Infrastructure
Kubernetes and Serverless Architecture – Differences and Similarities
Kubernetes and serverless architecture (AWS – Lambdas, Azure Functions, and Google Functions, etc.) offers powerful platforms and tremendous boosts in agility, scalability and computing performance. Serverless architectures are often referenced as Functions as a Service (FaaS). Kubernetes offers advantages that serverless alternatives do not have — and vice versa. The key to the successful deployment
The case for serverless architecture
Serverless technology should not be applied to all application initiatives. PM Kinetics offers cloud solutions that can improve your success. The term “serverless” is a bit of a misnomer. It refers to a moment in time when computing resources are employed for the spin-up time of a few milliseconds, that execute cleanly, and that
How a Data Center Architect Can Learn From Building Principles
Though a physical construction architect and a data center architect have two completely different jobs on the surface, there are various principles that can be applied to both on-ground construction and cloud computing structures. The layers of a building must be designed in a way that works together and the same goes for a technical
The Phenomenon of BYOD
Bring Your Own Device (BYOD) phenomenon started when smartphones and tablets with more convenient form factor became ubiquitous among consumers. These devices with their touch-screen interfaces and powerful processors allow employees who brought them to work to be more productive on the go. Assuming of course they could somehow get connected to the in-house WiFi.
Changing the Dynamics of IT Planning
Most organizations spend a large portion of their IT budget “keeping the lights on” and maintaining the status quo, save for a couple of major initiatives. Each of those initiatives undergoes a business analysis and total cost of ownership review and with great fanfare begins the journey to completion. The fallacy of this planning approach
Security in the New Data Center
Information security in data centers has historically relied on perimeter firewalls, pattern matching “after the fact” with intrusion detection, and at the server level by installing host-based intrusion detection, identity enforcement, antivirus, and other software agents. Internal LANs can be segmented and boundary controls implemented using the same firewall technology. Virtualization adds a layer of
Ebb and Flow of Virtualization Implementations
Gartner says that just 16% of data center loads are virtualized, and in a recent InformationWeek Analytics survey found that 35% of respondents say they expect to virtualize less than 25% of their data centers by 2011. That finding reflects either a less optimistic or more realistic assessment than survey respondents exhibited last year, when
SOA Rebranded as Cloud Computing Services
Just have to love some marketing folks and analysts that jump to the latest buzz word and extol the differences, benefits, pitfalls, fear, uncertainty and doubt. There have recently been some press releases concerning cloud computing concepts and technology that seems to have been lifted from previous Service Oriented Architecture (SOA) overviews from the same vendors.
Subcontracting Issues within Cloud Computing Services
Multi-cloud relationships and subcontractors can be an issue when using some cloud providers. For example, a Customer might start out slow with Cloud Computing and enter into a SaaS service just to get a feel for how all of this works and to satisfy an immediate need that the internal IT department cannot quickly fulfill.
Cloud computing key risks
For every positive benefit there is almost always a negative to compensate for rapid adoption based on wild enthusiasm. Cloud computing has a number of key risks. 1) data privacy and governing privacy laws 2) multi-cloud relationships and subcontractors are also an issue when using a cloud provider 3) multi-tenancy on the same virtual server