The catalyst opportunity for standardized ‘Cloud Sourcing’

Faced with a need to find huge cost reductions the Province of Ontario is in the same place as many governments throughout the world – They’ve shouldered the debt to see us through the financial meltdown and now need to be smart about how they digest what they’ve taken on.

They’re also in the same place in that they’re presented with the massive opportunity of Cloud Computing and what role this IT industry trend might play in meeting this challenge, the basis of our...

By cloudbestpractices.net, 30 March 2012, 0 comments. Categories: Adoption, Best Practice, PublicSector.

Hypothermic Cloud Infrastructure: Maintaining the Blood Flow to Tier 1 & 2 Apps

A particular sore spot since the beginning of the rise of cloud infrastructures, even the advent of utility computing is this: how do you forecast and pay for resources and justify costs for problems you don’t have yet? After all, the entire premise behind funding the acquisition of compute resources is that you are solving an already identified need (problem) which you then attach a cost and an ROIto in order to convince...

By GreenPages Technology Solutions, 26 March 2012, 0 comments. Categories: Adoption, Infrastructure, SLA.

Cloud 2.0 – Business transformation strategy

The main objective of our projects like the Drummond Report and Cloud analysis, is to focus on the relationship between the technology and the desired outcomes in terms of business transformation.

The Drummond Report is another political exercise focused on the growing public sector deficits, Ontario in this case, and the author makes a number of...

By cloudbestpractices.net, 22 March 2012, 0 comments. Categories: PublicSector, Research.

Data breach costs fall despite increased security challenges

The average cost of a serious IT security breach has fallen over the past two years, despite an increase in their frequency and severity, a new report has claimed.

For the first time in seven years the average cost of a breach has decreased, from $7.2m in 2010 to $5.5m last year. Also, the cost per compromised record fell by 10% to $194, the lowest since 2007.

The Ponemon Institute’s research, carried out on behalf of security specialist Symantec, also revealed that negligent employees are still the...

By Matt Henkes, 21 March 2012, 0 comments. Categories: Research, Security.

Why more education is needed on cloud

2012 is rumored as the tipping point for cloud. For the last four to five years, we have heard that cloud (Internet-delivered solutions) is about to go mainstream, however, this year it is not the hype, but real user benefits that are driving adoption.

What do I mean by this. Well people are not going out looking for cloud-based solutions (“I want some cloud”), instead they are looking for a solution to a real problem. Some users are unknowingly using a cloud-based solution (either in their...

By Ian Moyse, 16 March 2012, 0 comments. Categories: Consumer, Industry.

Why choose Colocation over Managed Hosting?

Colocation is a web hosting solution often suited to businesses that want to maintain their own hardware but cut back on the costs associated with on-premise datacentres including utility bills and physical space. Colocation generally appeals to businesses that host their own customers and want to maintain their own preferred hardware specifications and platform.

With Colocation, you are able to place your server(s) in a datacentre, owned by a datacentre provider, to take advantage of their connectivity and...

By VI, 15 March 2012, 0 comments. Categories: Hardware, Storage.

The Journey to the New IT: Four Key Observations

I do not think anyone who is currently working in IT right now would disagree with me that a transformation is in progress.  There would probably be a heated discussion on what that transformation is, or where it is headed, as this transformation can mean different things to different companies. Let’s talk about what GreenPages is seeing with our clients and how this can help you make sure this transformation works in your users’ favor.

Here are four main changes I have...

By GreenPages Technology Solutions, 14 March 2012, 0 comments. Categories: Best Practice, Trends, Vendors.

Apple devices seeping into Corporate IT networks

Apple has quietly been releasing information on now to integrate its growing list of Smart devices with Enterprise IT.

While currently synonymous with consumers or perhaps less kindly termed "masses", the evidence is clear that Macs, iPads and iPhones are infiltrating corporate environments either knowingly or unknowingly.

The recent emergence of Apple’s iCloud via the Lion OS upgrades also allows consumers to synch their personal data including apps, music, videos and e-books to Apple's remote Datacentres.   ...

By VI, 13 March 2012, 0 comments. Categories: Applications, Enterprise, Industry, Security.

How consumerisation is driving cloud acceptance

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium - although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or...

By Ian Moyse, 13 March 2012, 0 comments. Categories: Adoption, Applications, Consumer, Security.

How cloud is rewriting IT market channels

The big C when it comes to Cloud for the Channel is Conflict. I have been presenting and visiting partners around Europe for the past several years and listening to the opinions and input from vendors, Vars, Resellers, MSP’s, ISP’s and a variety of channels by varying name definitions and one things for sure, the Cloud has certainly stimulated debate. 

Whether it be concern, nervousness, confusion or mistrust, a lot of negative feelings have been generated in the channel by the C word. And...

By Ian Moyse, 08 March 2012, 0 comments. Categories: Enterprise, Industry, SaaS , Vendors.

Cloudy with a Chance of More Venture

Trust makes the world go round.  Without trust, little is possible. Harry Potter author J.K. Rowling wrote, “Never trust anything that can think for itself if you can’t see where it keeps its brain.” 

Quite fitting when you talk about trusting data that resides in the all-invisible cloud. The age-old argument for whether to self-host or outsource always boiled down to trust.

Cloud data is like the tree in the forest: when someone tampers with it,...

By Victor Cruz, 07 March 2012, 0 comments. Categories: Security, Vendors.

Cloud investment will create 14 million jobs worldwide

Spending on public and private cloud services is predicted to generate almost 14 million jobs worldwide between 2011 and 2015, according to a new report from IDC.

The study, carried out in association with Microsoft, predicted that around half of these new positions would be created in China and India.

More than one-third of cloud-enabled jobs will occur in the communications and media, banking, and discrete manufacturing...

By Matt Henkes, 06 March 2012, 1 comment. Categories: Economy, Forecasts, Industry, Infographic, Trends.

When Bad Resource Pools Happen to Good People

There are no lack of articles on the subject of VMware resource pools and shares, yet I am constantly amazed by how frequently they are misused. This isn’t just a problem in the SMB either. Resource pool abuse is an equal opportunity virtual infrastructure killer and I feel the need to dredge up the tired topic again in the hope of reaching at least one more vSphere administrator.

Resource pools can be a very powerful tool that helps an organization achieve very aggressive CPU and Memory utilization.  Properly...

By GreenPages Technology Solutions, 05 March 2012, 0 comments. Categories: Best Practice, VMware.

How scammers use your personal data against you

Ever received an email unsolicited (yes we know you get spam) to your work or personal email address? Found an account of yours compromised and that you can’t log in? Gone onto messenger and had messages from someone you don’t know popping up? So just how do they do that? how do they know who you are and how do they get your email or messenger IDs, and is there anything you can truly do about this?

I often see an email in my Hotmail inbox from someone I know that looks out of context, not...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Trends.

Why selecting a 'safe bet' cloud vendor is critical

The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in computing history. Just look at Facebook, which grew to 500 million members in a very short period of time. People readily share within it, many with a limited understanding of the potential risks to their private information.

The ability to make an enhancement and almost instantly put it into the customer’s hands is immensely powerful...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Vendors.

Cloud will change business, says Google's Schmidt #mwc12

It’s no longer in doubt that Cloud Computing will be transformative for business, with access to high powered applications in the cloud for everything from accounting to design enabling businesses to grow faster and be more successful.

This was one of the messages from Google chairman Eric Schmidt in his keynote address to a packed

By Matt Henkes, 29 February 2012, 0 comments. Categories: Forecasts, Industry, Trends.