|By Pat Romanski||
|May 31, 2014 01:00 PM EDT||
"While cost has traditionally been a foundational benefit of the cloud, we believe that other factors can play a more important part in defining the cloud of tomorrow," said Todd Gleason, Vice President of Technology at FireHost, in this exclusive Q&A with Cloud Expo conference chairs Larry Carvalho and Vanessa Alvarez. "We believe that the generalist cloud provider - those low-cost commodity clouds that created price competition and insecure clouds - are going to either be gobbled up or beaten up as the industry evolves from this generalist mentality to focus on specialist clouds that have a particular focus."
Cloud Computing Journal: How are cloud standards playing a role in expanding adoption among users? Are standards helping new business models for service providers?
Todd Gleason: Standardization is important, but we're concerned because security desperately needs to be part of this effort. It is not addressed enough, if at all. Much of the open standards work in cloud and other IT technologies traditionally is not security-conscious, making adoption riskier than many want to admit or truly understand. So, while standards are a good thing, we believe security should be baked in at their inception. We advocate for innovation, but it's important that the innovative spirit is not blind to the need to protect vendors and customers.
Cloud Computing Journal: How are hybrid clouds evolving to allow the coexistence of private and public clouds? What are the challenges to meeting a true hybrid cloud scenario?
Gleason: Too much attention and marketing real estate has been paid to debating the merits of public, private and hybrid clouds. Definitions of what's public, what's private and what's hybrid are wide-reaching and are often created to suit a vendor's point of view rather than an educational, objective delineation for the industry. From where we sit, use cases and security are key to disarming this debate. The conversation needs to shift from which model is best in general to which one is appropriate for an individual vendor, provider, or customer, and it must address and incorporate security because regardless of the model chosen, a cloud is insecure unless it's built secure. Use cases vary for industries and individual companies, but security is a common denominator and applicable for all of them. This is where the industry discussion needs to shift.
Cloud Computing Journal: Are on-premise software vendors successfully migrating their business model to a SaaS model? What are the challenges faced in this journey?
Gleason: Most are and the bigger question is how effective will they be at delivering from the cloud and will it be secure. Will they expand their business model and provide infrastructure, or will they stay in their niche as software only players? And for those who do not migrate, will they become more inefficient and outdated?
Cloud as a delivery vehicle is the next wave of the Internet, especially as automation, software techniques, and infrastructures adapt toward applications and servicing their performance more and more. The efficiencies of today are miles ahead of an insulated, on-premise software solution - a situation that gets much sweeter when security is architected into the infrastructure. However, we are not even close to being a truly application-centric world.
Truthfully, though, we need to focus on what the customer wants. Every model will be viable to various customers, so some software vendors may become irrelevant due to the cloud providing a better way to service the customer's needs. The cloud industry can be too hung up on terms such as hybrid, public, SaaS or PaaS. Instead, we have to focus on the customers' needs and their applications that run their business and give them competitive advantages operationally and provide a truly seamless experience.
Cloud Computing Journal: What are the challenges for end users to adopt a new model for application development using Platform as a Service? Are vendors doing enough to meet their needs?
Gleason: Platforms are important to reduce time-to-market for SaaS or internal use cases, and it's good to see the industry shifting from infrastructures being the center of the universe to how they can be architected to service applications in a more on-demand, dynamic, intelligent manner. But, again, where is security in the discussion? It's not anywhere to be found in the majority of industry conversations and vendor communications. It badly needs to be.
In addition to security, there are two other big to-dos that need to be addressed: orchestration and inter-cloud technology. To make applications work well across infrastructures, those infrastructures must work well together in an inter-cloud fashion. This brings us back to security. Businesses will have many clouds, as will their customers. The weakest link is the most insecure cloud, so change must happen to bring security into the larger, strategic conversations rather than focusing so much on architecting an infrastructure or specific software techniques.
Cloud Computing Journal: With several vendors lowering costs for infrastructure, is there a way for new cloud service providers entering this space to make money?
Gleason: While cost has traditionally been a foundational benefit of the cloud, we believe that other factors can play a more important part in defining the cloud of tomorrow. We believe that the generalist cloud provider - those low-cost commodity clouds that created price competition and insecure clouds - are going to either be gobbled up or beaten up as the industry evolves from this generalist mentality to focus on specialist clouds that have a particular focus. For FireHost, that's security. We evolved out of the need for security and have created an infrastructure that provides an advanced security architecture, top security personnel and compliance expertise for customers that are security- and compliance-driven.
• • •
Todd Gleason, Vice President of Technology at FireHost, is a central figure in continuously innovating and architecting the secure cloud infrastructure for FireHost and its customers. He brings 15 years of global IT and R&D experience, including deep knowledge of security, cloud, networking, compute, virtualization, storage, and application delivery technologies.
Gleason is driven by the notion that customers ultimately care about servicing their applications to perform efficiently in a secure environment. With this in mind, Gleason has displayed a knack for understanding the latest technology trends in the industry, synthesizing what is applicable for FireHost's customers, and incorporating relevant technology into the company's cloud infrastructure to ensure businesses' applications and data are protected in a cutting-edge, secure cloud. Gleason has helped redefine industry expectations about performance, security, and compliance in the cloud. His creative approach to architecting FireHost's secure cloud proves that security can be incorporated without compromising infrastructure performance, which improves customers' risk management while maintaining thrifty usage of infrastructure resources.
Prior to his role with FireHost, Gleason worked as director of information technology at Panini America, formerly Donruss Trading Cards, which is now a subsidiary of the global Panini conglomerate. There he implemented a high-performance infrastructure and unique business applications enabling rapid high-quality production workflows and integration into the Panini global business. Gleason holds a degree in computer information systems from Remington College.
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...
Dec. 1, 2015 11:00 AM EST Reads: 136
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them ...
Dec. 1, 2015 10:45 AM EST Reads: 128
In demand-intensive mobile and web applications, an emerging pattern is to host the Systems of Engagement in the cloud (for maximum responsiveness) but keep the Systems of Record with the other important business systems in the company datacenter, often on a tightly secured mainframe. But what about the space in between? In this IBM Redpaper publication, we show that the IBM Bluemix cloud platform offers technologies that make it easy for cloud-based SoEs to securely connect to on-premises IBM...
Dec. 1, 2015 10:19 AM EST
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
Dec. 1, 2015 10:00 AM EST Reads: 576
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Dec. 1, 2015 09:00 AM EST Reads: 481
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Dec. 1, 2015 08:00 AM EST Reads: 251
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Dec. 1, 2015 08:00 AM EST Reads: 395
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
Dec. 1, 2015 06:30 AM EST Reads: 515
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Dec. 1, 2015 06:00 AM EST Reads: 273
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Dec. 1, 2015 05:00 AM EST Reads: 622
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Dec. 1, 2015 04:45 AM EST Reads: 458
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
Dec. 1, 2015 04:15 AM EST
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Dec. 1, 2015 03:30 AM EST Reads: 533
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Dec. 1, 2015 03:00 AM EST Reads: 470
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Dec. 1, 2015 03:00 AM EST Reads: 113
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Dec. 1, 2015 03:00 AM EST Reads: 469
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
Dec. 1, 2015 01:00 AM EST Reads: 437
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company Logz.io. In the past, he was co-founder of social-trading platform Currensee, which...
Nov. 30, 2015 10:00 PM EST Reads: 289
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Nov. 30, 2015 03:00 PM EST Reads: 497
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Nov. 30, 2015 02:00 PM EST Reads: 375