Cloud-Native Computing Takes Over IT Infrastructures

CHRISTINE CIGNOLI | April 6, 2018

article image
“Cloud-native” technology has likely come across your radar screen at some point in the last few years, but what does it mean, exactly? There’s a good explainer here on cloud-native computing, a concept that runs through any cloud service. Any applications, architectures, platforms and processes that work toward increasing IT’s ability to change and reduce unpredictability can be described as cloud-native.

Spotlight

Alibaba Group

ALIBABA GROUP'S MISSION IS TO MAKE IT EASY TO DO BUSINESS ANYWHERE. We provide the fundamental technology infrastructure and marketing reach to help merchants, brands and other businesses that provide products, services and digital content to leverage the power of the Internet to engage with their users and customers. Our businesses are comprised of core commerce, cloud computing, digital media and entertainment, innovation initiatives and others. Through investee affiliates, we also participate in the logistics and local services sectors.

OTHER ARTICLES

Data Security in the Cloud Best Practices

Article | April 8, 2020

Data security in the cloud best practices include: understanding and implementing security fundamentals, securing cloud infrastructure along the shared responsibility model, encrypting data in the cloud, and ensuring compliance with applicable regulations. Data security fundamentals often come back to the CIA Triad: data confidentiality, data integrity, and data availability. The shared responsibility model refers to the idea that both a cloud provider and the organization using the cloud are responsible for ensuring the overall security of the organization’s cloud infrastructure, including the data housed there.

Read More

Protecting your company during COVID-19: Guidance for CIOs and CISOs

Article | April 8, 2020

Cyberattackers are resourceful and opportunistic. They will move quickly to take advantage of a situation. COVID-19 is no different. There is a huge amount of global uncertainty and change right now which criminals are seeking to capitalize on. The risks are amplified by the immediate and unforeseen IT challenges that companies are having ensuring their staff can work from home. There are two areas which are most likely to result in a cybersecurity incident due to the ongoing crisis: remote access and phishing. We’ll cover both in this article and provide a set of prioritized recommendations to expeditiously prevent, or at least mitigate, these critical issues.

Read More

Graph machine learning in distributed systems: What you need to know

Article | March 16, 2020

Just as graphs make it easier for us to understand and act on complex data, graph machine learning can take graph theory a giant step further. But can it even help today’s service providers to improve reliability and predict anomalous behaviors in complicated distributed systems? Find out below…How much do you know about graph representation of data? Over the last two decades, graph theory has become increasingly popular in both research and industry. Among other areas, it has been used in epidemiology, medicine genetics, healthcare, banking and engineering to solve challenges such as routing, finding relation, path etc.

Read More

The world is ready for 5G. Are you?

Article | June 3, 2021

At last, the wait for 5G is nearly over. As this map shows, coverage is widespread across much of the U.S., in 24 EU countries, and in pockets around the globe. The new wireless standard is worth the wait. Compared to 4G, the new wireless standard can move more data from the edge, with less latency. And connect many more users and devices—an important development given that the IDC estimates 152,000 new Internet of Things (IoT) devices per minute by 2025. Put it together, and 5G is a game-changing backhaul for public networks. (Wi-Fi 6, often mentioned in the same breath as 5G, is generally used for private WANs.

Read More

Spotlight

Alibaba Group

ALIBABA GROUP'S MISSION IS TO MAKE IT EASY TO DO BUSINESS ANYWHERE. We provide the fundamental technology infrastructure and marketing reach to help merchants, brands and other businesses that provide products, services and digital content to leverage the power of the Internet to engage with their users and customers. Our businesses are comprised of core commerce, cloud computing, digital media and entertainment, innovation initiatives and others. Through investee affiliates, we also participate in the logistics and local services sectors.

Events