“Last year the decision was finally made to mandate Agile across our
enterprise. The decision was taken, even though there were many unanswered
questions. The assumption was that forcing the migration, along with adoption
of popular “enterprise Agile methods” would ensure resolution of the
outstanding questions. In practice, Agile methods have been very effective in
delivering specific digital business initiatives. But almost inevitably the
distribution and delegation of architecture has resulted in duplication,
inconsistency and increased complexity, across all project types including
legacy and new projects. We are now concerned that we no longer have an
effective governance capability. The question is how do we fix this without
losing the undoubted benefits of Agile methods?“ Enterprise Architect,
Over the past few months I have heard this message ... (more)
I know I’ve said this before but it sure seems like almost daily there is a
security breach somewhere. Over the years, the thought process has changed
from prevent all attacks to, it is inevitable that we will be breached. The
massive number of attacks occurring daily makes it a statistical reality.
Now organizations are looking for the right solution (both technology and
practice) to quickly detect a breach, stop it, identify what occurred and
what data may have been compromised. Over the last couple of days various
entities have had their security breached.
As you are prob... (more)
Enterprise Version Management Leader Underscores Its Support for Linux in the
WOKINGHAM, UK (January 30, 2013) - Perforce Software today announced it has
joined the Linux Foundation, a non-profit organisation dedicated to
accelerating the growth of Linux - the renowned open source operating system.
This membership is part of a continued commitment by Perforce to encourage
collaborative software development on both sides of the firewall.
Dedicated to supporting developers in the environments they want to use,
Perforce recently released Perforce Git Fusion, which improve... (more)
The Cloud Security Alliance (CSA) Thursday announced the release of the CSA
Cloud Control Matrix (CCM) Version 3.0, the most comprehensive update to the
industry's gold standard for assessing cloud centric information security
risks. The CCM Version 3.0 expands its control domains to address changes in
cloud security risks since the release of the CSA's seminal guidance domain,
"Security Guidance for Critical Areas of Focus in Cloud Computing version
3.0" while making strides towards closer harmonization of the two.
Having drawn from industry-accepted security standards, regulati... (more)
Study from Mimecast Finds that Security and Integration Concerns are not
Preventing Enterprises' Cloud Computing Adoption
London - February 4, 2010 - Mimecast®, a holistic email management company
offering SaaS-based email archiving, continuity, security and policy control,
today announced the results of its Cloud Computing Adoption Survey, which
examined the perception and adoption of cloud computing solutions among 565
respondents responsible for managing their organization's IT operations and
budget across the U.S. and Canada in the Fall of 2009.
Data from the recently complet... (more)
We’ve written extensively about the benefits of hybrid clouds, since it’s
a core part of our founding vision at CloudSwitch. For most of this past
year, the cloud market has been focused on defining the differences between
public and private clouds and weighing the costs and benefits. Slowly the
conversation has shifted to what we believe is the central axiom of cloud:
it’s not all or nothing on-premise or in an external cloud; it’s the
ability to federate across multiple pools of resources, matching application
workloads to their most appropriate infrastructure environments.