Senior advisor and author, Kati Lehmuskoski, discusses how organizations are better able to secure their data by moving it to the cloud.
Systems Engineer, Nathaniel Avery, shares how organizations can leverage their existing investments in VMware while also tying into the public cloud.
Solutions Architect, Ather Beg, talks about what Digital Transformation means, the steps companies should take to get started, and some common challenges they face when embarking on the journey.
Public cloud providers and enterprise IT vendors alike position Kubernetes as the control plane for cloud-native applications. They promise an application environment that will run on any public or private cloud, reducing cloud lock-in and enabling hybrid and multi-cloud designs.
I recently had the pleasure of participating in the Cloud Roundtable discussion hosted during Tech Field Day Extra at VMworld 2019. This discussion included several of my fellow Tech Field Day delegates along with notable representatives from Dell Technologies, VMware, and Intel. What was the purpose of our discussion? To settle the debate around cloud architecture, governance, and multi-cloud, once and for all! While we may not have achieved this goal in the course of one hour, our conversation touched on many important points that are worth consideration.
At VMworld, I had the honor and privilege to participate in a roundtable discussion with some fellow visionaries of Cloud Architecture and we discussed the past, present, and future of Cloud Architecture and Infrastructure as we know it. This conversation highlighted a bright future for cloud, multi-cloud, security, and containers.
Ownership of application and cloud architecture is constantly shifting and is becoming a shared responsibility of business, operations, developers, architects, and security. If you don’t guide the process of cloud consumption within your organization, you’ll end up with a disjointed multi-cloud. In other words: many different disconnected islands, each with incomplete, badly implemented, unaudited security and compliance standards.