Amazon Web Services’ (AWS) cloud-based platforms provide users with a flexible, easily scalable solution to meet their computing needs. It also eliminates the need for users to invest in a costly physical computer infrastructure of their own. So when it comes disaster recovery, this versatile, decentralized system is an ideal solution for your business. However, while AWS might provide the necessary features for disaster recovery, these tools will prove useless in the absence of a comprehensive strategy. With that in mind, here are 10 tips for developing an AWS disaster recovery plan, along with some information about how third-party vendors like CloudRanger can help with the plan’s implementation.
Category: cloud management
In exciting news announced by Jeff Barr on his outstanding AWS Blog, Amazon Web Services have launched a new EBS feature called Elastic Volumes. In his latest blog, Jeff rightly highlights that, with the dynamic nature of business, block storage requirements can change. As our needs change over time, this creates the requirements to be able to modify existing volumes to add capacity or to change performance characteristics.
The AWS Cloud Adoption Framework (CAF) is a framework for best practices which will enable organisations to go from the traditional on-premises IT model to full adoption and integration of cloud services. This framework divides complex IT environments into specific areas of focus to make them more manageable and to enable organisations to develop a clear and concise migration strategy and to build a comprehensive approach to cloud computing.
Amazon recently announced via their excellent blog, “Now Organize Your AWS Resources by Using up to 50 Tags per Resource”. So what does this mean for AWS customers? As we recently highlighted in an earlier blog “Why is the use of tagging for EBS volumes so important in AWS?”, this new announcement will enable customers, to have 50 tags per resource. Woohoo!
An annual report survey “The 2016 State of the Cloud” by RightScale.Inc shows cloud adoption is growing and hybrid cloud adoption has increased. With growing maturity in the cloud of both user and providers, security concerns have dropped considerably. The greatest challenge cloud users and providers now face are a shortage of trained resources they need to fuel the growth and cost management and optimization strategies, to elevate the cloud bills and cost concerns for experienced cloud users. With AWS enterprise adoption growing from 50% to 56% in the past year, finding ways you can save money on AWS by eliminating unused and idle resources will be of great benefit to all AWS customers.
Why do we need a simpler way to launch a new EC2 instance, does AWS not already tell us how simple this process is and how quick and easy it is to set up? This is all true, however, as more organisations migrate to the cloud AWS continually, strive to meet their customer’s demands and develop with them new ways to meet their organisation requirements or giving the customer the right tools for the right job. So let’s compare, What’s involved in creating an AMI and how does it work, compared to creating an EBS volume Snapshot?
With Microsoft Azure this week announcing, the general availability of Azure SQL Data warehouses, Azure usage and Billing portal, general availability of Azure premium messaging and Public preview of certification based authentication for iOS and android office apps, it’s no wonder that Microsoft this week also announced, companies such as Land O’ Lakes, Bentley systems, and Boeing’s move to Microsoft Azure. On top of which Gartner published the updated cloud for Infrastructure as-a-service (IaaS) scores, and Microsoft Azure announce over 100% Azure growth with share prices increasing by 5%. So, is Microsoft Azure growing up in the cloud computing era?
As the computing world becomes more complex, detecting potential security and compliance issues can be channelling. In news earlier this week the popular Linux OS Ubuntu forums were hacked affecting over 2 million user’s credentials. Ubuntu’s is Linux’s most popular distribution systems and it suffered a common SQL injection attack used by hackers, since an SQL injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.
Last month, on June 28th Amazon announced the rollout of the next generation network interface and associated drivers which will provide greater network capabilities for Amazon EC2 instances. This custom network interface has been designed to give high throughput and packet per second performance (PPS) and low latencies on EC2 instances. Elastic Network Adapter (ENA) provides a network bandwidth of 20Gbps on certain EC2 instance types. ENA was designed to make sure that customer workloads are not bottlenecked by the network.