Many of us tend to think of the public cloud as that frivolous place where consumers hang out and that motley crew of rogue IT practitioners do their thing in the nether regions of the corporate world.
Two great myths are evident in the media today. First, people believe that the bizarre stories of the Kardashians and their lovers somehow represent reality. (Confession, I was stuck in a slow supermarket line today). Second is that restricting data storage to the turf and service providers of one's home nation ensures privacy.
There's the old saying that perception is reality. You know how it goes: Everyone believes a politician is a crook, so even if he isn't a crook, he has to move quickly to clean up his image before the next election. If consumers think a product is overpriced, the company has to do something about pricing.
The top-of-the-line RAID arrays come with dual-ported drives, dual controllers, redundant power, and dual-pathing. With all of that you would rightly expect that your data will always be available, but from painful experience, I know that's not the case.
Be sure to join in today at 2:00 p.m. ET for the next episode of The Enterprise Cloud Site Radio Show, when our guest will be author and security expert Ira Winkler. Ira will outline some of the ways that IT executives can do their part to ensure that corporate data and systems are protected during a move to the cloud.
With any emerging technology or concept, it's easy to look at the success stories and decide that it's worth following in the footsteps of the pioneers. In a similar vein, it's pretty easy to look at horror stories showcasing the problems associated with the concept.
Throughout the history of technology -- or at least over the past few decades -- we've tended to have some all-encompassing buzzwords that easily covered all aspects of an emerging tech sector. We use those broad terms for a few years and then eventually break down the sector into specific areas of activity or platforms.
There are a lot of clouds around today, and that's not a weather forecast. Ranging from mega-providers to old-fashioned hosters using cloud-colored camouflage paint, there are many ways to offload your IT to a third-party site.
When you look at the journey of the business world into cloud computing -- and the innovation it has spawned -- you can conclude that we've come a long way, or you can fret about how far we still have to go. Maybe the latter is symbolic of the impatience found in today's business environment.
After World War I, the French decided to defend themselves against any future invasions with magnificently conceived and grandly constructed concrete fortifications called the Maginot Line. The Maginot Line was impervious to most forms of attack, and had state-of-the-art living conditions for garrisoned troops, air conditioning, comfortable eating areas, ...