Blog

Weekly CloudNews: Hybrid Cloud is Where the Action Is

Welcome to this week’s edition of CloudBolt’s Weekly CloudNews!

Here are the blogs we’ve posted this week:

With that, onto this week’s news:

HYBRID CLOUD IS WHERE THE ACTION IS

Matt Asay, InfoWorld, Oct. 5, 2020

“Multicloud is definitely a thing. However, it’s not exactly clear what that ‘thing’ is. According to new survey data from database vendor MariaDB, 71% of survey respondents report running databases on at least two different cloud providers today. Yet when asked what would keep them from going all in on a cloud database, a vendor’s “lack of a multicloud offering” ranked dead last. In other words, everyone is doing multicloud, but no one knows why.

Which perhaps supports Gartner analyst Lydia Leong’s contention that, ‘Most organizations end up multicloud, rather than intending to be multicloud in a deliberate and structured way.’ Pragmatism, not dogmatism, rules.”

3 CLOUD ARCHITECTURE SECRETS YOUR CLOUD PROVIDER WON’T TELL YOU

David Linthicum, InfoWorld, Oct. 2, 2020

“Do you have an optimized architecture? This means that your solution maximizes efficiency and minimizes costs. You’ve selected the right cloud resources to configure the best storage systems, databases, and compute platforms—at least that’s what you think.

What I’m seeing out there, over and over again, is the selection of the wrong cloud resources for the wrong reasons. Cloud providers are pushing something that maximizes their revenue rather than being right for you.”

THE GROWING IMPORTANCE OF DATA ENCRYPTION FOR THE CLOUD

Matt Powell, CPO Magazine, Oct. 2, 2020

“Cyber attacks have increased in frequency. While all industries and all sizes of businesses are vulnerable, these attacks have centered on government agencies, centers of education, health agencies, and banking institutions. One reason data breaches are on the rise is because businesses are migrating their data storage from local storage to the cloud. Cloud storage is connected via wired and wireless technologies.

Cloud storage is convenient. It makes it possible to store large databases of important information. Unfortunately, hackers have become adept at exploiting weaknesses in cloud storage and cloud computing. They can get unauthorized access and then use the information they garner to blackmail individuals, engage in identity theft, or sell the information to a third party.”

EXPERIENCE THE LEADING HYBRID CLOUD MANAGEMENT AND ORCHESTRATION SOLUTION. REQUEST A CLOUDBOLT DEMO TODAY.

The Cloud ROI Newsletter

Exclusive insights and strategies for cloud and FinOps pros. Delivered straight to your inbox.

Related Blogs

 
thumbnail
Build Optionality: The Capabilities That Keep VMware From Dictating Your Roadmap 

Most VMware transition plans still start with the same question: where are we moving?  It’s a reasonable place to start, but…

 
thumbnail
Broadcom Just Posted Record Earnings. Here’s What They’re Not Telling You.

Broadcom reported earnings this week. Record revenue. $19.3 billion in Q1. VMware bookings exceeding $9.2 billion in total contract value.…

 
thumbnail
Field Notes From Enterprise VMware Teams After Broadcom 

Two years after Broadcom’s acquisition of VMware, the conventional wisdom around what’s happening feels rather binary: companies are either leaving wholesale or not making a change…