August 12, 2013

Virtual overlay networks: Tunneling protocols enable multi-tenancy
From a technical point of view, network overlays encapsulate one packet inside of another packet. The encapsulated packet is then forwarded to an endpoint where it is de-encapsulated. Network overlays leverage this "packet in a packet" technique to provide secure multi-tenancy and extend VLANs across Layer 2 networks.


Buried in software licensing
"Oracle works very well, but at the end of the day we pay a huge price for that service," Steinour says. Today, 99% of the fixed-cost increases in the university's IT budget come from software maintenance price hikes. "That's just not sustainable," says Steinour, whose IT department supports 20,000 students and 1,600 faculty members.


Cloud Services Foundation Reference Architecture - Reference Model
Although the term 'Cloud Services Foundation Reference Model' is defined extensively in the Overview article of this article set, the short definition is: "The minimum amount of vendor-agnostic hardware and software technical capabilities and operational processes necessary to provide information technology (IT) services that exhibit cloud characteristics, or simply, cloud services." It’s important to note that although the problem domain is the foundation for providing cloud services, it does not include cloud services.


Which Technology Will Become Extinct Next?
In truth, the next technology term that could be about to become redundant (once again, in a good way) is Agile. We refer to Agile in the sense of the highly iterative people-centric approach to software application development and delivery. Agile computing as decreed in the Agile manifesto back in 2001 focuses of simple programming code with lots of testing and the imperative to deliver any functional parts of a piece of software as soon as they are ready.


Top Athletes Use Coaches. Why Don’t CEOs?
CEOs don’t see as great a need to work on their softer skills. Low on the personal development list: compassion (18 percent), interpersonal and persuasion skills (both 14 percent), and motivation (11 percent). “It’s concerning that so many of them are ‘going it alone,’” says Stephen Miles, chief executive officer of the Miles Group. In an e-mail exchange, Miles explains why so few CEOs have leadership coaches and the best combination of “hard” and “soft” skills:


Obama pledges greater transparency in surveillance programs
"It's not enough for me as president to have confidence in these programs. The American people need to have confidence in them, as well," Obama said, adding that he was confident the programs were not being abused. The announcement - made just before Obama heads for summer vacation on Martha's Vineyard - may be greeted as at least a partial victory for supporters of ex-NSA contractor Edward Snowden who is now in Russia, where he was granted asylum last week.


Security Manager's Journal: Learning to let go and offshore
No security-related activities were sent overseas, though. I always wanted to keep security tightly under my control. But it's impossible to ignore the savings that offshoring makes possible, so after talking with peers at other companies, I learned to let go of some of that direct control.


Perspective Based Architecture Analysis Method
Fifty years ago, today and fifty years from now, IT architects will still need to address these difficult questions.Therefore, The PBA Method focuses on capturing those questions from architects in a community model organized within a meta-model in an easy to use capability complimenting most methodologies and processes to promote more successful architectures..


Ten ‘Take Aways’ from the Reifer “Quantitative Analysis of Agile Methods” Study
Agile cost, as measured in terms of $/unit of ouput, is less than the norms being experienced on plan-driven projects. The gains experienced range from near nominal to 100 percent over the course of ten years, averaging at best a cost avoidance of between 20 to 40 percent in a single year after adoption. Again, these costs vary greatly by application domain and are a function of many factors including those revolving around workforce composition and labor rates.


CIOs are laying SDN plans, but slowly
The typical broad-based enterprise market is busy exploring the potential of SDN, “but there hasn’t been much in the way of vendor outreach to them,” said Casemore. After all, “traditional vendors still have a business model and products installed in those customers’ data centers and throughout their networks. These vendors have next-generation products coming out and aren’t inclined to disrupt that flow.”



Quote for the day:

"Positive thinking will let you do everything better than negative thinking will." -- Zig Ziglar