Category: Cloud Computing

Counterproductive

Counterproductive Actions Broadcom Can Take to Derail VMware’s Future

Perhaps nothing dominated the conversation at this year’s VMware Explore more than Broadcom’s pending acquisition of VMware. Whether I spoke with other analysts or end-users and vendors on the show floor, the topic inevitably came up. In almost every case, they expressed concerns about the counterproductive actions that Broadcom may take that would derail VMware’s future.

Read More
Kubernetes logo

A Primer on Kubernetes Concepts and Terms

Like with all new technologies, Kubernetes comes with its set of challenges. Among them, it comes with its own jargon. To understand Kubernetes, it helps to first understand common concepts and terms it uses. The following list serves as a primer to define common concepts and terms that individuals will encounter when working with Kubernetes.

Read More

Cloud Adoption Shifts Power to the Developer

Over the last decade, power in enterprise IT has shifted away from infrastructure specialists such as storage administrators and network administrators to virtualization administrators and even application owners. The current wave of enterprise cloud adoption is again shifting power within organizations, this time to application developers. This has several implications for businesses that are in the midst of this transition.

Read More

HPE Predicts Sunny Future for Cloudless Computing

Antonio Neri, CEO of HPE, declared at its Discover event last week that HPE is transforming into a consumption-driven company that will deliver “Everything as a Service” within three years. In addition, Neri put forward the larger concept of “cloudless” computing. Are these announcements a tactical response to the recent wave of public cloud adoption by enterprises, or are they something more strategic?

Read More

Four Ways to Achieve Quick Wins in the Cloud

More companies than ever want to use the cloud as part of their overall IT strategy. To do so, they often look to achieve some quick wins in the cloud to demonstrate its value. Achieving these quick wins also serves to give them some practical hands on experience in the cloud. Incorporating the cloud into your backup and disaster recovery (DR) processes may serve as the best way to get these wins.

Read More

Two Hot Technologies to Consider for Your 2019 Budgets

Hard to believe but the first day of autumn is just two days away and with fall weather always comes cooler temperatures (which I happen to enjoy!) This means people are staying inside a little more and doing those fun, end of year activities that everyone enjoys – such as planning their 2019 budgets. As you do so, solutions from BackupAssist and StorMagic are two key new technologies for companies to consider making room for in the New Year.

Read More

Proven Investment Principles Can Guide Your Cloud Strategy

Living in Omaha, Nebraska, one cannot help but be influenced by Berkshire Hathaway and its CEO, Warren Buffett, one of the wealthiest men in the world, when it comes to making investment decisions. However, the process that Berkshire Hathaway uses to make investment decisions has multiple other applications to include helping guide you in making decisions about which cloud technologies to adopt and when

Read More

Two Insights into Why Enterprises are Finally Embracing Public Cloud Computing

In between my travels, doing research, and taking some time off in May, I also spent time getting up to speed on Amazon Web Services by studying for the AWS Certified Solutions Architect Associated exam in anticipation of DCIG doing more public cloud-focused competitive research. While I know it is no secret that cloud adoption has taken off in recent years, what has puzzled me during this time is, “Why is it now that have enterprises finally started to embrace public clouds?”

Read More

Hackers Say Goodbye to Ransomware and Hello to Bitcoin Mining

Ransomware gets a lot of press – and for good reason – because when hackers break through your firewalls, encrypt your data, and make you pay up or else lose your data, it rightfully gets people’s attention. But hackers probably have less desire than most to be in the public eye and sensationalized ransomware headlines bring them unwanted attention. That’s why some hackers have said goodbye to the uncertainty of a payout associated with getting a ransom for your data and instead look to access your servers to do some bitcoin mining using your CPUs.

Read More

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.