Tuesday, December 7, 2010

Cloudy on Cloud computing?

It’s not just the Cloud, but Clouds.

Just as you access multiple cable channels you can access multiple clouds.

A good way of thinking about The Cloud is like cable channels. You have a basic package and can add as many other channels both paid and free as you work in the Cloud.

The three segments of cloud computing:

1. Cloud Infrastructure, the hardware and other infrastructure to be a cloud provider.

2. Network Services, which provides the interconnection between all the points of a cloud, including the connection from the client to the cloud provider.

3. Cloud Applications which concerns specific applications that would be accessed in the cloud instead of on-premise, such as HR, CRM or document management -- what's commonly known as software-as-a-service.

As the IT industry moves to cloud computing one fact remains unmistakable: the cloud, still has to exist in the physical world as a data center full of heavy iron and humming like the factory that it is -- a factory manufacturing compute cycles.

The biggest legitimate cloud provider is Google, made up of 500,000 systems, 1 million CPUs and 1,500 gigabits per second (Gbps) of bandwdith. Amazon comes in second with 160,000 systems, 320,000 CPUs and 400 Gbps of bandwidth, while Rackspace offers 65,000 systems, 130,000 CPUs and 300 Gbps.

You access one very secure cloud when you do online banking. You access another cloud when you buy online music for example. The payment for the music may come from the banking cloud so their connected but separate.

It is generally agreed that this dark web is much larger than the World Wide Web.

The world wide web could be considered one cloud, but it’s not the only cloud. There are clouds referred to as being in the dark web.

This is information that is not indexed by the popular search engines. It is shared on the web but only to authorized users. Most of the time this information is accessed through VPN’s (virtual private networks) and you need credentials to log on. Companies large and small collaborate and share information this way.

For more information on managing you data in the cloud, contact me or visit my website http://www.paulgoda.com

Monday, November 8, 2010

G-Cloud Security

A very robust solution to Cloud security by a name you know.
HP Labs shares its vision of how cloud computing
could transform public sector IT services

One major impediment to the adoption of cloud computing has been a fear of placing sensitive data up ‘in the cloud.' That's an especially serious concern for government officials charged with managing services – such as healthcare, criminal justice, and defense – that require the storage of highly personal or secret information.

It's one reason why governments want to create their own cloud networks, rather than run their services on public cloud systems.

Martin Sadler, Director, Systems Security Lab.
Martin Sadler, Director,
Systems Security Lab.
Virtualization as a solution to the security challenge
To achieve their potential, cloud networks necessarily separate service providers from the providers of the software and hardware infrastructure that run those services.

"But that begs the question of who is taking care of security," says Martin Sadler, Director of HP's Systems Security Lab. "With all of those handovers and all those different groups of people, it can be anyone's guess."

One solution to this problem is to exploit the very technology that makes cloud computing possible: virtualization. By running virtual systems on top of actual, physical infrastructures, cloud networks can dynamically shift workloads to efficiently accommodate demand within the physical resources available.
Similarly, the job of security can itself be virtualized.

"In effect," says Sadler, "you create virtual machines to watch other virtual machines.

" HP's G-Cloud Demonstrator shows a G-Cloud automatically protecting itself in this way using security technology developed in Sadler's lab. It also allows the cloud system to be viewed from a number of perspectives.

"For some people concerned with security, a top-level view of the system is the only thing that matters," Sadler notes. "But then other people want to see different levels of abstraction, all the way down to those who want to see packets flying around. And with this Demonstrator, you're actually able to do that."

As a result, IT administrators can alter how they think about security. "It's now a resource," argues Sadler. "The moment you think you're under attack, the systems deploy more resources dynamically to mitigate it. But the moment you cease to be under attack, it releases those resources back up."

Goda's note. This is a synopsis to read the full article click here.

Friday, November 5, 2010

Code

Interested in learning website design using Microsoft Expression Web?

I started writing HTML years ago by hand. Have tried or used many programs over the years but found most of them to be lacking in some way or the other. I always had to fall back on hand coding to clean up the messy code that these programs produced.

Expression Web while not perfect is the best I’ve used so far. For anyone familiar with other Microsoft products it’s pretty easy to learn. But every one needs help at one time or another.

I have been lucky to have an older cousin willing to help me over the years. Having some one to call or send my code for him to check has saved me from wasting a lot of time and frustration.

If you would like an older cousin’s help call 704-651-0585 or email paul@paulgoda.com. To see my work visit http://paulgoda.com/

Friday, August 13, 2010

America: A new way forward?

"Even if the economy eventually recovers all the losses of the recession, the Federal Reserve estimates that it will take five or six years to return to full employment. The pain of the Great Recession may last for the best part of a decade.


Obama administration’s goal of doubling exports within five years." 


Of what? 


Read this Financial Times article if you want to know what our choices on the economy look like for the next few years.

http://www.ft.com/cms/s/0/3589e870-a63d-11df-8767-00144feabdc0.html

Tuesday, December 15, 2009

Along with the P’s of marketing we now have the C’s

Relevant user generated content delivered in a context that makes it easy for people to make connections and build a community based on a shared interest.

Wednesday, November 25, 2009

Viral Micro Marketing in Charlotte, NC.

“Micromarketing is the practice of tailoring products and marketing strategies locally within a smaller region such as city and/or county. This practice of marketing is common with mom and pop restaurants, grocers, and other small business establishments that cater to a local audience. Micromarketing includes the practice of individual marketing where a marketing message is crafted more personally to a buyer.” 

Monday, November 23, 2009

What me worry

A must read for anyone interested in how new media effects us all.


A tweet from GuyKawasaki leads me to an excellent article by Buzz Canuck “16 Social Media Trends for 2010.

That’s how information moves in new media.

Mass Marketing is an oxymoron. Micro Marketing is the new meme.

7) Brandividuals - borrowing the term from David Armano that suggests personal brands = corporate brands - the myth that you can have a personal life and a professional life in social media simultaneously continues to wither away


Or my favorite

with Google Wave, never again will you be stuck in an email back and forth,  think about WebEx for consumers.

There are things we simply have to do like answering our email but how much more involved do I have to be? Do I need a blog; is twitter a required business skill for anyone doing business in the twenty first century?

What happens when you or your company is picked up because of for good or bad you’re part of a really interesting story? How prepared am I for my fifteen minutes of internet fame?

14) Word of Mouth Marketing - despite all form of exciting new tech and media advancements, the power of the human voice still ranks #1 ...and rising

He finishes this great article with this prediction:  Estimates are as high as 90% of internet traffic and 64% of mobile traffic will be video-based by 2013.

What will happen to broadcast TV with that many people’s eyes glued to the ultimate reality show, one that we all create together?

Next, is Google Wave the next big thing?