article thumbnail

10 cloud strategy questions every IT leader must answer

CIO Business Intelligence

Workloads with unpredictable demand such as mobile apps or websites may belong in public cloud, whereas efficient, virtualized, steady-state applications with predictable usage may not benefit from migration. Importantly, you should also indicate the goal for the workload (e.g., Are we taking advantage of cloud-native benefits?

Strategy 143
article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. Virtualization. What does this mean?

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Good Read: Web 2.0 Security Dangers - Social, Agile, and.

Social, Agile and Transformation

Application layer technology can be expensive and hard to implement, however: …finds it appalling that 97 percent of organizations are still using packet filters as their firewalls when the threat vector switched five years ago to the application layer. "So agile software development. (56). offshore development. (6).

Agile 100
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Previously, Webster held positions in sales and services at companies like Microsoft and FAST Search and Transfer and in software development at firms like Time Inc. Webster has a deep background in the content management and search industries, and brings more than 20 years of hands-on software and services management.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Previously, Webster held positions in sales and services at companies like Microsoft and FAST Search and Transfer and in software development at firms like Time Inc. Webster has a deep background in the content management and search industries, and brings more than 20 years of hands-on software and services management.

article thumbnail

When least privilege is the most important thing

CIO Business Intelligence

Another problem with mobile application security is the speed with which individuals can develop and deploy new apps. Unless security is mandated by policy or regulations, developers will place least privilege and other security principles as their lowest priority. Implement compensating controls.

Backup 124
article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Patrick Kremer writes about using vRealize Log Insight Cloud to monitor for firewall changes in a VMware Cloud on AWS environment.

Vmware 60