
CLOUD COMPUTING — 4th Quarter 2015
Application Assurance for the Borderless Enterprise
Cloud computing has been among the chief enablers of the borderless enterprise, allowing business to adopt new technology and application strategies - specifically, the SaaS (Software-as-a-Service) model continues to proliferate corporate strategy conversations as a means of providing access to business applications and services and allowing employees - and entire businesses - to become more agile.... Read More >>>
Feature Articles
2015 Cloud Computing Excellence Awards
Cloud Computing Magazine's 5th Annual Cloud Computing Excellence Award recognizes vendors that have most effectively leveraged cloud computing in their efforts to bring new, differentiated offerings to market. We congratulate this years winners and look forward to even more exciting and innovative ways to leverage cloud computing in the coming year. - 03/14/2016
IoT and Virtualization - A Cloud Enabled Symbiotic Relationship
If, as Cisco projects, IoT is to scale to 50 billion devices by the year 2020, it will require an agile and elastic infrastructure that only a mature virtualized cloud-based architecture can deliver. Looking at this from the opposite perspective, the virtualization of the network infrastructure may or may not see the return on investment in terms of cost and operational benefit if the demand for IoT does not develop. - 03/14/2016
The Storage Chaos Era: How to Cope with Today's File Synchronization and Migration Challenges
There's good news and bad news in the world of cloud storage. For starters, organizations big and small have a plethora of choices when it comes to moving data from on-premises storage systems to the cloud in order to slash CAPEX, achieve greater agility and provide users with better opportunities to collaborate. - 03/14/2016
Healthcare and Cloud: Protecting Patient Data
The security of a healthcare organization can be as precarious as a row of dominos: Just one weak link in the chain can take down an entire network once an attacker has access. In 2015 alone, the highest-profile healthcare security breaches - Community Health Systems, Anthem and Premera - resulted in the exposure of 96 million personal health records. The impact of the breaches didn't end there, as several network partners of each of those companies were impacted, due to the very nature of information sharing up and down the value chain. - 03/14/2016
COLUMNS
Cloud Security
Cybersecurity Predictions for 2016: The Fusion of Network, Security and the Cloud
We all know that cloud computing has become more widely accepted in the enterprise network. In 2016, we will see more businesses of all sizes turn to the benefits of the Cloud to solve ongoing problems. - 03/14/2016
Cloud Communications
BPaaS: The Next Phase of Cloud Computing
We are starting to see Cloud 2.0 - next generation cloud businesses that provide business functionality beyond software rental. - 03/14/2016
Business Continuity
How Businesses Will Approach Backup and Disaster Recovery in 2016
Disaster recovery will be on everyone's minds in the New Year. Companies big and small will need to invest the time and due diligence necessary to build out solid business continuity plans. - 03/14/2016
Cloud Migration
Migrating to the Cloud to Advance the Continuous Improvement Process
The philosophy of "Continuous Improvement" has its origin in Japan's effort to rebuild its manufacturing sector after World War II. - 03/14/2016
Cloud Networks
SD-WAN is the Future
As quickly as 2015 passed, it left us with a clear understanding that SD-WAN would remain a hot topic for the foreseeable future. - 03/14/2016
Cloud Hosting
2016 Cloud Predictions
When choosing whether to replace depreciated equipment or go to an "as-a-service" provider, businesses are now choosing the latter alternative. - 03/14/2016
Silver Lining
APIs, Cloud and Managed Services Create Buzz at ITEXPO
While there were likely several factors that drove the excitement level, one of the most openly evident variables is always the engagement and enthusiasm of exhibitors. We've all been at shows where booth staff are constantly on their phones, or standing around talking to one another. - 03/14/2016
View from the Cloud
Does Winning Business Outweigh Security Controls?
This is not surprising. After all, human nature, or possibly specifically that of high level executives, typically will put self-interest above the common welfare. And, as my conversations with CSA members illustrate, the real trick is to create an environment and culture that strikes a healthy balance of IT security and business flexibility. Indeed, the real art from IT professionals comes in accomplishing this in a manner that does not impose onerous processes on users. In fact, such processes serve as poster children for what not to do. They invite lack of cooperation by insiders. - 03/14/2016
Publisher’s Outlook
Zultys Upgrades its Communications Software
With the multitude of product offerings out there, I feel the pain for all channel partners. Keeping up with the latest is a task that needs to be on everyone's daily to do list, and they need to be able to run their business at the same time. Continuing education and training is critical or you get left behind. In our case, this was one of the driving forces to make our software the same, regardless of deployment model, so the channel partners would not need to train technicians or sales people on additional products. - 03/14/2016
IN EVERY ISSUE
View From the Cloud
By Peter Bernstein
Publisher's Outlook
By Rich Tehrani
Silver Linings
By Erik Linask
Cloud Computing Newsletter
Sign up for our free weekly Cloud Communications Newsletter!
Get the latest expert news, reviews & resources. Tailored specifically for Cloud Computing.
Breaking News
Traceable AI Unveils API Security Reference Architecture Founded on Zero Trust
Traceable AI has announced its API Security Reference Architecture for Zero Trust, designed to serve as a blueprint for security leaders, addressing the need to integrate API Security into Zero Trust.
The Emerging Focus on SaaS Security
A growing reliance on SaaS applications presents new security challenges because organizations are now finding their critical data residing outside the traditionally controlled network perimeter, stored in the cloud and accessed over the internet.
Juniper Networks and AIOps: A Revolution in Network Management
Juniper's latest enhancements are a move towards a future where AI and advanced wireless technology play a more central role in delivering predictable, reliable, and measurable user experiences from client to cloud.
News From Enterprise Cloud
Meet the Editorial Team
![]() |
Rich TehraniCEO, TMCSince 1982 Rich has led TMC© in many capacities. Rich Tehrani is an IP Communications industry expert, visionary, author and columnist. He founded INTERNET TELEPHONY® magazine...Read More >>> |
![]() |
Erik LinaskGroup Editorial Director, TMCErik oversees the editorial content and direction for all of TMC. Erik has contributed literally thousands of features during his 5-year tenure, with a focus...Read More >>> |