Welcome!

Focusing on Data and Fact with less Hype

Jon Shende

Subscribe to Jon Shende: eMailAlertsEmail Alerts
Get Jon Shende via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jon Shende

As business technology managers we are constantly challenged by a need to support a broad spectrum of information technologies within our organizations. Now more so with the establishment of the amalgamation of services that now comprises the cloud computing ecosystem. The pure purpose of these technologies is to improve end-users needs as these systems evolve. Managers are in turn constantly challenged in an effort to present and optimize a single infrastructure to support the many different requirements within organizations. We are blitzed daily with newer and allegedly better means to choose, implement, hone, improve, migrate or upgrade our technologies, via web-casts, product pitches, conferences, email blasts etc. Some points to consider: are some of these marketing pitches for "change/upgrades" really necessary or inherently imperative to ensuring that operati... (more)

So You Want to Build a Private Cloud?

As the cacophony of cloud evangelism expands into several areas of industry, one much talked about aspect is that of the private cloud. But what really is a private cloud, and once within an organization's security perimeter is such a system a pure cloud computing ecosystem? (Of course within the security perimeter - IT Security teams again have the advantage of control in lieu of that in a public cloud.) Bear in mind though once you start thinking of access from outside your "private cloud" the whole security dynamic will change. At this point your cloud security perimeter beco... (more)

To Cloud or Not to Cloud

I've been asked quite a few times, "when will it be a good time to get into cloud computing?" by potential clients. My answer is typically it depends... I know, I know.... not much direction there, but really it all depends. Why ? Well, some may state, "we all know of the much beaten security concerns, and we will ensure that systems on our end are secured and synced to work in tandem with the vendors' security." Can one ensure some degree of monitoring by the implementation of an Intrusion Detection System (IDS) residing within the system hosting the gateway into the cloud? The... (more)

Live Forensics and the Cloud - Part 1

Within the realms of digital forensics analysts traditionally performed analysis on static data, either from a core dump, bit to bit imaging etc. Recently we have seen an increased focus directed at the live forensics environment. As users rely more on mobile and other remote devices to access data on demand; data possibly held in some manner of cloud environment, investigators will have to adapt their mode of investigations to suit. I recall reading a marketing pitch a while aback where some vendor claimed that an advantage of Cloud Computing is, an ability to conduct live forens... (more)

Service-Oriented Architecture & Cyber Security

In an earlier article, I stated that we can view Service-Oriented Architecture (SOA) as a synthesis of Enterprise Application Integration (EAI) platforms with middleware tools. This evolution has evolved into an architectural style which, entities can then utilize to execute and align key services with their operational model to achieve strategies, goals and objectives. Most who interact with or have interacted with the Department of Defence (DoD), will know of the various domains through which operations are implemented. As with any effective entity within the federal realm, t... (more)