Use of Cloud Computing and Virtualization in the Time of Recession

Cloud Computing on Ulitzer

Subscribe to Cloud Computing on Ulitzer: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Computing on Ulitzer: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Cloud Computing on Ulitzer
Welcome to 2018! If the kids in the back seat have been chanting, ‘Are we there yet?, Are we there yet?’ you can tell them, ‘Yes! Now, Get out the car!’ If, like me, you’ve taken a couple weeks off to enjoy the holidays and New Year, you might be wondering where to start again […...
In this Lightboard Post of the Week, I answer a question about 2FA and SSO with AD/RSA on BIG-IP by creating a SSO Credential Mapping policy agent in the Visual Policy Editor, that takes the username and password from the logon page, and maps them to variables to be used for SSO servic...
If you missed our initial issue of the DC Chronicles, check it out here. The Chronicles are intended to keep you updated on DevCentral happenings and highlight some of the cool articles you may have missed over the last month. Welcome. First up, 2018 will be the year that we publicly o...
Today, let’s take a look at Application Connector. Application Connector connects public clouds to your application service infrastructure within cloud interconnects or data centers. This enables the use of public cloud resources as part of your compute infrastructure while also perfor...
Last week we covered the basic overview of Application Connector and this week we’ll look at how to set it up. [The link to the setup guide] Settle in, this is detailed. F5 Application Connector is made up of two components: The Proxy and the Service Center. Step One is to set up the S...
byKevin L. Jackson & Dez BlanchfieldToday’s real business innovation is happening at the seams of industries. Moreover, after listening to this podcast between Sanjay Rishi, GM Global Cloud Consulting Services at IBM Global Business Services, and Dez Blanchfield, you will understan...
Graeme Thompson, SVP/CIO InformaticaThe Big Pivot Podcast explores Digital transformation and its effect on every business in every industry. In exploring the business benefits of data-driven transformation, it is for CIOs who want to have a real impact on serving customers, empowerin...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
Credit: Shutterstockby Kevin Jackson & Dez BlanchfieldIBM recently launched an exciting new project in the form of a podcast series produced and hosted Dez Blanchfield, appropriately titled the “Pioneers Of Possible. This new podcast series sets out to connect listeners from a...
Over the past few years, the data storage market has changed radically. The traditional hierarchy of directories, sub-directories, and files referred to as file storage has given way to object storage, individual storage objects. While file storage was designed to help humans interact ...
By Kevin Jackson & Dez BlanchfieldDigital Transformation often needs Intelligent Automation. This type of change is the focus of a recent “Pioneers of Possible” podcast.  In discussion with Elli Hurst - Vice President, Global Automation - IBM Global Business Services (GBS), De...
A few years ago – in the early days of Blockchain – a lot of people were taken with the idea of a multifunctional chain on which all transactions could be handled. After Ethereum was launched in 2014, its advocates were talking themselves hoarse about the transformative opportunities t...
2017 was the year of ransomware. Ransomware has been around for years, but the victims were typically non-technical consumers: the impact, although serious from the victim's perspective, was limited. In 2017 we've seen huge ransomware attacks close down hospitals and businesses, puttin...
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2017 entries. If you missed any of the 64 attempts including 16 videos, here they are wrapped in one simple entry. I read somewhere ...
Robotic process automation (RPA), a concept that has emerged over recent years, is still in a state of rapid evolution, existing without a clearly defined end-state or direction. As such, vendors are experimenting and pushing their products into uncharted waters - successfully or other...
While walking around the office I happened upon a relatively new employee dragging emails from his inbox into folders. I asked why and was told, “I’m just answering emails and getting stuff off my desk.” An empty inbox may be emotionally satisfying to look at, but in practice, you shou...
SAP HANA was released as a work in progress. Tenants could leverage the increased speed of the HANA database immediately, but had to wait for the updated SAP S/4HANA applications to be released. Each release has allowed applications to more fully harness HANA, creating new, compelling ...
Following a tradition dating back to 2002 at ZapThink and continuing at Intellyx since 2014, it’s time for Intellyx’s annual predictions for the coming year. If you’re a long-time fan, you know we have a twist to the typical annual prediction post: we actually critique our predictions...
In this Lightboard Post of the Week, I answer a few questions about SSL/https on Virtual Servers. BIG-IP being a default deny, full proxy device, it’s important to configure specific ports, like 443, to accept https traffic along with client and server side profiles and include y...
For better or worse, big data has irrevocably altered the digital landscape. The explosion in variety, velocity, volume and value of information presents an abundance of previously unimaginable opportunity. But it also creates a number of challenges that need to be successfully navigat...
Net Neutrality rules were originally enacted to ensure that all Americans would have equal access to a free and open Internet. We can argue about what Net Neutrality rules did and did not accomplish in a moment, but now I want to explore the most sensational of all the post–Net Neutral...
Troubleshooting a problem on a remote server, especially in production, is not an easy task. Sometimes it involves debugging the application code directly on the server. But the production servers are usually run in a strict environment, where not all convenient developer tools are av...
Data Monetization! Data Monetization! Data Monetization! It’s the new mantra of many organizations. But what does “data monetization” really mean, how do you do it, and more importantly, who in the organization owns the job of “data monetization”? The role of Chief Data Officer (CDO)...
Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices. Intel’s Kaitlin Murphy has some pointers to assure that your PC fleet and mobile de...
( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.) ↑ Grab this Headline Animator( Thank you. If ...
An update to the Web Content Accessibility Guidelines (WCAG) is coming. Did I lose you already? If you're not familiar with WCAG, it's a collection of guidelines that developers, designers and accessibility experts use to help ensure the apps and websites they create are accessible to ...
Agile CRM is the world’s first fully integrated sales, marketing, and service suite for growing businesses delivered as a cloud-based Software as a Service. The solution was designed to address the challenge of centralizing essential customer data. Agile CRM enables the critical data y...
The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through s...
identify the sources of event storms and performance anomalies will require automated, real-time root-cause analysis. I think Enterprise Management Associates said it well: “The data and metrics collected at instrumentation points across the application ecosystem are essential to per...
The benefits of automation are well documented; it increases productivity, cuts cost and minimizes errors. It eliminates repetitive manual tasks, freeing us up to be more innovative. By that logic, surely, we should automate everything possible, right? So, is attempting to automate eve...
Digital experience monitoring plays a vital role in the ecommerce economy. The industry is booming with millions of websites selling everything imaginable. Online stores are expected to be super fast and easy to navigate; users are quick to assess website performance and if said percei...
One problem that all developers and companies struggle with is trying to decide if they should "build it" or "buy it". Software developers love to build things. That is what we do! Their natural reaction tends to lean towards building things. We are also always up for a new challenge. ...
IBM Watson IoT is a cloud-based platform to build enterprise IoT solutions. For developers, it offers an intuitive mechanism to connect devices, ingest sensor data, and build mobile and web applications to control the connected devices. In this tutorial, we will connect two Raspberry P...
These days, no matter what task you’re trying to accomplish within your online properties, chances are there’s at least one cloud solution that provides it. However, with so much of our personal and business data living now online, there’s perhaps no functionality more important than c...
MongoDB, an open-source document store and most popular NoSQL database on the market today, offers a variety of advanced features to administer security over your MongoDB deployments. In this tutorial post, we’re going to show you how to set up role-based access control (RBAC) to manag...
Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email, images, and videos. Storage of this form of data is typically in an object format which differs signi...
While having a reliable monitoring solution for your application is important, being able to parametrize and configure thresholds and alerting is even more critical. No matter what kind of market your business is in, your web applications have seasonal patterns. For example, the loa...
Digital transformation has changed the way users interact with the world, and the traditional healthcare experience no longer meets rising consumer expectations. Enterprise Health Clouds (EHCs) are designed to easily and securely deliver the smart and engaging digital health experience...
Artificial intelligence, virtual reality, software-defined networking, Hyperconverged Infrastructure, the cloud. These are all technological advancements intended to improve how IT systems and operations work, to give the business better agility and reduced costs, and ultimately to giv...
Today’s hyper-connectivity of both people and things has led to an enormous jump in network traffic. Global IP traffic will increase nearly threefold over the next five years. It’s not going to lessen, nor is it going to get slower. These factors create a need for high-speed networks t...