Andi Mann and George Watt of CA Technologies discuss cloud security, rogue cloud, swarm-based computing, video production in the cloud & more! Read the show notes on Smart Enterprise http://www.youtube.com/watch?v=cnzNI1C357k
Tag: Security
Spending next week immersed in IT
Next week I will join thousands of other IT professionals at Gartner Symposium/ITxpo 2012 in Orlando. I have been to Symposium and ITxpo many times before, in many different roles, and it never disappoints. There is so much to see…
10 Ways IT Can Own Cloud Decisions
How IT leaders can bring the true value of cloud computing to their organizations. Much of the hype surrounding cloud computing is causing confusion among enterprise IT looking to cloud to solve problems and hoping not to introduce more. Unfortunately several…
Innovations disrupt established markets | ITWeb
I was interviewed while I was in South Africa recently at the CA IT Management Symposium Africa 2012. We are living in an age of innovation – innovation driven by technology, says CA Technologies’ Andi Mann. Innovations that would have…
11 Tips for Successful Cloud Computing Adoption
Today I was published in one of the top cloud computing journals. In fact, it is the Cloud Computing Journal, part of the SYS-CON stable and the same organization that runs the excellent Cloud Expo events. The article is called…
New Cloud Reference Architecture From NIST
So, here is something interesting I discovered today, courtesy of a tweet from Christian Reilly (@ReillyUSA) – the US federal agency, the National Institute of Standards and Technology (NIST), today released Version 1 of their Cloud Computing Reference Architecture (PDF).…
VM Stall – More Than Four Reasons
I recently saw a great article in IT World Canada titled “Virtual stall: What it is and why you have it,” written by Jay Litkey, that took up my idea of VM stall, which I first came up with in…
Does Virtualization Security Really Matter?
Whatever happened to virtualization security? Back in the day, everyone was talking about blue pills and red pills, about sideways attacks and DOM-0 threats, about security profiles and isolation policies, about perimeter defense and security embedded in the hypervisor. Then,…
You Cannot Separate Security and Systems Management
A few days ago I was pleased to brief again with Reflex Systems. Apart from the fact that they are doing some very cool things with virtualization management, their approach struck me as, if not unique, at least pleasantly rare.…