Category Archives: Exclusive Commentary

Exclusive MarkoInsights Columns

AWS Security Management: In Need of Automation

By | December 27, 2015

A verson of this article originally appeared on TechTarget SearchAWS as Rely on cloud security policy — not tools — to protect AWS Managing security policies and incidents on IaaS can be complex and challenging. Here’s what vendors are doing about it Once enterprises move workloads to cloud infrastructure, they soon realize that the tools for enforcing security policy… Read More »

AWS Operations Management: Improvements Needed

By | December 17, 2015

A version of this article originally appeared on TechTarget SearchAWS as Where AWS monitoring tools fall short  AWS has a rich set of management APIs, automation tools and a central management console, but it can’t yet provide end-to-end performance and troubleshooting data AWS has an overwhelming list of services, but piecing together a multi-tier application design and then… Read More »

Powering IoT with Cloud Backends: New Front in the Platform Wars

By | December 2, 2015

A version of this article originally appeared as IoT cloud services market spurs products from cloud giants on SearchCloudApplications at Techtarget.  IoT Developers Can Learn From Mobile Apps and Exploit Cloud Services for IoT Backends The past year has seen IoT evolve from IT buzzword to strategic business imperative as a steady drumbeat of big business projects and vendor… Read More »

Cloud Price Wars: Have We Hit Bottom or Are AWS, Others Just Hitting Pause?

By | November 9, 2015

A version of this article originally appeared in TechTarget SearchAWS as Cloud cost comparison foggy at best News of continued price cuts were noticeably absent at AWS re:Invent and scarce in 2015. Have we hit bottom and what does it mean for enterprises? Buying cloud services used to resemble shopping for sweaters right before Christmas: the longer you wait,… Read More »

Public or Private, Multi-Cloud is the Future. How Will You Manage It?

By | November 5, 2015

A version of this article originally appeared in TechTarget SearchCloudApplications as Managing application deployments in a multiple-cloud enterprise Any conversation about cloud services usually begins with AWS, but for most organizations, it won’t end there. Whether to fight vendor lock-in, increase the diversity of available services, arbitrage price disparities or maintain control over particularly sensitive information an increasing number… Read More »

Automating Infrastructure Configuration and Management Using Chef with AWS

By | October 1, 2015

A version of this article appeared on TechTarget SearchAWS as Achieving AWS automation with Chef The transition of corporate infrastructure into software defined private clouds has transformed IT automation from an aspirational goal into an existential imperative. The move from treating servers, storage and network gear as individual units that are carefully managed into interchangeable resources — the familiar… Read More »

Amazon Cognito: Authentication and App Sync for the Multi-Device World

By | September 13, 2015

A version of this article originally appeared on TechTarget Search AWS as AWS Cognito makes a mark in mobile app development A major challenge when developing applications in the post-PC era, where the average person uses three devices and expects to access and have a consistent view of their data from each one of them, is the difficulty of… Read More »

VMworld Retrospective: Betting on Hybrid Cloud, but do VMware’s Customers Care?

By | September 10, 2015

The news out of VMworld 2015 was less significant than its overarching theme of hybrid cloud. My summary of the news, along with a photo album, are available here. Although there were plenty of announcements, indeed one analysis contends VMware is trying to do too much, other than the Photon container project (which is still experimental) they were mostly… Read More »

A Guide to AWS Identity Management and Policies

By | August 29, 2015

Portions of this article appeared in the Tech Target SearchAWS E-HandBook: Your Role in AWS Security. AWS security is built upon a powerful identity and access management service (IAM) with a rich set of features befitting of an enterprise platform. Yet the IAM management console, nestled within an overflowing AWS service dashboard, is deceptively simple, belying the complexity… Read More »

Book Review – Geekonomics: The Real Cost of Insecure Software

By | August 27, 2015

If you’ve ever wondered why the first thing you have upon booting a new PC, with it’s pristine copy of Microsoft’s latest and greatest, is spend the next few hours loading extraneous security software – anti-virus, spyware protection, firewall, spam filter – David Rice has a theory for you. As he expounds at great length in his first… Read More »