Cloud Computing image via Shutterstock
If you’re looking build, integrate or create a cloud environment, it’s important to understand the inner mechanics, architectures and layers, as well as the business / economic factors that could result from cloud adoption. That’s where Thomas Erl’s book, Cloud Computing: Concepts, Technology & Architecture, comes in as it provides the essential building blocks for cloud computing platforms and solutions. We have an excerpt of the book on our IT Bookworm blog.
And here’s some even better news…we’re giving away a copy of the book! To win, tell us how you think cloud computing will evolve over the next 10 years. Good luck!
Website performance image via Shutterstock
Join us on Wednesday, July 17th at 10:00 AM AEST for a live Q&A with Stuart Mills, Head of Digital and SaaS hosting at Macquarie Hosting, and Volker Rath, Hosting Services Expert at Macquarie Telecom (along with a team of engineers), who you discuss the available technologies for optimizing website performance, all from the host perspective.
Today’s users are mobile, today’s customers are mobile, and both expect a superior user-experience, regardless of the chosen device, geographic location, or services being delivered.
As a result, developing the back end infrastructure to support this user experience is essential. Choosing a hosting model that allows you to identify performance needs – and to quickly respond to those needs – is a critical part of this equation.
Join Stuart Mills, Head of Digital and SaaS Hosting at Macquarie Hosting; Volker Rath, Hosting Services Expert at Macquarie Telecom; and a team of senior engineers from Macquarie Telecomm, all of whom are equipped to answer your most technical hosting questions.
Whether serving as a logical follow-up to the How Your Hosting Provider Can Influence the Quality of Your User Experience webcast, or as a stand-alone opportunity to get answers to your specific questions from industry experts, this live chat on July 17th brings together our panel of experts and a select group of IT professionals for a discussion on the available technologies for optimizing website performance, all from the host perspective.
This live conversation takes place from the comfort and convenience of your own desk and offers insight into why CPU monitoring alone isn’t good enough – and why implementing the newest, hottest technologies doesn’t necessarily promise superior performance. Register today!
Head of Digital and SaaS Hosting at Macquarie Hosting
Currently Head of Digital and SaaS Hosting at Macquarie Hosting – a Division of Macquarie Telecom. 20 years sales and sales management experience in Telecommunications, Systems Integration, Selective Outsourcing and Hosting of critical online applications for corporate and government organisations.
MBA from Macquarie University in General and Strategic Management. First Class Honours in Computer Science from University of Sydney.
Expert for the Hosting line of business at Macquarie Telecom
Volker Rath is Subject Matter Expert for the Hosting line of business at Macquarie Telecom. In this thought leadership role Volker influences Macquarie Telecom’s hosting solution strategy and direction. He represents Macquarie Telecoms hosting business internally and externally and manages sales enablement and sales training. Volker has over 16 years of experience in the IT industry majorly in the consulting, security and hosting space.
Blog image via Shutterstock
There was some tag-team action in June as Ron Miller and Ed Tittel placed several entries in ITKE’s top blog posts for the month. Find out why their posts were so hot (HINT: Some of them had to do with Microsoft).
- Microsoft’s mobile futility could be its reality by Ron Miller (View From Above)
- Methods for installing Windows 8.1 preview by Ed Tittel (Windows Enterprise Desktop)
- Apple finally commits to the cloud by Ron Miller (View From Above)
- Linux Essentials: A kinder, gentler entry-level Linux Cert? by Ed Tittel (IT Career JumpStart)
- A look at the NSA recordings as a big data storage problem by Sharon Fisher (Yottabytes: Storage and Disaster Recovery)
- If the government wants you, where you store your data doesn’t matter by Ron Miller (View from Above)
- Windows 8.1 preview due out Wednesday by Ed Tittel (Windows Enterprise Desktop)
- Windows 8.1 preview countdown underway by Ed Tittel (Windows Enterprise Desktop)
- Making the most of your expertise by Matt Heusser (Unchartered Waters)
- Do you really need all your employees to work in Los Angeles, New York or San Francisco? by Robin Miller (Cheap Computing)
MySQL image via Shutterstock
Continuing to experience phenomenal growth and popularity throughout the IT industry, MySQL has proven to be well-suited for developing database-backed websites and applications. Take advantage of this growing system by taking a look at Paul DuBois’s book, MySQL, 5th Edition, which is a great guide to fully exploiting all the power and versatility of MySQL 5.5 and MySQL 5.6. We have an excerpt of the book on our IT Bookworm blog.
And guess what…we’re giving away a copy of the book! To win, tell us how you have used MySQL in previous projects. Good luck!
Blog image via Shutterstock
Tablets were the talk of the blogger world in May and many tablet-related posts made their way into ITKE’s top blog posts for the month. Check out why they were such a bit hit with our bloggers.
- A $69 Android tablet that’s worth buying by Robin Miller (Cheap Computing)
- Microsoft still doesn’t get tablets. Here’s evidence. by Ron Miller (View from Above)
- Windows Blue gets PowerShell 4.0, too by Ed Tittel (Windows Enterprise Desktop)
- What is OpenStack? by Brian Gracely (From Silos to Services: Cloud Computing for the Enterprise)
- EMC rivals’ venomous reactions to ViPR by Dave Raffo (Storage Soup)
- Beware the nearly useless low-end Android tablet by Robin Miller (Cheap Computing)
- The five things I love most about the Surface Pro by Tony Bradley (Tech Strategy Trends)
- New hybrid cloud models emerging by Brian Gracely (From Silos to Services: Cloud Computing for the Enterprise)
- Intel’s new chipset Haswell: Pricing, release date and specifications by Nathan Simon (The Real (and Virtual) Adventures of Nathan the IT guy)
- Applying the lean startup at Intuit by Matt Heusser (Unchartered Waters)
Compliance image via Shutterstock
Join us on Tuesday, June 25th at 11:00 AM EST for a live Q&A with our expert speaker Tony UcedaVelez, who will answer your questions on planning your enterprise compliance strategy.
Compliance is the dirty word that no security professional likes to mention and few business and technology leaders think fondly of. This is primarily because compliance is perceived as something that has to be done versus something that helps improve business process or technology. The stigma is mostly a product of poor compliance effort execution rather than disdain for regulatory requirements. No one disagrees that more oversight and security validation is needed, but the manner in which it has been validated can vastly improve. Although HIPAA, FISMA, FFIEC, PCI-DSS, and many other regulatory compliance frameworks have changed significantly over the past 20 years, approaches to addressing compliance within both Fortune 500 and SMB organizations have had a lackluster reign of innovation.
Similar to recent rhetoric around baking security in, this presentation will introduce pioneering methods for how compliance efforts could be introduced earlier in software/system development life cycles and change management workflows via asset-centric threat modeling methodologies, and will demonstrate how more collaborative portrayals of compliance efforts can be achieved across an organization. Register today!
Founder and managing partner, VerSprite, CRISC, CISM, CISA, GIAC
Tony UcedaVelez has more than 14 years of hands-on security and technology experience across government, healthcare, financial, education and utility sectors. UcedaVelez founded VerSprite with the premise of redefining security services to a point that it reflects a hybrid and balanced approach in understanding client needs.
Hacking image via Shutterstock
Major security surveys and reports continually show that passwords are one of the greatest weaknesses on enterprise networks. Criminal hackers exploit weak passwords for their ill-gotten gains as do malicious employees and other insiders. Even advance malware can take advantage of weak passwords. Something has to change. But you can’t fix what you don’t acknowledge. That’s why Kevin Beaver’s book, Hacking for Dummies: 4th edition, presents the latest tools and techniques you can use to cover weak passwords in your environment and to minimize password risks once and for all. We have an excerpt of the book on our IT Bookworm Blog.
Since we’re feeling generous, we’re giving away five more copies of the book, all signed by Kevin Beaver himself! To win a copy, tell us “What do you believe is the greatest contributor to information security problems in your organization, or if you’re not into self-incrimination, society as a whole?” Good luck!
ITKnowledgeExchange recently had the chance to talk to ITKE blogger and this month’s ‘featured blogger’ Aaron Delp. His blog, Clouds in the Open: The Operations Evolution of Open Source & Public Clouds, covers the latest trends and technology affecting the operation and maintenance of Open Source and public clouds.
ITKE: Tell us a little about yourself: What do you do? What’s your area of expertise?
AD: I am the Senior Director of Technical Marketing for the Citrix Cloud Platforms Group. I help create and define our technical materials and message for XenServer, Citrix CloudPlatform (based off the Apache Foundation’s CloudStack), and Cloud Portal Business Manager. Marketing is new to me; I have historically been involved in pre-sales and post-sales architecture, design, installation and operation of numerous products over the last 15 years or so. In addition I co-founded and co-host the Cloudcast (.net) podcast with Brian Gracely. We cover all aspects and trends in Cloud Computing including a recent spin off podcast due to popular demand hosted by Brian Katz called the Mobilecast.
ITKE: If you weren’t working in IT, you’d be…
AD: That’s a great question. I’ve been so heavily involved in IT for so long…I would have to say it would be something involved with a business at the beach. My wife and I take our family to the beach at least two or three times a year to get away and unplug. My kids love the water and beach so that time together is very special to us. My wife and I always joke that retirement would be an ice cream cart on the beach.
ITKE: Who’s one person you look up to in the IT world, and why?
AD: Actually two people, not well known in the IT community and both from my IBM days. I had the privilege of having two exceptional managers while I was at IBM that really shaped both my career and how I approach my daily work as well as my career. They both taught me the how of doing work is just as important as checking things off a list and moving on. They are both taught me to make sure I enjoy my work on a daily basis and not just collect a paycheck. If you enjoy what you are doing, everything else (including additional opportunities) just falls into place.
ITKE: How do you see the future of IT developing over the next decade?
AD: I see two major movements coming – mobile devices and the decentralization of IT resources. I believe IT departments as we see them today (operations centers) will become less prevalent over time and IT will become more of an aggregation point for decentralized services. We don’t live in a one solution fits all kind of IT world anymore. We need to match the use case and workload to a solution and we are just starting to see the introduction of the technologies to make this a reality.
ITKE: What advice would you give prospective IT workers (say college students)?
AD: Learn mobile platforms and play with public clouds. There are many aspects of mobile that need to be mastered (writing applications, API interfaces to external services, device management and data security) and this is a growing problem for traditional IT. Most traditional IT shops don’t have the skills to keep up with the pace of the demand. One of the strongest use cases I see today for public cloud is test/dev of mobile platforms. The two almost go hand in hand and I see that trend continuing over time.
Blog image via Shutterstock
Cloud computing, security, mobile, storage…these topics were all included in ITKE’s top blog posts for April. Find out what our bloggers were saying about each topic.
- Facebook Home on Android is a non-starter by Ron Miller (View From Above)
- Microsoft recalls security update from April Patch Tuesday by Toni Boger (The Windows Server Notebook)
- Kaspersky report shows why you need to keep your software up to date by Tony Bradley (The Security Detail)
- Storage playing key role in entertainment industry by Randy Kerns (Storage Soup)
- Disruption catches up with everyone, even Apple by Ron Miller (View From Above)
- Project secrets of Downton Abbey by Matt Heusser (Unchartered Waters)
- Is “build your own cloud” the new IT gym membership by Brian Gracely (From Silos to Services: Cloud Computing for the Enterprise)
- What do enterprises expect from OpenStack by Brian Gracely (From Silos to Services: Cloud Computing for the Enterprise)
- Nimble Storage adds reference architecture, new level of analytics by Dave Raffo (Storage Soup)
- Profiling the best Exchange Server professionals (April 2013) – Jeff Guillet by Matt Gervais (The Microsoft Messaging Exchange)
Identity security image via Shutterstock
Join us on May 7th at 11:00 AM EST for an exclusive live web chat with expert Peter H. Gregory who will answer your questions on planning your enterprise IAM integration.
The world in which successful IAM programs must be implemented is increasingly complex. This includes a mix of legacy on-premise IAM infrastructures, cloud-based IDaaS for hybrid cloud infrastructures, and mobile devices that are either an authentication token in disguise or a disaster waiting to happen. This supercast will lay out the pitfalls and opportunities of moving your current IAM solutions forward into highly integrated scenarios. How can IAM be delivered cost effectively? What are the emerging threats to these more exposed systems? What are the strategic advantages to forward-thinking IAM deployments? Expert Peter H. Gregory will answer all these questions and try to provide you with the right IAM program. Register today!