplies to hard-to-re...
One key element that is often missing in the avid discussions on what’s keeping more enterprises out of the cloud is a common recognition that storage in the cloud is simply not what it should be. It may surprise you, but to a large degree the solution to some of the cloud’s biggest co...
With the end of the year buzz around predictions, it's hard not to join in the conversation. Our CenturyLink Cloud leadership team came together for a few predictions for the year head – and to show we are keepin' it real, we scored last year's predictions as well. 1. Enterprise-buye...
Do you like opinions? I have asked my UK based colleague and opinionated enterprise mobility expert, Peter Rogers, to share some of his personal views and predictions for enterprise mobility in 2014 in this guest post. Do you disagree or agree with Peter? We would love your comments. ...
In light of the recent NSA snooping scandal via their PRISM program regarding private cloud computing security, many people are left wondering if their sensitive data is actually secure. In fact, the statistics points to this startling fact: businesses and individuals alike have been s...
When we set out to build the PerspecSys Cloud Data Control Gateway, we faced an important design decision: would the market prefer an “All-in-One” or a “Best-of-Breed” Cloud Security Broker? In the “All-in-One” camp, IT professionals have come to learn that the bundled modules from a ...
Reserved Instances offer AWS users an opportunity to dramatically reduce costs. However, properly calculating purchases, allocating costs, and calculating ROI is not easy. Here are five key ideas to help users perform those tasks and optimize their RI usage. When evaluating RI purchas...
Now that Big Data has become a household name, 2014 will be the year companies demand solid proof that data can help their decision-making and their bottom line. As the entire web becomes a seamlessly connected data warehouse, I predict that organizations will have the power at their f...
In my last post, we learned that services are only like products if you are willing to oversimplify them. And if you oversimplify them, you can miss out on business opportunities. Services (actions supported by things) differ in several important ways from products (things supported b...
In a recent IDG News survey, high-ranking IT executives in North America and Europe were asked about the effect the NSA snooping practices have had on their cloud computing strategy. Despite the furor over the NSA, these leaders are still committed to the cloud. The Cliff's notes: In...
Agility means being able to change direction rapidly in response to a change in market conditions. As business increasingly moves to online and mobile interfaces, the agility of enterprise applications becomes a critical success factor. With the advent of the cloud, making applications...
We discussed my belief that the nines (99.99…%) are more marketing than the real deal today - What do you think? The market and tools used to measure your uptime immature or do not really exist. The concept of availability in the cloud is determined by the level of responsibility and l...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
We’ve had a lot of people asking for the Log Management Primer for a while now. And, surprisingly, many of these folks have a strong technical background, including developers. Some want it for themselves, and some want it to pass on to a colleague, manager, etc. I’m going to explain w...
Growing trends such as BYOD will fuel the move to more pervasive use of identity and access management as a service, driven by the need for pervasive access and management and broader security concerns. Business trends like bring your own device (BYOD) are forcing organizations to saf...
Customers are expecting to consume IT as a service and IT vendors, including IBM, are responding. Recently, I had the opportunity to attend the IBM Software Group's Analyst Insights conference for the industry analyst community. IBM's total revenue of about $100B comes from its combin...
Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative. One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a...
Many technologies have made their presence felt this year and continue to excite us with the promises they hold for the future. Cloud computing has now reached a stage where businesses are seriously experimenting and are starting to reap the transformational benefits it can deliver. If...
As we move closer toward everything-as- a-service (XaaS), the title “Internet of Agents” seems to fit what is really happening. Agents are systems and devices that sense what is going on, and they exchange information with and act on behalf of other agents and people in ways that ultim...
As with all powerful ideas, these idées fortes are works in progress. If anything, they bring up more questions than answers. Yes, we’ve made substantial progress so far this century, and hopefully ZapThink has been a part of that success. But there’s much more work to do. As enterpri...
There is a lot of confusion and hype about the cloud and SaaS (Software as a Service), and at Corent we experience it on a regular basis. One of the things I’ve been seeing and hearing about is the concept of a marketplace of cloud applications. I’ve observed that applications sold thi...
Cloud this and cloud that are on the lips of every IT professional. Beyond being an overhyped buzzword, cloud computing is a technology that’s innovating the way that many businesses, from startups to enterprises, handle their IT needs. Whether it’s specific applications or a complete ...
I first heard the word “frenemy” a few years ago from my teenage daughter describing one of her classmates. She really liked this girl, but there were things about her she didn’t quite trust – like she couldn’t be counted on as someone who “had her back.” Off to the Urban Dictionary I ...
In my last blog, I discussed how the Internet of Things is really developing into what can more accurately be called the Internet of Agents. These connections and multi-agent systems are resulting in an increasing number of highly applicable, value-added bundled and branded services. T...
Machine-to-machine (M2M) technology and the resulting Internet of Things are leading us inexorably toward everything-as-a-service (XaaS). As more things get connected, the range of service opportunities expands. And as those services are presented online, they become available for use,...
In September, Google experienced a services disruption that affected nearly a third of Gmail users. As you’d expect, it generated quite a bit of news. Such outages are fairly infrequent, but even Google struggled to resolve it. The Google status dashboard during that outage simply said...
Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring. Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I l...
While articles on cloud computing are popping up everywhere, very few actually understand what it is and how it can help in business. In reality, cloud computing is all about making access to data easier regardless of your location. Cloud computing enables users to store files and sof...
If you want to implement an ERP (Enterprise Resource Planning) system, then you will undoubtedly have to answer a lot of questions before you can be sure that the system will run smoothly. But before anything, you should ask a simple question about deployment. Will you need to host you...
In a previous blog we introduced the topic of cloud-as-it-is versus cloud as-we’d like-it-to-be. The cloud services broker (CSB) business model is gaining momentum as one way to turn the cloud into as-we’d-like-it-to-be. CSB is a term used for the activity of brokerage and also for the...
The gap is widening between legacy ERP and cloud ERP as traditional on-premise tools are shifting toward delivery of applications over the Internet. The sudden growth spurt for ERP in the cloud is largely driven by the vast cost savings resulting from the increased productivity and eff...
After years of talking to people inside and outside of my company about the benefits of cloud computing, I'm truly convinced that the most important benefit is not cost reduction or the ability to have new servers up and running in a few minutes. Of course those are great capabilities ...