Some Key Security Patterns that can be implemented within Cloud platforms are below covering keys, encryption and data protection. Patterns…
From Cloud Strategy Magazine. Rapid Growth in Cloud Infra from 2015 to 2017. http://www.cloudstrategymag.com/articles/86795-report-public-cloud-market-is-growing “New Q2 data from Synergy Research Group shows…
Example Cloud Security Architecture Hybrid Cloud Architecture, supporting 1000s of users, using AWS with legacy DB integration User application access:…
There are some very good security models and reference architectures from NIST, COBIT and ISO. They all serve a different…
#1 Preference – Software as a Service (SaaS) Problem Statement: How can software be offered dynamically over a network? Context:…
Migration Best Practices When migrating on-premise estate into the Cloud, some practical steps are followed. The following is an overview…
IT Buzzword Bingo, when bored in a meeting, play with friends! How to play: Sit in a meeting, circle the…
Sutherland co-founded the Scrum methodology as an implementation of ‘Agile’, in the mid-1990s. The premise is straight forward enough: end…