5 Steps to Improve Cloud Computing Financial Management

Recently, cloud computing has put the pressure on IT to match the “free and unlimited” cloud offerings. A key benefit of cloud computing is the ability to pay-as-you-go, and successful IT leaders know that usage-based IT can quickly become more expensive than what it replaces.

Read more

Cornering the Market on Cloud Computing

Many of the things we do in IT have become commoditized, and many more aspects of IT will be commoditized over the coming years. Cloud computing is an example of the commoditization of IT resources. In fact, one of the key benefits of cloud computing is that computing resources become commoditized. When we need more computing resources we go to the cloud and get more, when we need less we release computing resources back to the cloud.

Read more

Public Cloud Services Going Mainstream

A new report commissioned by VMware has found that businesses of all sizes are increasingly using public cloud services for mission-critical applications.

The results of the survey, undertaken by analyst firm Enterprise Strategy Group (ESG), reveal a major shift in attitude to cloud adoption from just a year ago when many businesses seemed to be wary of making the move to the cloud. Now the trend appears to be one of taking the plunge without hesitation.

Read more

Eight Emerging IT Certifications For 2013

The nature of IT is to stay ahead of the curve in all things related to technology. Today, the expectation is that IT professionals will have a measure of capability, if not proficiency, in everything from wireless networking and security to mobile app development and maintaining a cloud-based infrastructure. However, IT pros can’t be everywhere at once. By developing skillsets in certain areas, both entry-level and accomplished IT veterans can remain current with changing trends and adapt to new ones.

Read more

Does Cloud Computing Really Create any New Security Risks?

Short answer: No.

We can think about the risks associated with public cloud computing in terms of the CIA triad, which are:

Confidentiality – Information is only available to those who are authorized to use it
Integrity – Information is what it purports to be. Transactions are authentic and unmodified in flight
Availability – Information is accessible when it’s needed

If we consider a public cloud solution from a standpoint of CIA, we quickly realize that the security risks that are associated with cloud are not really new risks.

Read more