Click here to close now.


Microservices Expo Authors: Pat Romanski, Janakiram MSV, Jason Bloomberg, Carmen Gonzalez, Elizabeth White

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Open Source Cloud, Containers Expo Blog, Cloud Security

@CloudExpo: Article

Leveraging Cloud and Virtualization for Disaster Recovery

Enterprise Cloud News

With cloud computing, more users and an increase in data bring with it the challenges associated with disaster recovery and business continuity. All distributed systems have to be checked and the data points must all be monitored. In working with these more complex data centers, many administrators are turning to the cloud and virtualization to help them create a more robust DR plan, according to an article on

A well-planned out cloud and virtualization solution can truly help any organization create a more agile environment. There are inherent benefits to working with specific types of cloud models and virtualization platforms. A large part of IT is creativity - that's why using new types of technologies can help reduce management costs and keep an environment running longer.

One way to prepare for disaster is using cloud for replication. Site-to-site replication has become easier with the utilization of both private and public cloud technologies. With better storage systems and more control over the WAN, organizations are able to better replicate their environments. This can be entire virtual machines, specific databases or just data points.

Cloud computing has made disaster recovery much more financially feasible for more organizations because the inherent flexibility of the cloud means you can dictate exactly how much downtime your organization can tolerate and where the costs break even. With that, companies who are trying to stay financially conscious are able to design a solution that fits both - the data center and the budget.

Majority of Organizations Use Unsanctioned Cloud Apps: Survey
Businesses plan to incorporate more cloud applications into the work environment to increase productivity, but an equally high percentage of employees admit to using unsanctioned apps, according to a recent survey.

Cloud adoption is on the rise, but according to the results of a survey conducted by OneLogin, there are a lot of clueless end users out there, according to an article on While 78 percent of organizations surveyed said they planned to increase the number of cloud apps they have in 2013, 71 percent admitted to using unsanctioned apps.

According to OneLogin, the survey demonstrated that 2013 will be the tipping point for cloud adoption. The company, in collaboration with security consultancy flyingpenguin, surveyed 200 IT and business professionals within organizations of all sizes and across various industries. The results were interesting, but perhaps not entirely surprising.

"It is no secret that cloud apps need solutions added to improve their security, yet to see 20 percent of app users admit a breach by ex-employees is still a surprisingly high result," said Davi Ottenheimer, president of flyingpenguin. "The real story behind the 80 percent already using cloud apps is that 70 percent admit apps came without company approval. In 2013, organizations will need solutions flexible enough to support the 60 percent with more than four apps already in use, and scalable enough to keep up with the 35 percent who plan to add at least four new apps this year."

Is the Cloud Safe Enough to Lock Up Law Enforcement Data?
Law enforcement agencies are looking for just the facts when it comes to cloud computing and its reliability in police technology.

Like many professions, law enforcement executives have particular concerns about using cloud technology, ranging from the risk that unauthorized persons could steal sensitive information to concerns about the costs of technology migration, according to an article on

A report, "Mitigating Risks in the Application of Cloud Computing in Law Enforcement," aims to help law enforcement officials weigh the pros and cons of moving to cloud computing. The report found that the major worries of the law enforcement community about moving to the cloud included cloud reliability and availability, performance requirements, costs of migration, and the recovery of data.

In a survey, most law enforcement officials said they were especially concerned about whether cloud computing was appropriate for mission-critical applications such as computer-aided dispatch, records management, criminal justice information and intelligence systems. And of all these areas, unauthorized access to sensitive information is the community's biggest concern, according to the survey.

Commercial cloud providers have made significant strides in protecting data from being hacked or stolen. A 2010 Aberdeen Group study that states, "compared to premise Web security solutions, users of cloud-based solutions had 58 percent fewer malware incidents over the last 12 months ... and 45 percent fewer incidents of data loss or data exposure."

Moreover, cloud providers have adopted data encryption technology, redundant data storage, two-factor authentication and federated identity and privilege management specifications, the report notes. Cloud providers are also well aware of the need to offer high availability services, the report states, and do so by building-in redundancy for data centers normally used for these services.

More Stories By Patrick Burke

Patrick Burke is a writer and editor based in the greater New York area and occasionally blogs for Rackspace Hosting.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@MicroservicesExpo Stories
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and b...
In a report titled “Forecast Analysis: Enterprise Application Software, Worldwide, 2Q15 Update,” Gartner analysts highlighted the increasing trend of application modernization among enterprises. According to a recent survey, 45% of respondents stated that modernization of installed on-premises core enterprise applications is one of the top five priorities. Gartner also predicted that by 2020, 75% of
Despite all the talk about public cloud services and DevOps, you would think the move to cloud for enterprises is clear and simple. But in a survey of almost 1,600 IT decision makers across the USA and Europe, the state of the cloud in enterprise today is still fraught with considerable frustration. The business case for apps in the real world cloud is hybrid, bimodal, multi-platform, and difficult. Download this report commissioned by NTT Communications to see the insightful findings – registra...
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
As the world moves towards more DevOps and microservices, application deployment to the cloud ought to become a lot simpler. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. In his session at 17th Cloud Expo, Raghavan "Rags" Srinivas, an Architect/Developer Evangeli...
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was well received and so was Stan's joint presentation with RingCentral on Devops for BigData. I also participated in two Power Panels – ‘Women in Technology’ and ‘Why DevOps Is Even More Important than You Think,’ both ...
Our guest on the podcast this week is Jason Bloomberg, President at Intellyx. When we build services we want them to be lightweight, stateless and scalable while doing one thing really well. In today's cloud world, we're revisiting what to takes to make a good service in the first place. Listen in to learn why following "the book" doesn't necessarily mean that you're solving key business problems.
Application availability is not just the measure of “being up”. Many apps can claim that status. Technically they are running and responding to requests, but at a rate which users would certainly interpret as being down. That’s because excessive load times can (and will be) interpreted as “not available.” That’s why it’s important to view ensuring application availability as requiring attention to all its composite parts: scalability, performance, and security.
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at, and Tomer Levy, co-founder and CEO of, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the archi...
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
For it to be SOA – let alone SOA done right – we need to pin down just what "SOA done wrong" might be. First-generation SOA with Web Services and ESBs, perhaps? But then there's second-generation, REST-based SOA. More lightweight and cloud-friendly, but many REST-based SOA practices predate the microservices wave. Today, microservices and containers go hand in hand – only the details of "container-oriented architecture" are largely on the drawing board – and are not likely to look much like S...
With containerization using Docker, the orchestration of containers using Kubernetes, the self-service model for provisioning your projects and applications and the workflows we built in OpenShift is the best in class Platform as a Service that enables introducing DevOps into your organization with ease. In his session at DevOps Summit, Veer Muchandi, PaaS evangelist with RedHat, will provide a deep dive overview of OpenShift v3 and demonstrate how it helps with DevOps.
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
All we need to do is have our teams self-organize, and behold! Emergent design and/or architecture springs up out of the nothingness! If only it were that easy, right? I follow in the footsteps of so many people who have long wondered at the meanings of such simple words, as though they were dogma from on high. Emerge? Self-organizing? Profound, to be sure. But what do we really make of this sentence?
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Last month, my partners in crime – Carmen DeArdo from Nationwide, Lee Reid, my colleague from IBM and I wrote a 3-part series of blog posts on We titled our posts the Simple Math, Calculus and Art of DevOps. I would venture to say these are must-reads for any organization adopting DevOps. We examined all three ascpects – the Cultural, Automation and Process improvement side of DevOps. One of the key underlying themes of the three posts was the need for Cultural change – things like t...
There once was a time when testers operated on their own, in isolation. They’d huddle as a group around the harsh glow of dozens of CRT monitors, clicking through GUIs and recording results. Anxiously, they’d wait for the developers in the other room to fix the bugs they found, yet they’d frequently leave the office disappointed as issues were filed away as non-critical. These teams would rarely interact, save for those scarce moments when a coder would wander in needing to reproduce a particula...
It is with great pleasure that I am able to announce that Jesse Proudman, Blue Box CTO, has been appointed to the position of IBM Distinguished Engineer. Jesse is the first employee at Blue Box to receive this honor, and I’m quite confident there will be more to follow given the amazing talent at Blue Box with whom I have had the pleasure to collaborate. I’d like to provide an overview of what it means to become an IBM Distinguished Engineer.