If your business operates computing infrastructure of any kind – whether a data center or simply a small server farm – one of your largest expenditures is going to be on power. That’s a given. And the more you can do to reduce your power costs, the better.
Your data center needs a disaster recovery plan. There can be no questions about that. There’s a ton of stuff that can potentially go wrong with your servers, from inclement weather to hardware failure to a destructive cyber attack.
Malware and ransomware. Catastrophic hardware failure. Accidental or intentional deletion. Lost or stolen devices.
A decade ago, infrastructure management was easy. Most of what you had to secure was desktop devices. Maybe there were a few laptops too, but they were few and far between. The power was entirely in the hands of IT.
By now, you’ve probably heard plenty of folks wax poetic about the cloud. About how it’s one of the most powerful, disruptive technologies we’ve ever seen. About how its agility, scalability, and flexibility make it the perfect tool for a business of virtually any size. About how it can revolutionize how you do your job.
We do love our abbreviations, don’t we? The cloud computing industry’s no exception. Even as the cloud’s seen increasing use throughout the enterprise, there’s still a ton of confusion over precisely what it is and does. That’s not helped along by the fact that people bandy about terms like IaaS and SaaS with abandon.
I like to think of the cloud as sort of like the monoliths from 2001: A Space Odyssey. Used correctly, it’s a revolutionary, game-changing piece of technology. At the same time, it’s surrounded by so much hearsay and mysticism that it’s a wonder anyone knows how it actually works.
The more people go on about the virtues of the cloud, the more confusing the whole discussion seems to get. The problem, I think, is how buzzword-heavy the whole conversation tends to be. Today, we’re going to see if we can’t clear the air a little.
Smartwatches that let you track both your physical health and inbox. Connected fridges that keep track of the food they contain. Voice-activated televisions that learn your viewing preferences. Self-driving cars.
Organizational security is sort of like a boat – all it really takes is one leak to sink you. And as we move forward into an era of mobility and distributed computing, the number of locations said leak can originate increases exponentially. But you already know, that, right?