More Insights Read more →
More Insights Read more →
That’s the clarion call for modernizing businesses.
As organizations seek to focus on areas of direct customer value and reduce friction in operations, the innovations in Cloud technologies have been a real asset. In addition, as organizations have gone increasingly mobile, globalized, and dispersed, the Cloud has proven to be a light-weight, agile solution for productivity and a variety of business and operational functions.
In fact, the larger rubric of digital transformation is largely predicated on moving to The Cloud. As such, Cloud migration is a necessary condition for modernized, digitized enterprises and must be understood in this context.
Under the moniker “Cloud Transformation,” this migration has taken the corporate world by storm, traversing verticals from manufacturing to finance. The results are truly remarkable, organizations are getting up and running on complex systems in hours instead of weeks. Costs are being attributed to operating expense rather than capital expenditure. Individual productivity has increased due to seamless untethering and elasticity that allows for organizations to pay for consumption and not be trapped in a “one-size fits all” modality.
The hype-reality spectrum is closing as Cloud transformation has become a necessary fact of organizational strategy necessary for modernization and growth.
As with all such transformations, two faces emerge. One of the Creator and one of the Destroyer. The efficiency and cost positives are no doubt incredible, but there is more to the Cloud story than the positives. With Cloud transformation comes the increasing relevance of the three horsemen of IT: security, governance, and compliance. Wrap “data” around these three and we begin to discern the complementarity between reward and risk, to accept that with the incredible potential of the Cloud comes incredible risk as well.
Let’s delve into that for a moment; to do so, let’s take a small detour.
It’s generally accepted that data has become the world’s most valuable resource and, as such, is the most sought-after commodity by cyber-criminals. Corporate systems full of proprietary data are thus an El Dorado for increasingly sophisticated hackers who carry clear economic, political and social agendas. While locking down these vaults of “currency” was never truly possible, it has become much harder in the era of the Cloud in which access to data is increasingly democratized and storage of data is no longer particular to a specific organization’s risk profile. With the agility offered by the Cloud so too comes issues of security.
Second only to security is governance. Data is hierarchical in nature. Certain data is more important than others and not everyone should have access to, or the ability to act on all data. Even well-meaning people (employees, contractors, partners, customers) can accidentally share or act on proprietary data. Once again, in an era of on-premise computing, “lockdown” was more of an option than in the Cloud era.
The point is clear. In the Cloud era, agility, security, and governance are part of an eternal braid; they are inextricably wound together.
Which brings us back to the main point that the Cloud must work for organizations as they concentrate on growth.
The key now is to strengthen the Cloud and make Cloud computing more secure and more attuned to the needs of organizations, given their nuances and the dynamism in their states of being.
It’s high time we move beyond “Cloud Transformation” and onto transforming the Cloud.
Sergey Grebnov explains what the future of the Internet of Things looks like with the growth of bots and less IoT fragmentation. Read more.
Progression in digitization and the future of business relies on how we protect the benefits of the Internet and prepare for the risks in doing business online. Read more.
Technology is only great if is used in pursuit of a fix to a real and palpable problems. Real “solutions” do just that. Read more.
Bellevue, Wa – Open source SDK provides access to a new set of Office 365 OData based services for Exchange Mail, Contact, Calendar as well as Sharepoint files and lists. Except for a small authentication wrapper, Exchange SDK code is automatically generated based on OData metadata and is exposed via Java Proxy (reflection) classes that provide JPA in a simple way to interact with a structured object model.
An infrastructure has been developed to generate SDKs based on any OData V4 compliant service metadata. SDK has been released to Maven Central repository. SDK and demo application, showcasing the SDK, have been presented at the SPC 2014 conference. Through the project, code contributions were made to ODataJClient OSS project and ADAL (Azure Active Directory Authentication Layer) OSS project. The contributed code has been moved to Apache Olingo project which has evolved from incubation, to a top level Apache project in a little over a month.
Akvelon engineering team has been working on Android Office 365 SDK in collaboration with the MS Open Tech team and we are happy to see it is finally released.
Microsoft blogged about it as did MS Open Tech in a more detailed post.
Open source SDK provides access to a new set of Office 365 OData based services for Exchange Mail, Contact, Calendar as well as Sharepoint files and lists. Except for a small authentication wrapper, Exchange SDK code is automatically generated based on OData metadata and is exposed via Java Proxy (reflection) classes that provide JPA in a simple way to interact with a structured object model.
We have been really delighted to work with [the consultant]. We have assigned additional items for him to develop as a result. I hope we can work with him again on other projects as well.
Sorry, the comment form is closed at this time.