Monday, October 26, 2009
Hot off the Press - Eight Myths of Cloud Computing
Posted by
Tarak, TekNirvana.com
As Taylor Rickard, chief technology officer of G&B Solutions, so eloquently puts it, “Ask 25 people what cloud computing means and you are likely to get 30 different definitions.” With so much disinformation out there, is it any wonder that there are so many myths associated with clouds? My latest article dispels eight of the most common myths.
Read the complete article here
Friday, October 23, 2009
Hot off the Press - Open Government - Five Key IT Issues
Posted by
Tarak, TekNirvana.com
We have barely scratched the surface regarding social media use in the pursuit of an Open Government. The root problem is an "impendence mismatch" between the federal operating environment and the technology -- namely, a federal environment that is still very 20th century and a technology that is very 21st century.
Interested?
Read my latest article Open Government - Five Key IT Issues.
Tuesday, October 13, 2009
Hot off the Press - The Cloud SOA Ecosystem
Posted by
Tarak, TekNirvana.com
The union of SOA and the cloud goes beyond a simple convergence – it actually represents an ecosystem. Read my feature article on ebizQ titled The Cloud SOA ecosystem to find out why.
Thursday, October 8, 2009
Can Cloud Defend Against DDoS Attacks?
Posted by
Tarak, TekNirvana.com
I just came across an interesting blog entry titled Can Cloud Defend Against DDoS Attacks? on Govinfo Security, an educational portal catering to security professionals in the Federal Government space.
The blog entry makes an intersting observation claiming that:
"...cloud computing services, such as Google's App Engine and Amazon's Elastic Compute Cloud, or EC2, provide flexible hosting resources that can grow to accommodate a surge in demand. Imagine if the agencies that were affected by the [DDoS] attacks had been sitting in the cloud when the malicious traffic started rolling in. The ability to disrupt agency websites becomes a function of how much capacity Google and Amazon have to support the requests. These providers likely have plenty of bandwidth to sustain the attack and provide service with little to no service disruption.
Here's my problem:
Claiming that "cloud computing services, such as Google's App Engine and Amazon's Elastic Compute Cloud, or EC2, have plenty of bandwidth to sustain a DDoS attack" is akin to arguing that "you can tolerate the cold winter better by becoming fatter."
Is the fact that we have more scalabilty even relevant in a discussion about security?
The blog entry makes an intersting observation claiming that:
"...cloud computing services, such as Google's App Engine and Amazon's Elastic Compute Cloud, or EC2, provide flexible hosting resources that can grow to accommodate a surge in demand. Imagine if the agencies that were affected by the [DDoS] attacks had been sitting in the cloud when the malicious traffic started rolling in. The ability to disrupt agency websites becomes a function of how much capacity Google and Amazon have to support the requests. These providers likely have plenty of bandwidth to sustain the attack and provide service with little to no service disruption.
Here's my problem:
Claiming that "cloud computing services, such as Google's App Engine and Amazon's Elastic Compute Cloud, or EC2, have plenty of bandwidth to sustain a DDoS attack" is akin to arguing that "you can tolerate the cold winter better by becoming fatter."
Is the fact that we have more scalabilty even relevant in a discussion about security?
Friday, October 2, 2009
What are Enterprise IT Geeks Obsessed With Today?
Posted by
Tarak, TekNirvana.com
I've been swamped at work responding a RFP in which I am writing about security, C&A, CMMI, ISO, and a host of other things. I needed a break when I saw that a new question just popped up on the ebizQ forum:
"What are Enterprise IT Geeks Obsessed With Today?"
LOL... Now how could I possibly answer this question? :)
However, if in some parallel universe, I were an Enterprise IT Geek then I would be obsessed with:
A. Justifying all of the acronyms we have today,
B. Coming up with new and improved reasons as to why all the above are still not enough to create an "enterprise" solution on time and on budget, and
C. A program that generates new, sensible sounding acronyms that I would say are essential to getting what I stated was missing in B (above)
This would be an iterative process in its entirety and in between stages and its implementation would beg, borrow, and steal from the best-of-breed Agile processes (XP, Scrum, etc.).
But then, as I stated before, I'm not a Geek, so what would I know? :)
Enough said... now it's time to get back to work!
"What are Enterprise IT Geeks Obsessed With Today?"
LOL... Now how could I possibly answer this question? :)
However, if in some parallel universe, I were an Enterprise IT Geek then I would be obsessed with:
A. Justifying all of the acronyms we have today,
B. Coming up with new and improved reasons as to why all the above are still not enough to create an "enterprise" solution on time and on budget, and
C. A program that generates new, sensible sounding acronyms that I would say are essential to getting what I stated was missing in B (above)
This would be an iterative process in its entirety and in between stages and its implementation would beg, borrow, and steal from the best-of-breed Agile processes (XP, Scrum, etc.).
But then, as I stated before, I'm not a Geek, so what would I know? :)
Enough said... now it's time to get back to work!
Subscribe to:
Posts (Atom)