Just by pressing a button. That's the cloud revolution. One person can activate a hundred machines by flipping a switch. And the process doesn't stop there. You can also configure them correctly and take advantage of their elasticity and availability to go even further. In this way, your ally is infrastructure as code, a practice that organises the infrastructure as if it were programming software. Because it is no longer enough to have interfaces and APIs to be able to programme the infrastructure. We want it to be easy to manage so as to boost the growth of our business.
What have I done wrong? You ask yourself over and over. I’ve done my best, but nothing is going according to plan. I have allocated a fantastic budget to the cloud, but I can’t make it a reality. I don’t get it. I am surrounded by the best and, on top of it, they have the most innovative means at their disposal. So, what button do I have to press to turn this thing on?
The cloud should be a priority for organisations that want to be competitive. According to Gartner, this year the cloud will become the default option for the implementation of software. It will do so because it provides the flexibility that guarantees more agile and appropriate responses. In addition, it simplifies the management of the infrastructure, because it does not need to maintain physical servers, while providing interfaces that facilitate configuration and monitoring.
The cloud is a challenge and a trend for companies. The determination in consolidating their Digital Transformation is increasingly evident. In fact, 83% of an organisation’s workload will move to the cloud before the end of the year, according to Forbes. And it will do so because it represents a giant step forward that offers visibility, automation and governance.
In our previous blog post, we discussed how we are approaching an important inflection point in the cloud migration timeline. Certain legacy applications will remain on owned infrastructure for the foreseeable future, but the scale and agility offered by cloud platforms offers competitive and operational advantages that most organizations cannot ignore. As cloud adoption became mainstream, many enterprises saw fewer objections to migrating their infrastructure to cloud. One Gartner report finds that many objections to cloud adoption are gradually becoming discredited and organizations are leaving behind the cloud experimentation stage and looking for strategic relationships with cloud technology providers.
A recent Gartner report states: “Organizations with a cross-discipline cloud strategy are more likely to find success in cloud initiatives and recognize the full benefits of cloud.”
Patching Windows 10 doesn’t always go as planned. As noted by CNet, the OS has a bad habit of automatically updating devices to the latest version — even when users are in the middle of something else. Sure, there’s potential benefit for IT here since network-connected desktops and laptops will always be up-to-date but since the update process halts any work-in-progress, resets the device and can take hours to complete, end-users won’t be happy.
Every organization looking at using network function virtualization (NFV) needs to consider monitoring. If you’re going to deploy a service, it’s really important that you know if it’s working — and what’s wrong if it’s not. That’s why monitoring — often called assurance — is a key part of every request for information, every request for proposal, every proof of concept, every NFV deal.
Here’s the challenge: the economics of on-premises monitoring are all wrong for the NFV business cycle.
We've been talking for years about running IT as a business. Multiple industry standards have taken their shot a guiding customers down this golden path, with varying degrees of success. The latest, and possibly most promising, is called IT4IT. This blog is meant as a quick introduction to IT4IT and our suggestions on how to get started.
In the article “Data Masking as Part of Your GDPR Compliant Security Posture” over on DEVOPSdigest, Zenoss talks about how to mitigate your application’s level of compliance by employing data masking or other pseudonymization techniques of personally identifiable information (PII) like names and email addresses. Zenoss suggests giving it a quick read to better understand how that strategy relates to GDPR.