Cloud networking on the rise, but can NaaS gain traction?

More than two in five (45%) of respondents to a Spiceworks survey admit they are using cloud networking tools in their business, or are going to push forward with it within 12 months.

The survey results, of 500 IT professionals, were collected in a report entitled “The Cloudification of the Network”, produced in association with cloudy networking solutions provider Pertino.

Of course, the more cynical and world-weary CloudTech readers will have worked out the message in this survey given...

By James Bourne, 28 August 2013, 0 comments. Categories: Disaster Recovery, IaaS, Monitoring, Research, Security.

Where are the highest paying cloud computing jobs?

Using analytics to better understand the cloud computing job market is fascinating.

One of the most advanced companies in this area is Wanted Analytics, who aggregates job postings from over 500 job boards and maintains a database of over 600 million unique job listings.  They specialise in business intelligence for the talent marketplace, providing insights into how one company’s salary range compares to competitors for the same position, also calculating the difficulty to...

By Louis Columbus, 08 March 2013, 0 comments. Categories: Data & Analytics, Infrastructure, Monitoring.

10 things to think about when moving to the cloud

Moving applications to the cloud can create a more flexible, more responsive IT department, but what about moving application data to the cloud? How secure is that? And are cloud applications truly reliable and less expensive than on-premise applications?

Let’s consider some issues before you take the cloud-migration leap.

1. Goals Are you moving to the cloud to reduce costs, time-to-deployment, or your IT department’s workload? Goals are the foundation of success, so you should...

By Paul Moxon, 07 March 2013, 1 comment. Categories: Disaster Recovery, Monitoring, Security.

qTrace: A Love Letter to Testers of Cloud apps

As a software QA tester, how do you work? Your mission is to find bugs. That’s when the drudgery starts. Most likely your day looks like this: you start by retracing steps, you grab screen captures, you take notes, open a defect tracking tool, and then finally submit a ticket.

Most likely you missed a few things. Same old story.

The good news is that someone loves you; or rather, someone loves the problem you’re facing enough to develop a work-around.

Just in time for Valentine’s Day,...

By Victor Cruz, 14 February 2012, 0 comments. Categories: Applications, Monitoring.

False Positives and Other Misconceptions in Static Analysis

In ongoing discussions here at the blog and elsewhere, I keep seeing the topic of false positives in static analysis come up. It’s certainly a very important issue when dealing with static analysis, but the strange thing is that people have very different opinions of what a false positive is, and therefore different opinions of what static analysis can do and how to properly use it.

In the simplest sense, a false positives means that the message that a rule was violated is incorrect, or in other words...

By Arthur Hicken, 03 November 2011, 0 comments. Categories: Architecture, Big Data, Data & Analytics, Monitoring.

10 steps to success with your distributed monitoring

Setting up distributed monitoring in mission critical production environments is a complex task; configuration can be challenging and mistakes costly. Opsview Enterprise edition gives you powerful functionality to make deploying enterprise monitoring easy and migrating from test to production environments risk free. Here’s how.

1. Get everything done in one place

Opsview’s configuration User Interface makes it quick and easy to get things done.  Any configuration you need to make is carried...

By Luke Wotton, 26 October 2011, 0 comments. Categories: Enterprise, Migration, Monitoring.

When It Comes to Cloud, Which IT Executive Are You? Part 1: “Huh?”

A Special 4 Part Blog by Trevor Williamson

As I spoke last time about my experiences talking to senior management at some of the largest financial, insurance and banking companies about cloud infrastructures and what they thought about the whole space, I broke down my experiences into 4 simple categories:  

  • Huh?
  • Been there, done that
  • I want dessert before dinner, and,
  • Where do I start first?

In this installment, let me talk about the experiences I’ve had with...

By GreenPages Technology Solutions, 18 October 2011, 0 comments. Categories: Adoption, Enterprise, Monitoring.

Performance Monitoring - A Thirty Day View

I remember when I saw the movie "Super Size Me" by Morgan Spurlock.  I recall thinking about how much can happen in the course of just thirty days, not to mention how gross that food looked.  For people, 30 days seems like a long time at first, until you look back on what happened over the course of those 30 days.  It's easy to forget things that happened a week ago, not to mention a month back.  At CopperEgg, things move so fast that I really have to think hard to recall what we were focused on 30 days...

By CopperEgg, 11 October 2011, 0 comments. Categories: Big Data, Data & Analytics, Monitoring.

What is Static Analysis… and What is it Good For?

As I talk to people about static analysis, I get a lot of questions and it seems that static analysis means different things to different people. The definitions people use for static analysis can be any or all of the things in this list:

  • Peer Review / Manual Code Review / Code Inspection
  • Pattern-based code scanners
  • Flow-based code...

By Arthur Hicken, 05 October 2011, 0 comments. Categories: Best Practice, Data & Analytics, Monitoring.

Cloud Security Part 2: The SECRET Sauce

The key to effective cloud security is like a two-sided coin – one side is security (of course) while the other is management. Most overlook the latter, only to realize how critical management is when it’s too late and they’ve given up on the first, security.

Securing your cloud needs to offer protection that includes firewall...

By Dome9, 04 October 2011, 0 comments. Categories: Applications, Best Practice, Hacking, Monitoring, SaaS , Security.