02
May 16

TechTarget – AWS, partners’ balancing act weighs on users, too

AWS partners are a critical part of the growing ecosystem, but the choice between third-party services and the waiting game for native tooling can create problems for users.

There’s a constant balancing act between Amazon and its AWS partners over how best to fill the gaps in its cloud platform — and that creates a set of dilemmas for customers, too.

Amazon has put considerable effort in recent years into expanding its ecosystem, with more than 2,400 AWS partners in technology and consulting. At the same time, it’s constantly churning out improvements to its cloud platform, adding hundreds of upgrades and new services every year. Those parallel efforts can create a strain as both sides try to fill the gaps. For customers, the uncertainty around the ever-changing ecosystem can mean tough decisions for their own environment.

Amazon releases the minimal viable product and iterates from there to add more features, so the challenge often becomes deciding to wait for those additions or go third-party, said Theo Kim, vice president, technical operations and security at Jobvite, Inc., a recruiting software company in San Mateo, Calif. Kim used the example of Web Application Firewall from Amazon which he said has a great price point, but Jobvite is holding out for an expected version that supports Elastic Load Balancing (ELB).

More of the TechTarget article from Trevor Jones


28
Apr 16

Continuity Central – The benefits of moving business critical to the cloud

The key difference is the way in which cloud allows these problems to be mitigated, resolved, and avoided in future.

Core enterprise applications such as ERP are not as readily moved off-site as other applications – but they’re propelling a new wave of cloud adoption. Andres Richter explains why organizations should consider making the switch.

Modern enterprise management software has come a long way from its industrial routes in providing procurement and manufacturing functionalities. Responding to changes in the technology landscape such as mobility, big data analytics and cloud computing, the software has had no choice but to evolve. Employees now require instant information at their fingertips, wherever they are, from any device. Unsurprisingly, core business functions of modern enterprise resource planning (ERP) such as financials, operations, HR and analytics require the same, consumerized flexibility offered by a plethora of non-business critical cloud-based applications. But it’s only the CIOs committed to future proofing their IT who have spotted this opportunity and have made the move from on-premise to a cloud-only or an integrated approach.

While vendors look at ways to disrupt the market, the challenge of convincing ‘stick in the mud’ IT decision makers that business continuity can be maintained during the transition to cloud ERP and beyond remains: but we are seeing an increase. Panorama Consulting’s ERP Report 2016 sees 27 percent of businesses adopting cloud ERP, a rise from 11 percent in the previous year. In our experience, more than 20 percent of current customers at Priority Software are already in the cloud. The take-up is particularly high in industries such as digital media, professional services and business services.

More of the Continuity Central post


19
Apr 16

Continuity Central – Dealing with the risk of DDoS ransom attacks

We are all familiar with the disruptive consequences of a distributed denial of service (DDoS) attack when a website is forced offline because it has been swamped with massive levels of traffic from multiple sources. The cost in terms of lost business to companies while their website is offline can be significant.

Cyber criminals are now taking the process a step further by tying ransom demands to their DDoS attacks, threatening to keep company websites permanently offline until they pay up. In effect, DDoS attacks are coming with an invoice attached.

What are DDoS ransom attacks?

Given the stakes, it makes sense for organizations to try and learn as much as they can about DDoS ransom demands: what do they look like, how can businesses work out if their site is at genuine risk and how can they protect their online presence?

Potential DDoS attacks, usually by criminal groups, start with a test attack on a website or service. The preferred method is to send increasing levels of traffic to the site to ascertain whether it could be vulnerable to an attack. Sometimes, the site can be knocked out with a small attack (from 1-2Gb of bandwidth) or it may require a much larger scale onslaught (from 10-100Gb), depending on the robustness of the security technology the service provider hosting the site has in place.

More of the Continuity Central post from Jake Madders


14
Apr 16

HBR – Which industries are the most digital and why?

When business leaders talk about going digital, many are uncertain about what that means beyond buying the latest IT system. Companies do need assets like computers, servers, networks, and software, but those purchases are just the start. Digital leaders stand out from their competitors in two ways: how they put digital to work, especially in engaging with clients and suppliers, and how intensively their employees use digital tools in every aspect of their daily activities.

Recent research from the McKinsey Global Institute (MGI) looked at the state of digitization in sectors across the U.S. economy and found a large and growing gap between sectors, and between companies within those sectors. The most digital companies see outsized growth in productivity and profit margins. But what are the key attributes of a digital leader? And how can companies benchmark themselves against competitors? We looked at 27 indicators that fall into three broad categories: digital assets, digital usage, and digital workers. Our research shows that the latter two categories make the crucial difference.

More of the Harvard Business Review article from Prashant Gandhi, Somesh Khanna, and Sree Ramaswamy


08
Apr 16

Baseline – Many IT Pros Ignore Corporate Security Policies

One of the inescapable realities of enterprise cyber-security is that a huge gulf exists between what companies should do to protect their IT systems and data and what actually takes place. A recent research report released by Absolute Software, “IT Confidential: The State of Security Confidence,” illustrates the extent of the problem. The endpoint security and data risk management firm polled more than 500 U.S. employees who work in an IT or information security role and asked them about their security practices. The study found that, among other things, a shockingly high percentage of IT professionals admitted that they did not follow the same security protocols that they enforce on other employees. Many said they also intentionally circumvent key security policies. Consequently, many organizations—while placing a premium on security—expose themselves to significant risks.

More of the Baseline article from Samuel Greengard


06
Apr 16

The Register – Successful DevOps? You’ll need some new numbers for that

Dark launches, feature flags and canary launches: They sound like something from science fiction or some new computer game franchise bearing the name of Tom Clancy.

What they are is the face of DevOps – processes that enable projects to run successfully.

And their presence is set to be felt by a good many as numerous industry surveys can attest.

With DevOps on the rise, then, the question becomes one of not just how to implement DevOps but also how to measure the success of that implementation.

Before I get to the measurement, what about how to roll out DevOps? That brings us back to that Tom Clancy trio.

Let’s start with dark launches. This is a technique to which a new generation of enterprises have turned and which is relatively commonplace among startups and giants like Facebook alike.

It’s the practice of releasing new features to a particular section of users to test how the software will behave in production conditions. Key to this process is that the software is released without any UI features.

Canary releases (really another name for dark launches) and feature flags (of feature toggles) work by building in conditional “switches” to the DevOps code using Boolean logic, so different users see different code with different features. The principle is the same as with dark launches: companies can get an idea as to how the implementation is handled without running full production.

More of The Register article from Maxwell Cooter


05
Apr 16

IT Business Edge – Diverse Infrastructure Requires Diverse Efficiency Metrics

Achieving data center efficiency is not only challenging on a technology level, but as a matter of perspective as well. With no clear definition of “efficient” to begin with, matters are only made worse by the lack of consensus as to how to even measure efficiency and place it into some kind of quantifiable construct.

At best, we can say that one technology or architecture is more efficient than another and that placing efficiency as a high priority within emerging infrastructural and architectural solutions at least puts the data industry on the path toward more responsible energy consumption.

The much-vaunted PUE (Power Usage Effectiveness) metric is an unfortunate casualty of this process. The Green Grid most certainly overreached when it designated PUE as the defining characteristic of an efficient data center, but this was understandable given that it is a simple ratio between total energy consumed and the portion devoted to data resources rather than ancillary functions like cooling and lighting. And when implemented correctly, it does in fact provide a good measure of energy efficiency. The problem is that it is easy to game and does not take into account the productivity of the data that low-PUE facilities provide nor the need for some facilities to shift loads between resources and implement other practices that could drive up their ratings.

More of the IT Business Edge article from Arthur Cole


04
Apr 16

Baseline – How Shadow IT Can Generate Huge Savings

The majority of organizations are allowing—and some are even encouraging—employees to create mobile business apps without any involvement from the IT department, according to a survey from Canvas. The company’s “3rd Annual Mobile Business Application” survey reveals that corporate and IT executives no longer fear such shadow IT practices, especially when they’ve demonstrated the ability to boost productivity and innovation, while driving down operating costs. Many company decision-makers, in fact, are comfortable with this emerging trend and are investing in tablet acquisitions to encourage work teams to expand such efforts. “Innovation is occurring at such a rapid pace in the enterprise that employees do not want to wait around for overwhelmed IT departments, so plug-and-play cloud services are transforming everyday employees into citizen developers,” said James Robins, CMO at Canvas. “Business decision-makers and IT departments recognize this evolution, and are shifting their perspective of shadow IT from a perceived liability to an invaluable tool for rapid innovation and cost management.” Nearly 400 business and IT decision-makers took part in the research. – See more at: http://www.baselinemag.com/it-management/slideshows/how-shadow-it-can-generate-huge-savings.html#sthash.1JbQwy1Q.dpuf

More of the Baseline article from Dennis McCafferty


01
Apr 16

The Register – SMBs? Are you big enough to have a serious backup strategy?

One of the TLAs* we come across all the time in IT is CIA. It’s not, in this context, a shady American intelligence force: as far as we’re concerned it stands for Confidentiality, Integrity and Availability – the three strands you need to consider as part of your security and data management policies and processes.

Most organisations tend to focus on confidentiality. And that’s understandable because a guaranteed way for your company to become super-famous is for confidential data to be made publicly available and for the Press to find out – just ask TalkTalk. On the other hand, site outages will often make the news (particularly if you’re a prominent company like DropBox or Microsoft) but they’re generally forgotten the moment that the owner puts out a convincing statement saying that their data centre fell into a sinkhole or they were the subject of a type of DDoS attack never previously seen – as long as that statement says: “… and there was never any risk of private data being exposed”.

Internally, though, you care about the integrity and availability of your data. By definition, the data you process needs to be available and correct – otherwise you wouldn’t need it to do your company’s work. And guaranteeing this is a pain in the butt – for companies of all sizes.

More of The Register post from Dave Cartright


31
Mar 16

Data Center Knowledge – How to Avoid the Outage War Room

Most IT pros have experienced it. The dreaded war room meeting that immediately starts after an outage to a critical application or service, but how do you avoid it? The only reliable way is to avoid the outage in the first place.

First, you need to build in redundancy. Most enterprises have already done much of this work. Building redundancy and disaster recovery into systems has been a best practice for decades. Avoiding single points of failure (SPOF) is simply mandatory in mission critical, performance sensitive, highly distributed and dynamic environments.

Next, you need to assess spikes in load. Most organizations have put in place methods to “burst” capacity. This most often takes the form of a hybrid cloud where the base system runs on premise, and the extra capacity is rented as needed. It can also take the form of hosting the entire application on public cloud like Amazon, Google or Microsoft, but that carries many downsides including the need to re-architect the applications to be stateless so they can run on an inherently unreliable infrastructure.

More of the Data Center Knowledge article from Bernd Harzog