Welcome!

This Week in Cloud

CloudCommons 2012

Subscribe to CloudCommons 2012: eMailAlertsEmail Alerts
Get CloudCommons 2012 via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by CloudCommons 2012

Feature Article Insider Theft: WikiLeaks is not the only newsworthy breach By Merritt Maxim, CA Technologies Lost in the high profile media attention around WikiLeaks is the simple fact that WikiLeaks reflects a common security risk all organizations face - the threat from insiders.  While the sensitive nature of the WikiLeaks data has resulted in more media attention, the reality is that insider attacks are happening all the time.  Case in point is this week's story that the SEC has charged an employee of a Delaware law firm and his brother-in-law with insider trading. At first glance, this appeared to be a plain vanilla insider trading case. As I read the SEC lawsuit, I saw that this case was a bit different. Read the full article. Site Improvements for Cloud Commons Members We have just completed the first in a series of major functional enhancements – includin... (more)

This Week in Cloud

Featured on Cloud Commons Gartner report: The Cloud is Less Important than the Cloud Operating Model Do cloud service providers have a new and better approach to IT operations figured out – and can enterprises learn from them? In this report by Cameron Haight of Gartner (available free of charge on Cloud Commons), Cameron details new approaches to application and infrastructure architecture that some large public cloud firms are using to improve service delivery. Read the full report. Feature article On Cloud Computing Standards and Definitions When I go to the gas station these ... (more)

This Week in Cloud

Cloud Providers vs. Cloud Consumers – Survey results point to impending security standoff By Matthew Gardiner CA Technologies and the Ponemon Institute recently released the results of the second part of our two-part cloud security survey. The first survey focused on the security views of cloud consumers; this survey focuses on the security perspectives of cloud providers. Taken together the two surveys provide a stark contrast of the state of cloud security. To put it plainly, cloud providers and cloud consumers do not currently agree when it comes to security.  One of Ponemon'... (more)

TechViews: Neurocam scans your brains and records your interests, DevOps myth busters, Top 5 practices to ensure mobile security and more!

TechViews: Neurocam scans your brains and records your interests, DevOps myth busters, Top 5 practices to ensure mobile security and more! Gartner: How CIOs Can Show Support for Customer Experience Initiatives by Reprioritizing IT Projects* Customer experience initiatives are becoming increasingly popular and, as a result, increasingly demanded by C-level executives and board directors. Customer experience is viewed as a long-term strategic differentiator for businesses, and if organizations are going to be serious about it, they need to reprioritize future IT project investments.... (more)

Red Hat Acquires Makara, Cisco Acquires LineSider, and More…

Feature Article As cloud computing changes IT roles, which IT jobs are on the ‘endangered species list’? By Jay Fry, CA Technologies During my recent Cloud Expo presentation titled ‘How Cloud Computing is Changing the Role of IT and What You Can Do About IT,’ I took the opportunity to ask the audience which IT job titles were or were not going to exist any longer as a result of cloud computing. There was no shortage of opinions. Here’s a summary of the presentation I gave, plus a few comments from the audience thrown in for color. Read the full article. Cloud News Red Hat is a... (more)