According to Rightscale, cost management is the No. 1 challenge for mature cloud users in 2017. That makes sense–after all, what’s the point of adopting hybrid cloud if it ends up being too cost prohibitive? Different from managing your bill, this post talks about how to manage your costs within public cloud, such as Microsoft Azure. So, why is public cloud so expensive? Well, on paper, paying pennies per minute sounds cheap, but costs quickly rise when you factor in every minute …

Sprawl has been the lingering problem in IT since the dawn of the client-server model. In the pre-cloud era, sprawl’s impact was only barely felt, as the ongoing cost of support for a workload was rarely as visible or scrutinized as the upfront cost of acquiring infrastructure to run that workload. In the age of private cloud, sprawl was an annoyance, but hardly a driver of noticeable operational cost. Until performance was impacted, sprawl was ignored. When a performance or capacity …

For organizations that use public cloud services, the biggest goal is to optimize the usage and spend of those services. It all comes back to cost management and control–it’s all too easy to lose control of your cloud spend, especially when you don’t know who is spinning up more servers or whether they’re being used in the most cost-effective way. CIOs are experimenting with server tagging as a way to overcome this challenge. What is server tagging? Essentially, it’s creating …

Amazon Web Services (AWS) and Microsoft Azure are two of the biggest names in public cloud computing. Which one is right for you? To help you make that decision, let’s talk about what each provider brings to the public cloud table, and key differences between them. Compute power AWS: AWS EC2 users can configure their own VMs or choose pre-configured machine images, or customize MIs. Users choose size, power, memory capacity and number of VMs, and choose from different regions …

A recent Global CIO survey by Brocade found that 83 percent of CIOs believe procurement of cloud services without IT engagement will increase. This procurement, otherwise known as Shadow IT, continues to grow as organizations reach for a hybrid cloud solution. But even though hybrid cloud has been one cause of Shadow IT (among many), it can also be a solution. If you have Shadow IT within your organization (and most organizations do), then you technically already have a hybrid cloud solution—it’s just …

When it comes to cloud computing, the question enterprises now ask is, “Which cloud is best?” More than 80 percent of organizations are running workloads in the cloud, and the IT service industry has joined the fray with a variety of different cloud services and new buzzwords to represent them. What do they mean, and is there a difference between them? Let’s review: Cloud broker: A cloud broker is someone who acts as a kind of middleman between an organization interested in …

Congress recently passed a law repealing a set of Internet privacy rules, in a move that’s taken the media by storm and for good reason. In the wake of this new legislation, there’s been a lot of confusion over what it means for the privacy of consumer Internet data. President Donald Trump still has to sign the new bill, so it isn’t even law yet. But it’s expected he will do so, and soon. No one understands the full impact …

Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015. It affects individuals, nonprofits and enterprises alike, but it’s is particularly fond of the healthcare industry because of the value of patient data and the criticality of hospitals. To help the healthcare IT industry (and others) learn more about ransomware, I’ve compiled a list of the most informational articles on the web to date. Health and Human Services Department …

Ransomware has made headlines time and again for its devastating effectiveness on governments and organizations, but researchers are starting to pay attention to a developing trend within ransomware: Ransomware as a Service (RaaS). Ransomware as a Service allows anyone, regardless of programming background or coding skills, to infect computers and extract money from victims. Why are researchers paying attention to RaaS? It represents a new form of malware distribution, where people who have zero coding or programming skills can send …

Our world is on its way to being completely connected and at our fingertips, thanks to the Internet of Things. But with those millions of possibilities comes the millions of threats of security breaches connected devices pose. It’s an issue that is slowly getting attention, but it will probably take many more attacks like the one on Dyn in October before a change in culture is brought about. If you use devices such as cameras to monitor hallways or medical …

Get started now. Exceptional service awaits.

Live Chat