Sunday, January 24, 2016

5 Relevant Cloud Computing Trends to Watch


Over the past several years, cloud computing has experienced exponential growth, as small and mid-sized businesses have sought to capitalize on the advantages that cloud computing provides. One of the heavily touted benefits of cloud computing is its ability to create some unique advantages for small to mid-sized business, subsequently serving to level the playing field, so that these businesses have the capacity to compete on a broader scale. Currently, more than 60 percent of all small to mid-sized businesses have adopted some form of a cloud computing solution to help meet their computing needs. Additionally, approximately 72 percent of these businesses have virtualized a significant portion of their servers.

The growth in cloud computing is only expected to increase in the coming years. Following are some current trends that are extremely relevant, promising to pay a substantial role in the development of future cloud computing solutions.

1.     Hybrid Cloud Solutions
Recently the discussion surrounding the relative merit of personal cloud computing solutions, and its counterpart, public cloud computing. The introduction of hybrid cloud computing offers an infrastructure that merges the high security benefits of personal cloud computing with the powerful, cost effective and scalable public cloud computing model attributes. This allows IT managers to have access to more computing choices, while those who are in favor of big data and security will also find a high level of satisfaction in the hybrid computing model.

As hybrid cloud computing models continue to move toward the mainstream, look for more businesses to adopt the hybrid cloud computing solution, which will subsequently put an end to the debate.

2.     BYOD
One major benefit that cloud computing has done is create a situation in which business can facilitate mobile accessibility without having to create a massive local network infrastructure. One area in which technology is evolving at a revolutionary pace is in the way of mobile technology. What has changed most about communications technology is that the latest technology is no longer marketed to IT professional, but it is now marketed directly to the consumer, which is somewhat of a role reversal of what has traditionally taken place.

Because employees will generally have mobile technology that is substantially superior to what the IT department has, the demand by employees to use their own devices was inevitable. Although this business computing model can create a number of security challenges for businesses, it also comes with its benefit to the company. For instance, the cost of upgrading the mobile technology no longer rests with the company, as the employee will now carry this burden. It also improves proficiency and worker morale. This model will require the implementation of a Mobile Device Management system in order to facilitate the proclivity of employees to use the cloud to move more and more their personal data to personal cloud services.

3.     Platform as a Service
PaaS solutions allow businesses to significantly reduce their IT costs, while maintaining the capacity to increase application development, using more efficient development and testing methods. The International Data Corporation is projecting that PaaS will expand its market from $3.7 billion to $14 billion globally over the next several years.

4.     Big Data Analytics
Over the last several years there has been a fierce debate surrounding the best computing option for small to mid-sized businesses as far as cloud computing and big data analytics is concerned; however, much in the same way as the debate concerning the choice between the personal and public cloud solutions ended with businesses finding it more advantageous to combine the best of both solutions in lieu of choosing one over the other, businesses have also chose to combine the benefits of big data with cloud computing.

The emergence of big data analytics over the next several years will provide businesses with a scalable tool that is cost effective, allowing them to compete on a global scale.

5.     Graphics as a Service
Traditionally, the capacity to run a high-quality, high-end graphics application required a substantial hardware infrastructure; however, the emergence of cloud computing is quickly transforming this reality. There is a growing number of cloud-based graphics technologies that are being offered to businesses as online services through the cloud computing model. These services provide the capacity for the end users to effectively run high-end graphics programs at a low cost, using a downloadable HTML5 browser.

It is certain; cloud computing is here to stay. The only thing that is left for businesses is to determine is how they will exploit the multitudinous benefits associated with cloud computing.


Wednesday, November 4, 2015

6 Essential Elements of a Well-Crafted IT Project Plan

For some businesses, the key to the company's salvation is business transformation by means of an information technology implementation project. But complex changes in business and system processes are risk-laden ventures, each one subject to internal and external threats. For this reason, a company's survival can depend on the near perfect execution of a well-crafted project plan that's created with careful consideration of all relevant issues, such as project scope and risk management.

Information Technology Project Scope

A first step in planning an IT project is gaining stakeholder agreement as to what work is within a project's scope. A plan's scope statement solidifies a project's scope and identifies the project manager and sponsor, as well as specifies the project's business and technical objectives and its anticipated completion date.

Project scope information guides a team's efforts toward producing a particular outcome within a certain time frame and for a particular cost. Consequently, a well-documented and agreed-to project scope is required to prevent the arbitrary expansion of a project's original objectives. The project manager commences work on the project scope document after leadership approval is given to planning the IT project.

IT Project Risk Management Plan

Risk management is another key element of the project planning process, which specifies how a project team plans to identify, prioritize and mitigate the impact of unforeseen events. To create this plan, the project team documents project risks that must be managed during a project's life cycle, such as financial risks. The risk management plan also identifies the actions the project team will take to address risks when it's cost-effective and reasonable to do so.

To plan for contingencies, the team creates a risk register that describes risks, such as those that may delay project completion or that may cause project costs to exceed the project budget. Also, the team specifies the preferred risk-response strategies that will negate or limit a risk's impact. Project team members complete the risk management plan in an early phase of the project's life cycle.

Information Technology Project Change Management Plan

Because a project is not a static undertaking and change is required as new project needs are identified, the team must create a change management plan. This plan ensures that a team focuses their efforts on the correct issues at the right time and for the right reasons. A simple question, "What must change for the project to be a success in terms of meeting its primary objectives and serving its stakeholders" can alert a project team of a needed project plan change and triggers efforts to document, evaluate, approve, prioritize, schedule and track the changes.

To revise a project plan, a team member creates a project change request and the project manager identifies change agents responsible for the implementing the change and assigns them the authority needed to ensure team members comply with the plan. The project manager creates the change management plan early in the project life cycle and specifies that a change will be considered if it aligns with project goals, provides value to the existing initiative and achieves benefits that exceed their costs.

IT Project Work Breakdown Structure

The work breakdown structure (WBS) provides a view of a project's hierarchy or its "big picture," and includes the individual activities a team will perform during a project's life cycle to accomplish project objectives.

After a project scope is defined, a project manager creates a WBS based on project deliverables, such as a report or software program.  Next, the PM breaks down these objectives to the intermediate objectives, which are subdivided to intermediate requirements.  For instance, to create a report, a team member may need to create a questionnaire or conduct interviews. The work breakdown structure supports the project cost estimation, project scheduling and work assignment processes. The project manager creates the work plan after the project scope is defined.

IT Project Communication Plan

Project communication may relate to a change in a project's scope, its risk, the project schedule, or the project staff or budget. Consequently, poor communication between a project manager, project sponsor and other stakeholders can increase project risks, the duplication of effort, the omission of needed activities and the misallocation of resources. To avoid these circumstances, all planned for communications between stakeholders is noted in a project communication plan, which is created by the project manager (PM), who also monitors the team's compliance with the plan.

The PM determines the objectives of each communication, when particular information is released, in what format information is released, to whom the information is distributed and how the information is stored.  After the project scope is firmly established, the communication plan can be created.

Information Technology Project Resource Plan

A project manager documents the number and types of resources a project requires in a project resource plan, which  the PM creates after a project scope is defined and approved by project stakeholders. As he creates the plan, the project manager makes note of resource availability, as well as resource costs.

To create the resource plan, the PM identifies the roles needed to accomplish each project plan activity, as well as the needed equipment and consumables, such as photocopiers, computers and telecommunications equipment, and copy paper and ink cartridges.

Companies commit to a business transformation by means of an information technology implementation project to achieve particular business goals. Any change in a business or system process, however, is a risk-laden venture. A company limits its exposure by drafting and adhering to a well-crafted project plan that's created with careful consideration of all relevant issues, such as project scope and risk management.


The Ohio State University: Project Management Framework

CIO: How to Create a Clear Project Plan, Elizabeth and Richard Larson, 09-10- 2004


Wednesday, October 28, 2015

Stay secure - October news from Code42



October 2015

This Month at Code42

EXCLUSIVE NEWS + RESOURCES

Protect against data leaks using the Code42 API

Did you know there is a prototype data leak/loss prevention and detection (DLP) security solution available through the Code42 API? The Code42 API Python script monitors and protects the CrashPlan archives of selected users in your Code42 environment against unauthorized or suspicious restore activity. Read this support documentation to learn the purposes, limitations and principles of the script; how to configure, install and implement the script; and how to interpret its output.
Code42

RELEASE NOTES

Code42

POLICY 
NOTIFICATIONS

Code42 secures $85 million investment to continue expansion in endpoint data protection, security, forensics and analytics

Code42 is excited to announce that it has secured $85 million in Series B funding. "We protect the most important information for the world's largest enterprises. This funding enables us to grow even faster in endpoint backup and accelerates our efforts to build analytics and actionable intelligence on top of the historical archive of end-user data," said Joe Payne, president and CEO at Code42.

The history of the web's greediest villain: ransomware

They say history repeats itself, and there's no exception when it comes to ransomware. Becoming infected with ransomware—be it CryptoLocker, CryptoWall, CTB-Locker, TorrentLocker, or one of their many variants—can feel like the digital equivalent of getting mugged. Do you know the origins of ransomware?

Endpoint data control is critical for legal hold + eDiscovery

The right tools can make collection of custodial data faster and simpler—with no nagging questions about discovery integrity or data spoliation. Code42 endpoint data protection and security supports legal hold capabilities. In this IDC analyst report, read how enterprises can combine endpoint data protection and eDiscovery on a single platform and review the risks and challenges associated with data stored beyond the reach of IT departments, risk managers and corporate attorneys.

API cool tools: Advanced REST Client extension for Google Chrome

Code42 Systems Engineer Amir Kader shares why the Advanced REST Client extension for Google Chrome is useful, and how to use it in conjunction with the Code42 API Documentation Viewer. The Documentation Viewer outlines what is required to invoke a resource and what should be returned—but it doesn't show you real data. In this post, you will learn how to use this extension to test resources that are documented, and see the output in a readable format.
DKSHlogo.png

"CrashPlan gives us complete visibility into backup activities and status for all DKSH users, and has cut the number of backup and restore-related service tickets significantly."
-Sven Maushake, General Manager of Global IT Infrastructure for DKSH



Wednesday, October 14, 2015

Bit by Bit: your trusted disaster recovery provider


Information technology is essential to the continuation of critical business functions. So it stands to reason that protecting your organization's data and IT infrastructure in the event of a natural or man-made disaster is a top business priority. All organizations, regardless of size, should have a disaster recovery plan.
Statistics show that on average, over 40% of businesses that do not have disaster recovery plan go out of business after a major loss like a fire, a break-in, a storm or sabotage. With statistics like this in mind, disaster recovery planning should be a top priority for SMBs. A disaster recovery and business continuity plan will bring about the following advantages:
Achieve peace of mind. Get rid of any worries related to the catastrophic loss of your computer data. We provide complete backup protection of your critical business information.
Restore faith in your backups. We ensure your data and systems are continually backed up, automated and always up-to-date.
Count on a speedy recovery. If a disaster occurs, rest assured your business will be up and running immediately.
Protect more than just data. Our solution defends against your entire system, including anti-virus software and other security measures
Let Bit by Bit help your IT department with its disaster recovery procedures, ensuring that you can keep critical services running regardless of power outage, hurricane or human error. Give us a call today at 866-391-1566.