Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Liz McMillan, Pat Romanski, Elizabeth White, Yeshim Deniz

Related Topics: @CloudExpo

@CloudExpo: Book Review

Shedding Light on Cloud Computing - A Free Primer

How to explain Cloud Computing to your boss, spouse or others

Cloud Computing is the most discussed IT innovation of recent times. This Primer provides a structured overview of what Cloud Computing is and what the potential benefits and risks are. In addition it explores how Cloud Computing will impact IT management and IT's role in the organization as a service provider.

It also looks at the risks of Cloud Computing. Risk is consistently cited by CIOs and CFOs as the largest obstacle of cloud computing for their organizations. In this primer we consider the risks in areas such as availability, privacy and regulatory compliance. The booklet explores some of the reasons why organizations want to implement Cloud Computing, to name just a few: cost-savings, increased speed and flexibility and higher performance. It looks at how the Cloud delivers against these expectations and debates its long term viability.

The Cloud Computing Primer also examines various Cloud types such as Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS). Virtualization, a critical component of Cloud Computing, will be covered in detail while the final chapter of the Cloud Computing Primer looks at the the future and the impact of Cloud Computing on the entire organization . It can be used as a reference and overview tool for anybody who is affected or will be affected or is simply interested in Cloud Computing. No prior in-depth knowledge is required.

Shedding Light on Cloud Computing - A Primer (3.9MB PDF)

More Stories By Gregor Petri

Gregor Petri is a regular expert or keynote speaker at industry events throughout Europe and wrote the cloud primer “Shedding Light on Cloud Computing”. He was also a columnist at ITSM Portal, contributing author to the Dutch “Over Cloud Computing” book, member of the Computable expert panel and his LeanITmanager blog is syndicated across many sites worldwide. Gregor was named by Cloud Computing Journal as one of The Top 100 Bloggers on Cloud Computing.

Follow him on Twitter @GregorPetri or read his blog at blog.gregorpetri.com

CloudEXPO Stories
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
With the mainstreaming of IoT, connected devices, and sensors, data is being generated at a phenomenal rate, particularly at the edge of the network. IDC's FutureScape for IoT report found that by 2019, 40% of IoT data will be stored, processed, analyzed and acted upon at the edge of the network where it is created. Why at the edge? Turns out that sensor data, in most cases, is perishable. Its value is realized within a narrow window after its creation. Further, analytics at the edge provides other benefits.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by FTC, CUI/DFARS, EU-GDPR and the underlying National Cybersecurity Framework suggest the need for a ground-up re-thinking of security strategies and compliance actions. This session offers actionable advice based on case studies to demonstrate the impact of security and privacy attributes for the cloud-backed IoT and AI ecosystem.
Enterprises that want to take advantage of the Digital Economy are faced with the challenge of addressing the demands of multi speed IT and omni channel enablement. They are often burdened with applications that are complex, brittle monoliths. This is usually coupled with the need to remediate an existing services layer that is not well constructed with inadequate governance and management. These enterprises need to face tremendous disruption as they get re-defined and re-invented to meet the demands of the Digital Economy. The use of a microservices approach exposed through APIs can be the solution these enterprises need to enable them to meet the increased business demands to quickly add new functionality.
Steadfast specializes in flexible cloud environments, infrastructure hosting, and a full suite of reliable managed services and security. Complemented by expert consultation at all stages of design and deployment to maintenance and expansion planning, Steadfast delivers high-quality, cost-effective IT infrastructure solutions, personalized to customer needs.