March, 2016

3 tips for successfully migrating data to the cloud

David Linthicum

If your enterprise is ready to move data to the cloud, you need to think long and hard about how to migrate the right way. The use of public cloud providers as hosts for big data or transactional data is the real killer use of public clouds. Consider how much enterprises spend on data management these days, which can be as high as 70 percent of IT spending. The use of public clouds can drastically reduce those expenditures. [

Corporate IT: Four Risks to Avoid When Your Company is Digitizing


Foto Friday – Shorebird at work

Eric D. Brown

Not sure on the ID on this shorebird…I never can seem to ID them correctly. Captured in Port Aransas a few years ago with a Canon 7D and Canon 400 5.6 See more photos in my flickr photostream and/or my 500px portfolio.


Facebook Data Centers: Huge Scale at Low Power Density

Data Center Knowledge

Assisted by progress in networking technology, extreme disaggregation has enabled unprecedented efficiency gains for the social network Read More. Data Center Design Facebook Featured Networking Open Compute Power

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

8 Steps for Using Azure AD Service Principal Certificate Authentication with Azure Automation PowerShell Workflow Runbooks

IT Pros Rock!

Lately, I’ve been working with several customers that are getting started with Azure Automation runbooks to help operationalize their Microsoft Azure subscriptions. As part of this process, runbooks need to securely authenticate to Azure with a minimum of administration overhead.

More Trending

The cloud's missing link: Monitoring and management

David Linthicum

Monitoring and management of cloud-based production environments is often an afterthought. Perhaps there is so much to think about -- security, cost management, and governance -- that monitoring and management fall by the wayside. Or perhaps IT believes it simply can use clouds' native tools. Monitoring and management are important to any data center, whether in the cloud or not.

Tools 159

Corporate IT: The Five Types of Support Your Teams Need for IT Transformation


“Transformation” projects that involve significant upheaval to job descriptions, reporting lines, goals, and funding are an almost constant occurrence in most corporate IT teams around the world. Despite this, many teams still take a project-by-project approach to managing it all.

Get the basics first, then go big

Eric D. Brown

I’m not a basketball fan so I wouldn’t normally have caught a great quote from the Golden State Warriors head coach Steve Kerr after a recent loss.

Go on a Virtual 360-Degree Google Data Center Tour

Data Center Knowledge

A rare look inside one of the world’s largest and most sophisticated data center Read More. Cloud Computing Data Center Design Data Center Videos Google

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The Combination of Cloud & Mobile and its Grip on B2B Automation – Part 2

The Investing Edge

We’ve established that the synergy between Cloud and mobile is both powerful and undeniable (as outlined in Part 1). We are not alone in this assertion.

B2B 130

MicroSoft Fields Self Learning AI That Quickly Learns To Be Rude, Sexist and Racist


Bob Gourley. Tyrell : The light that burns twice as bright burns half as long - and you have burned so very, very brightly, Roy. Look at you: you're the Prodigal Son; you're quite a prize! Batty : I've done. questionable things. Tyrell : Also extraordinary things; revel in your time.

Why data in the cloud changes everything

David Linthicum

In my conversations this week as a moderator at the Structure Data conference, it was clear that some companies are stretching the boundaries of using data in the cloud. But what patterns are emerging in the use of data in the cloud? Read the InfoWorld reviews: " Amazon eases developers into IoT " and " Azure brings IoT to.Net developers." | Stay up on cloud happenings with InfoWorld's Cloud Computing newsletter. ]. First, we've only starting to see the value of data.

20 Influential Chief Information Officers

A CIO's Voice

20 Influential Chief Information Officers from Michael Krigsman. As the Chief Information Officer role become increasingly prominent, it is important to recognize CIOs who actively stake a claim as innovators and communicators.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Foto Friday – Glacier Valley under the clouds

Eric D. Brown

This is another capture from our trip to Glacier. A few of the days we were there, the area was covered with either smoke or clouds, which made it difficult to get a good photograph. That said, this Black & White turned out nicely.

Cloud 130

How Open Source is Changing Data Center Networking

Data Center Knowledge

As telcos race to virtualize networks, open source communities are where networks of the future are forged Read More. Connectivity Equinix Facebook Featured Infrastructure Networking Virtualization

RSA 2016: Key Takeaways

The Investing Edge

This year’s RSA conference was bigger than ever with more than 40,000 attendees. San Francisco buzzed with security vendors, buyers and investors as they crowded the lobbies of hotels and coffee shops with endless meetings.

Hotels 130

What’s The Biggest Data Security Threat In Your Business? The Answer Might Surprise You


William Hayles. As an admin, it’s your job to be paranoid. But you might be worrying about the wrong things. You might be overlooking the biggest threat to your servers. Pick your poison, folks - there’s no shortage of boogeymen in the cybersecurity space.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Moving to the cloud? First choose the right apps

David Linthicum

Most enterprise IT shops have more than 1,000 applications they must understand or relearn before moving any of them to the cloud. You simply can't move your apps en masse. Because some workloads make sense for the cloud, and some do not. Here's my guide on how you can assess which are good candidates for a move to the cloud.

Exploit Kits 101 – How A Typical Exploit Kit Functions

Doctor Chaos

A Exploit kit is collection of redirection pages, landing pages, exploits and payloads designed to automatically infect users for a revenue stream. Exploit kits are typically not using targeted attacks meaning they try to get any system on the internet that is vulnerable to access their website and usually deliver ransomware. Examples of exploit […]. Hacking exploit hacking malware

Foto Friday – Great Blue Heron in Profile

Eric D. Brown

This is a Great Blue in Profile from a few years ago. Captured with Canon 7D and Canon 400mm 5.6 See more photos in my flickr photostream and/or my 500px portfolio.


LinkedIn Adopting the Hyperscale Data Center Way

Data Center Knowledge

Social network’s infrastructure team rethinks its strategy so it can scale better Read More. Blades Data Center Design Data Center Strategies Featured LinkedIn Networking Oregon

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

5 Things That CIOs Need To Be Doing In Order To Protect Their Networks

The Accidental Successful CIO

CIOs had better be doing all five of these network protection actions Image Credit: svenwerk. By now I think that we all realize that we are living in dangerous and challenging times.

Organizations Affiliated with the National Cancer Moonshot Can Now Leverage Advanced Machine Learning and Analytics and Interoperablity Solutions From Tamr


Katie Kennedy. During President Obama's 2016 State of the Union Address, Vice President Joe Biden was called to lead a new, national “Moonshot” initiative to eliminate cancer. Last month, the White House announced a new $1 billion initiative to jumpstart this effort.

Apple and Dropbox dump AWS -- should you?

David Linthicum

Both Apple and Dropbox are moving at least some of their cloud services away from Amazon Web Services' public IaaS cloud. Apple reportedly is moving part of its cloud infrastructure to Google's Cloud Platform, while Dropbox is moving to its internal infrastructure (that is, its own private-cloud data centers). No one should be surprised, and no one should take this to mean that AWS is in trouble.

Apple 159

Finding a Framework for Hybrid Cloud Risk Management

Cloud Musings

(Sponsored by IBM. Originally published on Point B and Beyond ) Hybrid cloud is rapidly becoming essential to today’s information technology processes. This is why hybrid cloud risk management has become the keystone to many modern corporate strategies.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.