In the previous decade and the beginning of this one, Server Load Balancing (SLB) reigned supremely in the web data center. Lately, a new class of products is replacing the older load balancers. These products are known as Application Delivery Controllers (ADC) and in the following paragraphs I will share my thoughts on the reasons for that. more
Eric Schmidt, CEO of Google, was interviewed at Gartner Symposium on the future of the Web and enterprise computing. Eric said to about 5000 CIOs attending the event, that Chinese will soon be a dominant language on the net and broadband connections will be so fast that various forms of media -- such as radio and TV -- will be blurred. more
The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users' data. This is an unfortunate and completely avoidable event that Microsoft's Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There's plenty of theories as to what went wrong -- the most credible being that a SAN upgrade was botched, possibly by a large outsourcing contractor, and that no backups were taken... more
During a presentation at the Interop Conference currently ongoing in Los Vegas, Mike Repass, Product Manager at Google, informed the audience that a new cloud storage service will be rolled out by Google within weeks. The role out is part of Google's expansion of its AppEngine platform which is said to offer similar security infrastructure as Gmail and Google Apps. "[T]he app partitioning and isolation are the same best of breed technology approaches that Google is developing for the rest of its customer base," Repass said. more
A recent paper released by by Urs Hölzle and Luiz André Barroso of Google's infrastructure design and operations team provides an introduction into today's high scale computing along with factors influencing their design, operation, and cost structure. From the abstract: "As computation continues to move into the cloud, the computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers. These new large datacenters are quite different from traditional hosting facilities of earlier times and cannot be viewed simply as a collection of co-located servers..." more
A US District Judge in Maine largely granted a motion to dismiss brought by Hannaford in a big data breach case... According to the court, around March 2008, third parties stole up to 4.2 million debit and credit card numbers, expiration dates, security codes, PIN numbers, and other information relating to cardholders "who had used debit cards and credit cards to transact purchases at supermarkets owned or operated by Hannaford." more
The Cloud Manifesto, a collaborative document prepared jointly by Amazon, Google, IBM and others has apparently upset Microsoft. In a blog post entitled "Moving Toward an Open Process on Cloud Computing Interoperability" and penned by the senior director of developer platform management for Microsoft, Steven Martin, Mr. Martin stated his position that the Cloud Manifesto and the process of creating it was biased to benefit its authors, and unfair to their competitors – such as Microsoft... more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 3 of this series I began to discuss Cisco technologies as a standard for enterprise data security. In this article we take a look at how Cisco firewall and packet filtering technologies can be used at the network perimeter to enhance enterprise security. more
The penny dropped when I started looking at cloud computing as a service rather than a new technology. In that respect it is more like Google search and a DotCom development than a set of software and hardware tools. That was what I needed to get a better strategic grip on this new concept. As with all services, business strategies are key here, rather than technologies. As soon as it is seen as a technology customer issues often come in second, which then leads to a technology looking for a market... more
Contrary to conventional wisdom, the vast majority of business and IT executives report that cloud computing is a viable technology option that can improve a company's bottom-line results according to a new global survey conducted by an independent market research firm. However, despite growing evidence that cloud-based systems have the potential to lower costs, the majority of companies report no plans to integrate cloud computing in the next 12 months... more
I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more
As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more
According to a new study by PGP Corporation and Ponemon Institute, data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007. The study is based on 43 organizations across 17 different industry sectors with a range of 4,200 to 113,000 records that were affected. It is also noted that since 2005, the cost component has grown by more than $64 on a per victim basis since -- nearly a 40% increase. more