The following short example shows a simple example of how to query Google Natural Language API by posting JSON as text using cURL in PHP. [Read more…]
Recently I got asked about my views on Amazon AWS and their 100% redundant cloud computing SLA. Here is a couple of notes I took on the subject… [Read more…]
I examine a hypothetical scenario of a growing medium size company that is planning to migrate to a cloud environment. I suggest an Amazon AWS cloud service as a possible solution and also cover deployment models as well as some very high-level implementation details and benefits of cloud PaaS services. [Read more…]
The security breaches usually occur when the organization does not sufficiently restrict communication inside network perimeter or does not implement lateral security controls, which allow hackers to target the priority systems or infiltrate information. The following article talks about VMware’s NSX™ Distributed Firewall, Intrusion Preventions, and Intrusion Detection System.
Note: Article in Progress. The following is only a basic skeleton for the more comprehensive overview.
The following post is intended to explain some of the IT audit standards, control process and associated laws and regulations currently used in Canada. Even though, the 2012 research showed that only 16% of Canadian Businesses were not aware of privacy or security-related standards and we could say, that Canadian IT companies have moderate to high awareness of the compliance standards.
Note: This article is a work in progress. [Read more…]
In early days of Cloud computing, media frequently probed and disputed the viability of cloud computing. And not so long ago, in 2009, even the most famous futurists were skeptical. Jamais Cascio, who listed as one of the 2009 Top 100 Global Thinkers said, “I have to admit it: I’m not a huge fan of the cloud computing concept.”(Fast Company, 2009). However, not even a decade later, the positive impact of cloud computing can no longer be disputed. With that, a new concern comes to view, the likelihood of Cloud computing becoming a monopolized technology. This article is a brief look at the current landscape of cloud computing relative to becoming a monopoly. [Read more…]
In 2015, the worldwide SaaS market was valued at approximately US $80 billion. According to Forbes magazine, “by 2020, it will grow by estimated 69% to become over $130-billion-dollar industry” (Forbes.com, 2017). The incredibly fast rate at which SaaS adoption grows is primarily the result of a very positive attitude towards ‘software as a service’ model among businesses of all sizes. The following post introduces one of such SaaS technologies, called ‘SendGrid Email.’ [Read more…]
Wikis are a type of website or online application that is a result of a collaboration of a community of experts that add and edit online content dedicated to a variety of highly specific topics. [Read more…]
The following post talks about the current trend of transitioning to cloud infrastructures, in which majority of businesses favor agility offered by the cloud service solutions instead of true costs benefits associated with moving to the cloud. Peter Drucker, an educator, and management consultant once stated: “Profit for a company is like oxygen for a person. If you do not have enough of it, you are out of the game. But if you think your life is about breathing, you are really missing something.” (AZQuotes, 2017).
Compliance is a significant part of safeguarding a secure business environment in the cloud. In this post, I propose my opinion on what is likely the best course of action to achieve compliance for the small CSP. [Read more…]
According to Amazon’s guide to Cloud Best Practices (2017), “If you design for failure, nothing will fail.”. The recommendation given is to “Be a pessimist when designing architectures in the cloud; assume things will fail. In other words, always design, implement and deploy for automated recovery from failure.”
Jinesh Varia, Lead Technology Evangelist at Amazon AWS, took it further by specifying a total of 12 design patterns (best practices) that all businesses should consider when designing highly available and reliable cloud applications (Figure 1).
Figure 1 – Building Powerful Web Applications in the AWS Cloud (Varia, 2011). [Read more…]
Two of the most popular cloud management platforms from the open-source space are OpenStack and OpenNebula. Both of them provide an open source scalable software platform that allows cloud service vendors and enterprises to provision and orchestrate large deployments of virtual machines, as well as manage and control networking, processing and storage resources in a data center. Both also offer a web based dashboard, as well as command line and API services to better control all of the interrelated components, in IaaS private cloud. However, even though OpenStack and OpenNebula are certainly among the most recognized open source cloud management platforms, in this post I introduce two other CMPs that in my opinion deserve to be explored, namely the CloudStack and Eucalyptus open cloud management platforms. [Read more…]
As we all know, most large IT cloud companies offer some way to do the Cross-Region Replication for their data storage. As they are expanding across the globe in a race to provide the best disaster recovery and also their ability to use storage in different regions I wanted to spend 5 seconds to look at the options offered by Amazon, Microsoft, and Google. [Read more…]
In this post, I will introduce Cloud Security Alliance (CSA) and the governance and operation domains through which they promote the best security practices in the cloud. I also briefly look at the Encryption and Key Management as one of the parts of the operational domains; and look at the general security concerns, as well as specific concerns of this particular domain. [Read more…]
Right from the early days of cloud, the overall security of cloud solutions has been one of the biggest roadblocks to adoption of cloud. Potential cloud customers are usually concerned primarily about the security of the data stored off premises, but there are many other security issues to consider. [Read more…]