Just like that shiny toy on Christmas morning, new tech is desirable simply because it’s new. Over the years, every new aspect of the technology story — software, hardware, methodologies, architectural approaches, etc. — has succumbed to this shiny things syndrome, for better or worse. Sad to say, it has usually been for the worse.
The widespread adoption of cloud-based applications and services, distributed IT systems and processes, continual enterprise transformation, and the borderless nature of the global economy are all driving demand for agile, flexible, and intelligent DCI.
In April, the Government Accountability Office (GAO) released a report to Congress on the current status of the Data Center Optimization Initiative (DCOI) — the Office of Management and Budget’s (OMB’s) directive to optimize and consolidate data centers to deliver better services to the public while increasing return on investment (ROI) to taxpayers.
There are pros and cons to everything, and colocation is no exception. Though it may be a relatively new concept to the data center world, it definitely wasn’t born yesterday. Other industries have been building their business models around the idea of colocation for quite some time.
I’m sure you noticed a different face on this page, but I still want to take up a few lines here to introduce myself. My name is Amy Al-Katib, and I am the new editor-in-chief for Mission Critical magazine.
With 5G on the horizon, and the promise of a host of new technology applications like autonomous vehicles, consoleless gaming and instant grocery delivery, we are set to create an unprecedented amount of data that will require rethinking the way our telecommunications and data infrastructure is built and managed going forward.
Coalfire cloud study reveals data loss/leakage, shared responsibility concerns still abound
October 4, 2019
Coalfire released a new Securealities research report: “Cloud Security Intelligence Report.” The report, created in cooperation with Cybersecurity Insiders, provides a detailed look at how organizations are responding to security threats in the cloud. It highlights what is and is not working for security operations teams in securing their cloud data, systems, and services in the cloud shared responsibility model.