We have spoken about other cloud dependencies: visibility, upgrades, and networking. Now we need to talk about adoption. Not the techniques, but how you move forward. What is this change in your work life now that you are using a cloud? Why is this a change in dependency? You now have instant responsibility for things …
TVP Strategy Archives
Cloud Dependency: Visibility
We have looked at the hidden dependencies around upgrades (Cloud Dependency: Automated Upgrades) as well as the hidden dependencies around networking (Cloud Dependency: Ubiquitous Networking). Now, we will look at the hidden dependencies on visibility. Or more to the point, the lack of visibility within the cloud. With regard to visibility, the question most often …
Virtualizing the Last Mile
The last mile of virtualization has multiple dimensions, based on where you are going with virtualization. When you ask about the last mile of virtualization—about what it will take to get to 100% virtualized either within your data center or within a cloud (hybrid, public, or private)—the “it depends” answer is the one you will …
Cloud Dependency: Automated Upgrades
In my last cloud dependency article, I reviewed the need for ubiquitous networking. In this article, I look at the need for automated upgrades. I do not mean the need for automation in general, but specifically the need to automate any upgrade or update behavior. There are two sides to every cloud story: what the …
Cloud Dependency: Ubiquitous Networking
Use of the cloud depends upon ubiquitous networking. And not just everywhere, but extremely high speed as well. This came to mind as I was sitting at the top of a mountain in a national park and heard someone ask Siri a question. Siri’s response was that the network was not in reach. This struck …
Cloud Security: Different Approaches and Points of View
There are two distinct points of view when discussing cloud security: the tenant’s point of view, and the cloud service provider’s point of view. Both of these points of view are legitimate, but often one is confused for the other, as we discuss our points of view without really clarifying. However, within each of these …
Continue reading “Cloud Security: Different Approaches and Points of View”