A Cloud in the Data Center and Services from the Cloud
Although still a somewhat ambiguous term, "cloud computing" represents a watershed in both the evolution of outsourced service provision and in data center infrastructure. Public clouds provide outsourced services in a manner that incorporates efficiency, flexibility, scalability, and improvements in charging under a pay-as-you-go utility model.
A Cloud in the Data Center and Services from the Cloud
Although still a somewhat ambiguous term, "cloud computing" represents a watershed in both the evolution of outsourced service provision and in data center infrastructure. Public clouds provide outsourced services in a manner that incorporates efficiency, flexibility, scalability, and improvements in charging under a pay-as-you-go utility model.
A Cloud in the Data Center and Services from the Cloud
Cloud computing has become the accepted name for the next evolutionary step of the data center and the services enabled by that infrastructure. It encompasses a range of service capabilities that can be provided to the enterprise and to individuals through a utility computing model by using multiple processors that are managed together as one, with access to services, provisioning, and management through the Internet.
A Cloud in the Data Center and Services from the Cloud
Cloud computing has become the accepted name for the next evolutionary step of the data center and the services enabled by that infrastructure. It encompasses a range of service capabilities that can be provided to the enterprise and to individuals through a utility computing model by using multiple processors that are managed together as one, with access to services, provisioning, and management through the Internet.
The Convergence of Information Security, Privacy, and Compliance -- Opening Statement
So how can companies work effectively to ensure information security, privacy, and compliance areas collaborate to make initiatives most successful? The authors in this issue attempt to answer that question, addressing a wide range of information security and privacy convergence issues in the process. In fact, we had more than 20 folks who offered to write articles on this topic! Because of the overwhelming response, we are going to dedicate two issues -- this one and another later in the year -- to information security and privacy convergence.
Cautionary Tales About Information Security, Privacy, and Compliance: From the Archives of McCarter & English, LLP
There has been much talk recently regarding a convergence of information security and privacy. Not that this is anything particularly new - convergence has been happening ever since privacy became a concern. After all, privacy requires the implementation of robust information security controls and appropriate safeguards. There are at least 46 privacy breach notice laws in the US alone; understanding and complying with their multiple requirements (to say nothing of the growing number of other national and international privacy laws) will require privacy and information security areas to work together for effective enterprise-wide management.
All Together Now: Converging to Build Information Security and Privacy Awareness
There has been much talk recently regarding a convergence of information security and privacy. Not that this is anything particularly new - convergence has been happening ever since privacy became a concern. After all, privacy requires the implementation of robust information security controls and appropriate safeguards. There are at least 46 privacy breach notice laws in the US alone; understanding and complying with their multiple requirements (to say nothing of the growing number of other national and international privacy laws) will require privacy and information security areas to work together for effective enterprise-wide management.
Identity 3D3C: Confronting the Security and Privacy Challenges in Virtual Worlds
Agile Sponsorship: The Next Element in the Agile Evolution
An Integrated Approach to SOA Governance
An Integrated Approach to SOA Governance
An Integrated Approach to SOA Governance
Can't Anybody Do Risk Management?
IT strategy
Assertion 181:Risk management as practiced in the financial sector has now been revealed as a charade. Risk management as practiced in IT is probably little better.
Can't Anybody Do Risk Management?
IT strategy
Assertion 181:Risk management as practiced in the financial sector has now been revealed as a charade. Risk management as practiced in IT is probably little better.
Can't Anybody Do Risk Management?
IT strategy
Assertion 181:Risk management as practiced in the financial sector has now been revealed as a charade. Risk management as practiced in IT is probably little better.
Open Source BI in the Cloud: A Look at Pentaho 3.0
In a recent BI Executive Update (see "Open Source BI and Data Warehousing: New Directions," Vol. 9, No. 2), I discussed the possible impact on the BI market caused by end-user organizations adopting open source BI tools.
Open Source BI in the Cloud: A Look at Pentaho 3.0
In a recent BI Executive Update (see "Open Source BI and Data Warehousing: New Directions," Vol. 9, No. 2), I discussed the possible impact on the BI market caused by end-user organizations adopting open source BI tools.
Where's the Fire? Notions About Project Volatility
Reconfiguring the Business
In Time of Testing, Remember Values, Communication, Slack, Part I
It is sad but true that the economic crisis has now also appeared in Poland. Somehow, many of us here in Poland have been under the mistaken assumption that we would be undisturbed by the current economic crisis; that this was only an American and Western European problem. Of course, it couldn't remain that way.


