• How to create a cloud center of excellence
    by Lee Atchison (InfoWorld Lee Atchison) on June 20, 2022 at 10:00 am

    Any sizeable organization focused on developing and deploying cloud-native applications should consider establishing a cloud center of excellence (CCoE). Creating a CCoE will help you successfully leverage the cloud to increase the scale and agility of your business. In a previous article, I discussed the benefits of a CCoE and why you would want to create one in your company. In this article, I will discuss how to do so.Assuming you are interested in building a CCoE, how do you get started? [ Also on InfoWorld: 12 ways to make really bad technology decisions ] The purpose of a CCoE is to provide an organizational focus on cloud initiatives within the company, and to bring order and structure to those initiatives. For a CCoE to be effective, your organization as a whole must buy into cloud computing and want to pursue it. Corporate management must be well-informed and supportive of the endeavor. A CCoE will not—cannot—be effective without company management support. It is not a tool to convince upper management of the effectiveness of the cloud. If you are in a position where you are trying to convince management of the value of the cloud, you should not look at a CCoE as the means to accomplish that.To read this article in full, please click here

  • Tapping the Full Potential of the Cloud for Your Business
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on June 13, 2022 at 12:28 pm

    Learn how you can use the cloud for a complete digital transformation. The post Tapping the Full Potential of the Cloud for Your Business appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Maximize your cloud security with isolation zones
    by Lee Atchison (InfoWorld Lee Atchison) on June 6, 2022 at 10:00 am

    Keeping your application safe and secure is critical to a successful enterprise. Whether you use cloud-native application architectures or on-premises systems—or anything in between—it’s generally considered that splitting your infrastructure into security zones is a best practice. These zones provide security isolation that keeps your applications and their data safe from outside bad actors. A security breach in one area can be limited to impact only the resources within that one area.Done correctly, this zone-based isolation process can take a security breach that might otherwise be a massive impact to your application integrity, and turn it into a much smaller problem, perhaps an insignificant breach with minimal impact.To read this article in full, please click here

  • Edge Computing and IoT Is Everywhere, and the Cloud Plays a Key Role
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on May 30, 2022 at 12:24 pm

    Our world is already full of interconnected devices on the “edge” of the cloud. The post Edge Computing and IoT Is Everywhere, and the Cloud Plays a Key Role appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • You’re missing the boat on cloud-native
    by Lee Atchison (InfoWorld Lee Atchison) on May 23, 2022 at 10:00 am

    I read an OutSystems report the other day that surprised me. According to OutSystems’ “Cloud-Native Development: Ready or Not?” report, although both Gartner and IDC predict that 90% to 95% of applications will be cloud-native by 2025, only 47% of IT decision makers and developers even understand what “cloud native” actually means.In other words, fewer than half of the people who need to know how to build and implement a cloud-native application actually understand what it means to be cloud-native and how to be ready for it. If true, that’s a scary state of affairs for modern enterprise development efforts.To read this article in full, please click here

  • Assessing Your Organization’s Cloud Maturity Level
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on May 16, 2022 at 6:02 pm

    There are six basic maturity levels that organizations go through during their cloud adoption process. The post Assessing Your Organization’s Cloud Maturity Level appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Does low code make applications overly complex?
    by Lee Atchison (InfoWorld Lee Atchison) on May 9, 2022 at 10:00 am

    Low code continues to receive a lot of press—and debate. Many software developers still wonder whether the use of low code makes the application development process better, or if it interferes with the development process and results in inferior applications. Others worry about the security implications of low code.Certainly, if the inevitable outcome of using low code is greater application complexity, then low code could lead to increased difficulty with security issues. But does it? I’ve been writing a lot about application complexity recently, and a lot about low code. But the correlation between application complexity with the use of low code is an interesting perspective. Let’s dive in.To read this article in full, please click here

  • The Dangers of Data Partitioning While Scaling
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on April 27, 2022 at 6:03 pm

    Data partitioning is commonly used by SaaS systems trying to scale to handle large quantities of traffic. But there are risks you should be aware of. The post The Dangers of Data Partitioning While Scaling appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Why blockchain is the future of the internet
    by Lee Atchison (InfoWorld Lee Atchison) on April 25, 2022 at 10:00 am

    The future of the internet has been the subject of much speculation and debate in the past few years. From the rise of virtual worlds and immersive experiences to the explosive growth of social media, the internet has become a ubiquitous medium for communication and commerce. With the rise of blockchain, the internet is about to go through a major transformation.This isn’t the first transformation of the internet. Since its public emergence nearly 30 years ago, the internet has gone through two major evolutions and is about to go through a third. These transformations not only have changed how we use the internet and what we use it for, but they have impacted the world at large, changing how we live and work and interact with others.To read this article in full, please click here

  • How to Become a Software Architect: Interview with Java Brains Founder
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on April 13, 2022 at 4:00 pm

    I talk with Koushik Kothagal about how software engineers who are ready for the next step in their careers can make the leap from developer to software architect. The post How to Become a Software Architect: Interview with Java Brains Founder appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Use of consumption apps in the enterprise
    by Lee Atchison (InfoWorld Lee Atchison) on April 11, 2022 at 10:00 am

    I was talking to a colleague the other day, and they made a statement that I found very interesting. In enterprise IT organizations, only transactional applications are of any real importance. I couldn’t disagree more.Transactional applications are obviously extremely important to enterprise IT organizations. One viewpoint is that they are the backbone of most of the enterprise IT applications. But to say that the only types of applications that are important to the enterprise are transactional applications is missing an entire class of applications that is critical to modern businesses—consumption applications.To read this article in full, please click here

  • Don’t Put Architecture at Risk in Rush to Build a Minimum Viable Product
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on March 30, 2022 at 3:00 pm

    Just using Agile and DevOps processes to build your product can quickly create a large backlog of technical debt. The post Don’t Put Architecture at Risk in Rush to Build a Minimum Viable Product appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Managing the complexity of cloud strategies
    by Lee Atchison (InfoWorld Lee Atchison) on March 28, 2022 at 10:00 am

    How you use cloud computing will be a major decision in your application strategy architecture and planning, and multicloud is becoming increasingly the popular choice among cloud architects for building high-end, cloud-centric, enterprise applications. If you’ve already decided on a multicloud strategy, you must decide what type of multicloud strategy is best for your application. That decision may not be as clear-cut as you might think. [ Also on InfoWorld: Vercel, Netlify, and the new era of serverless PaaS ] Types of multicloud strategies In general, multicloud is a strategy with which a single application is deployed using more than one cloud provider. For example, as shown in Figure 1, an application could be deployed to both Amazon Web Services (AWS) and Google Cloud Platform (GCP), and take advantage of both sets of cloud services.To read this article in full, please click here

  • Tech Trends: First Look, Episode #1
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on March 18, 2022 at 9:04 pm

    Join Lee Atchison and Ken Gavranovic as we take discuss hot tech trends. We look at what's getting funded and what's getting traction in the marketplace. Finally, we take a look at a story behind a story in the news. The post Tech Trends: First Look, Episode #1 appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Availability vs. Reliability: What’s the Difference?
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on March 15, 2022 at 5:01 pm

    Availability and reliability are similar but different concepts. When building web applications, it’s important to understand the difference between the two. The post Availability vs. Reliability: What’s the Difference? appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Is low-code safe and secure?
    by Lee Atchison (InfoWorld Lee Atchison) on March 14, 2022 at 10:00 am

    I was intrigued by an article I read the other day in CSO Online titled “4 security concerns for low-code and no-code development”. The premise of the article was, essentially, that enterprises must beware of low-code solutions, because they can cause security concerns.In the article, author Chris Hughes says, “By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.” [ Read the InfoWorld reviews: Amazon Honeycode | Microsoft Power Apps | Google Cloud AppSheet ] I fundamentally disagree with this premise. Specifically, there is nothing inherently secure or insecure about low-code or no-code solutions. The key to all application development frameworks, systems, processes, and policies—manual or automated—is that they are as secure as the enterprise invests in making them secure.To read this article in full, please click here

  • When your app should be smooth, not sticky
    by Lee Atchison (InfoWorld Lee Atchison) on February 28, 2022 at 11:00 am

    Consumers are changing.When was the last time you went into a bank? Or do you do most of your banking via an online application or website?What about shopping? Do you still go to the mall to find that perfect Christmas present, or are you more likely to look online? How many empty boxes from delivered packages do you have in your garage right now? [ Also on InfoWorld: Complexity is killing software developers ] What about eating dinner? How often do you go to a restaurant versus ordering from an application and picking up the food or having it delivered? Even if you are eating at a restaurant, are you interacting with a menu on your phone? Are you paying your bill from your phone?To read this article in full, please click here

  • Don’t Let Your Application Turn into Another Winchester Mystery House
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on February 21, 2022 at 4:00 pm

    Let the famous haunted house serve as a warning to those who would build applications without a clear vision of what they want as a finished product. The post Don’t Let Your Application Turn into Another Winchester Mystery House appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Your Business Has a Disaster Recovery Plan—But Have You Actually Tested It?
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on February 11, 2022 at 6:20 pm

    The most effective way to determine if your company's disaster recovery plan will work is to test it in a production-level environment. The post Your Business Has a Disaster Recovery Plan—But Have You Actually Tested It? appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Do you need a cloud center of excellence?
    by Lee Atchison (InfoWorld Lee Atchison) on January 31, 2022 at 11:00 am

    In the past few years, cloud computing has become a dominant trend in enterprise IT. The benefits of moving to the cloud are clear: lower costs, increased flexibility, and improved scalability. But as more companies move their infrastructures into public clouds such as AWS or Azure, they face a challenge that is often overlooked: How do they transform an organization from a typical on-premises company to a cloud-native, cloud-centric organization?A cloud center of excellence (CCoE) is an organizational entity that has emerged as a driving influence for accelerating cloud-native transformations. As cloud-based applications become ubiquitous and cloud adoption rates continue to rise, CCoEs are becoming more prevalent in many modern organizations. But what does a cloud center of excellence look like? How does it fit into modern IT organizations? And how can it assist in your organization’s transformation?To read this article in full, please click here

  • Manage permissions to keep applications safe and secure in the cloud
    by Lee Atchison (Lee Atchison – diginomica) on January 20, 2022 at 2:48 pm

    Security breaches frequently hit the headlines, but enterprises can limit their exposure by adopting three key principles when managing permissions.

  • 4 models for escalating access permissions during emergencies
    by Lee Atchison (InfoWorld Lee Atchison) on January 17, 2022 at 11:00 am

    When building modern applications, managing access permissions during operational events is tricky.Security best practices specify that engineers—developers and operations engineers—should have as little access as possible to the production application and its infrastructure. Sometimes business requirements or industry regulations require access to production to be severely restricted. But even without industry or business requirements, security best practices, such as the principle of least privilege, dictate that engineers should have as little access to production as possible, including those engineers responsible for managing on-call operational issues.To read this article in full, please click here

  • 8 steps to better DNS
    by Lee Atchison (InfoWorld Lee Atchison) on January 3, 2022 at 11:00 am

    DNS is essential to the operation of all aspects of the internet and modern digital businesses. DNS is a highly available, highly redundant, highly reliable service that is absolutely essential to your company’s applications and business operations. A failure in your DNS can bring business to a halt, jeopardizing your company’s future.The problem with DNS is that a tiny mistake in a configuration file can have a ripple effect through the entire DNS and impact all aspects of your company’s operations. A DNS failure will impede your customers’ ability to use your products and your company’s ability to make money. Without solid DNS configuration management in place, you make yourself vulnerable to simple but costly mistakes.To read this article in full, please click here

  • 5 rules for getting data architecture right
    by Lee Atchison (InfoWorld Lee Atchison) on December 20, 2021 at 11:00 am

    Architecting modern applications is a tough job, and architecting a solid data model for modern applications is one of the toughest, yet most important, parts of a modern application architecture.Failure to create a reasonable data architecture can cause your application to fail in many bad ways—from performance-related issues to data integrity issues to data sovereignty and data safety issues, to scalability issues. A poor data architecture can leave your application—and your company—in bad shape. [ Also on InfoWorld: 3 reasons centralizing your data is a bad idea ] Building a proper data architecture is critical to the long-term success of all modern architectures. To assist in your application modernization process, here are five rules to follow when architecting—or rearchitecting—your application data.To read this article in full, please click here

  • A cure for complexity in software development
    by Lee Atchison (InfoWorld Lee Atchison) on December 6, 2021 at 11:00 am

    I recently read Scott Carey’s great InfoWorld article that focuses on application complexity as an agent for reducing developer productivity and livelihood.The article has some great ideas, including focusing on reining in complexity by using standardized third-party services and other techniques. This is a strategy that I agree has value to many organizations. [ Also on InfoWorld: Complexity is killing software developers ] However, the article also states that microservice architectures are more complex than the equivalently functional application in a monolithic architecture, and uses this in furthering the cause that “complexity kills.” I disagree with this assessment.To read this article in full, please click here

  • Learn to love the multitenant cloud
    by Lee Atchison (InfoWorld Lee Atchison) on November 22, 2021 at 11:00 am

    Can you trust the public cloud? The answer, of course, is yes. The public cloud is, in many ways, safer than your own data center.But doesn’t the fact that multiple customers share the same physical hardware create a safety concern? Isn’t any multitenant system inherently less secure?What is multitenancy? First, we should discuss what we mean by multitenant environments and what we mean by single-tenant environments. As you might suspect, the answer is not as clear-cut as it might seem.To read this article in full, please click here

  • Five causes of poor availability to watch out for
    by Lee Atchison (Lee Atchison – diginomica) on May 13, 2020 at 12:28 pm

    Poor availability always hits at the worst possible time. New Relic's Lee Atchison outlines five of the main causes in digital applications

  • Are you ready to scale your digital business?
    by Lee Atchison (Lee Atchison – diginomica) on April 27, 2020 at 9:45 am

    It's crucial for a digital business to architect your application so it can scale for growth and unexpected loads. New Relic's Lee Atchison explains why

  • Forget AWS Lambda, Kubernetes AND Fargate - what we need is beyond all three
    by Lee Atchison (Lee Atchison – diginomica) on March 31, 2020 at 5:17 pm

    Back in 2018, New Relic's Lee Atchison controversially argued for AWS Fargate over Lambda or Kubernetes as the future of serverless - but it hasn't lived up to the promise, he now believes

  • Why SaaS is the best way to monitor on-premise environments
    by Lee Atchison (Lee Atchison – diginomica) on March 15, 2019 at 4:23 am

    Some organizations still use on-premise solutions for application performance monitoring! New Relic's Lee Atchison explains why SaaS should be a no-brainer