• You Can’t Afford To Not Be in the Cloud
    by Lee Atchison (Lee Atchison, Author at Container Journal) on September 27, 2022 at 12:00 pm

    Consider the following story: “I went into my CEO’s office. Our CEO is a very driven, technical, hands-on CEO. All technical decisions have to go through him before the company goes forward with a plan. Today, the discussion was about the cloud. The problem? The CEO said we couldn’t move The post You Can’t Afford To Not Be in the Cloud appeared first on Container Journal.

  • ModernOps with Beth Long: Transferring Operational Expertise to the Cloud
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on September 26, 2022 at 4:44 pm

    In this episode, we discuss how to manage changing expertise requirements across your organization as you make the transition to the cloud. The post ModernOps with Beth Long: Transferring Operational Expertise to the Cloud appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Are You Ready for Cloud-Native?
    by Lee Atchison (Lee Atchison, Author at Container Journal) on September 20, 2022 at 12:00 pm

    The world is embracing cloud-native application architectures. Last year, Gartner predicted that more than 95% of all new applications will be cloud-native by 2025. This is up from only 30% in 2021. Cloud-native is here today, and it’s important that you understand what it means. If you aren’t currently building The post Are You Ready for Cloud-Native? appeared first on Container Journal.

  • Talking DevOps with Mitch Ashley, CTO of Techstrong Group (DevOps.com)
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on September 12, 2022 at 12:00 pm

    DevOps has gone mainstream, and if you aren’t using DevOps principles, you're at a distinct disadvantage compared to your competition. The post Talking DevOps with Mitch Ashley, CTO of Techstrong Group (DevOps.com) appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • 8 Steps to Higher-Quality DNS Systems [podcast]
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on August 29, 2022 at 3:30 pm

    DNS is essential to operating a modern digital businesses, but a failure in your DNS system can bring your entire business to a sudden halt. The post 8 Steps to Higher-Quality DNS Systems [podcast] appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Avoiding the 4 Most Common Pitfalls of a Cloud Migration
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on August 22, 2022 at 3:00 pm

    Many organizations find that migrating to the cloud isn’t as easy as they expected. Learn how to overcome four common problems you may run into. The post Avoiding the 4 Most Common Pitfalls of a Cloud Migration appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Don’t Let Technical Debt Sink Your Business [podcast]
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on August 15, 2022 at 2:30 pm

    Accelerated application growth often leads to increased technical debt. But what is technical debt and how can you control it? The post Don’t Let Technical Debt Sink Your Business [podcast] appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • How Large Companies Use AWS vs. Smaller Companies [podcast]
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on August 1, 2022 at 3:15 pm

    In this first episode of our new series ModernOps, my co-host Beth Long and I discuss how the experience of using the cloud varies between large companies vs. small startups. The post How Large Companies Use AWS vs. Smaller Companies [podcast] appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • What cloud native means for your business
    by [email protected] (InfoWorld Lee Atchison) on August 1, 2022 at 10:00 am

    From manufacturing to transportation to retail, companies across virtually every industry are supporting their digital transformations by moving to a cloud-based infrastructure. The shift from on-premises software to cloud services has been revolutionary to the process of application development and deployment, especially software-as-a-service (SaaS) applications. But using the cloud often isn’t enough. You need to leverage cloud-native applications to benefit from the improved agility, availability, scalability, and overall performance they provide.To read this article in full, please click here

  • The Dynamic Cloud Helps Your Website Work When Customers Need It Most
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on July 28, 2022 at 4:21 pm

    It doesn't matter if your application works most of the time; what matters is that it works on the biggest days for your business. The post The Dynamic Cloud Helps Your Website Work When Customers Need It Most appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • The Finances of a Cloud Migration [podcast]
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on July 25, 2022 at 4:24 pm

    How are your company's finances affected by a cloud migration? Listen to the first episode of the Modern Digital Business podcast to find out. The post The Finances of a Cloud Migration [podcast] appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Securing data at rest and data in motion
    by [email protected] (InfoWorld Lee Atchison) on July 18, 2022 at 10:00 am

    Creating a secure application requires many safeguards, but by far the most important are those that secure the data in the application. These are also the most difficult to implement.When it comes to securing application data, there are two distinct types of data that must be secured: Data at rest. This is data that is stored in a datastore, database, cache, file system, or other repository. It includes everything from the application’s database, to log files, to system configuration files, to backups and archives. Data in motion. This is data that is being actively accessed and used by the application. It could be data that is being transferred from one part of the application to another part of the application, such as between client and server, or between two different applications or services. [ Also on InfoWorld: Why you should use a microservice architecture ] A simple example of data at rest is your user profile in a SaaS application. This profile might include your username, password, profile picture, email address, physical address, and other contact information. It might include application information about how you are using the application. In a more local setting, data at rest includes all of the files stored on your computer—your spreadsheets, Word documents, presentations, photos, videos, everything.To read this article in full, please click here

  • Is a Cloud Center of Excellence Right for Your Organization?
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on July 14, 2022 at 4:17 pm

    Learn how building a Cloud Center of Excellence in your organization can be the key to successful cloud adoption, management, and optimization. The post Is a Cloud Center of Excellence Right for Your Organization? appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Identity, trust, and their role in modern applications
    by [email protected] (InfoWorld Lee Atchison) on July 4, 2022 at 10:00 am

    In the software world, identity is the mapping of a person, place, or thing in a verifiable manner to a software resource. Whenever you interact with nearly anything on the internet, you are dealing with identities: Facebook identity Email address Login name and password for a website Everyone has multiple identities—multiple ways that people know who you are and interact with you in the virtual world. Here are a few of my identities: Twitter: @leeatchison LinkedIn: leeatchison Email address: lee###@####.com Phone number: (360) ###-#### [ Also on InfoWorld: Where software development is headed in 2022 ] Each of these is a different way of identifying me to my friends, family, co-workers, partners, and vendors. You deal with identities all the time. Identities can represent more than people. Everything you interact with in the real world that has a presence in the virtual world has to deal with identity and identity management:To read this article in full, please click here

  • How to create a cloud center of excellence
    by [email protected] (InfoWorld Lee Atchison) on June 20, 2022 at 10:00 am

    Any sizeable organization focused on developing and deploying cloud-native applications should consider establishing a cloud center of excellence (CCoE). Creating a CCoE will help you successfully leverage the cloud to increase the scale and agility of your business. In a previous article, I discussed the benefits of a CCoE and why you would want to create one in your company. In this article, I will discuss how to do so.Assuming you are interested in building a CCoE, how do you get started? [ Also on InfoWorld: 12 ways to make really bad technology decisions ] The purpose of a CCoE is to provide an organizational focus on cloud initiatives within the company, and to bring order and structure to those initiatives. For a CCoE to be effective, your organization as a whole must buy into cloud computing and want to pursue it. Corporate management must be well-informed and supportive of the endeavor. A CCoE will not—cannot—be effective without company management support. It is not a tool to convince upper management of the effectiveness of the cloud. If you are in a position where you are trying to convince management of the value of the cloud, you should not look at a CCoE as the means to accomplish that.To read this article in full, please click here

  • Tapping the Full Potential of the Cloud for Your Business
    by Lee Atchison (Lee Atchison | Cloud Strategist, Thought Leader, Author) on June 13, 2022 at 12:28 pm

    Learn how you can use the cloud for a complete digital transformation. The post Tapping the Full Potential of the Cloud for Your Business appeared first on Lee Atchison | Cloud Strategist, Thought Leader, Author.

  • Maximize your cloud security with isolation zones
    by [email protected] (InfoWorld Lee Atchison) on June 6, 2022 at 10:00 am

    Keeping your application safe and secure is critical to a successful enterprise. Whether you use cloud-native application architectures or on-premises systems—or anything in between—it’s generally considered that splitting your infrastructure into security zones is a best practice. These zones provide security isolation that keeps your applications and their data safe from outside bad actors. A security breach in one area can be limited to impact only the resources within that one area.Done correctly, this zone-based isolation process can take a security breach that might otherwise be a massive impact to your application integrity, and turn it into a much smaller problem, perhaps an insignificant breach with minimal impact.To read this article in full, please click here

  • You’re missing the boat on cloud-native
    by [email protected] (InfoWorld Lee Atchison) on May 23, 2022 at 10:00 am

    I read an OutSystems report the other day that surprised me. According to OutSystems’ “Cloud-Native Development: Ready or Not?” report, although both Gartner and IDC predict that 90% to 95% of applications will be cloud-native by 2025, only 47% of IT decision makers and developers even understand what “cloud native” actually means.In other words, fewer than half of the people who need to know how to build and implement a cloud-native application actually understand what it means to be cloud-native and how to be ready for it. If true, that’s a scary state of affairs for modern enterprise development efforts.To read this article in full, please click here

  • Does low code make applications overly complex?
    by [email protected] (InfoWorld Lee Atchison) on May 9, 2022 at 10:00 am

    Low code continues to receive a lot of press—and debate. Many software developers still wonder whether the use of low code makes the application development process better, or if it interferes with the development process and results in inferior applications. Others worry about the security implications of low code.Certainly, if the inevitable outcome of using low code is greater application complexity, then low code could lead to increased difficulty with security issues. But does it? I’ve been writing a lot about application complexity recently, and a lot about low code. But the correlation between application complexity with the use of low code is an interesting perspective. Let’s dive in.To read this article in full, please click here

  • Why blockchain is the future of the internet
    by [email protected] (InfoWorld Lee Atchison) on April 25, 2022 at 10:00 am

    The future of the internet has been the subject of much speculation and debate in the past few years. From the rise of virtual worlds and immersive experiences to the explosive growth of social media, the internet has become a ubiquitous medium for communication and commerce. With the rise of blockchain, the internet is about to go through a major transformation.This isn’t the first transformation of the internet. Since its public emergence nearly 30 years ago, the internet has gone through two major evolutions and is about to go through a third. These transformations not only have changed how we use the internet and what we use it for, but they have impacted the world at large, changing how we live and work and interact with others.To read this article in full, please click here

  • Use of consumption apps in the enterprise
    by [email protected] (InfoWorld Lee Atchison) on April 11, 2022 at 10:00 am

    I was talking to a colleague the other day, and they made a statement that I found very interesting. In enterprise IT organizations, only transactional applications are of any real importance. I couldn’t disagree more.Transactional applications are obviously extremely important to enterprise IT organizations. One viewpoint is that they are the backbone of most of the enterprise IT applications. But to say that the only types of applications that are important to the enterprise are transactional applications is missing an entire class of applications that is critical to modern businesses—consumption applications.To read this article in full, please click here

  • Managing the complexity of cloud strategies
    by [email protected] (InfoWorld Lee Atchison) on March 28, 2022 at 10:00 am

    How you use cloud computing will be a major decision in your application strategy architecture and planning, and multicloud is becoming increasingly the popular choice among cloud architects for building high-end, cloud-centric, enterprise applications. If you’ve already decided on a multicloud strategy, you must decide what type of multicloud strategy is best for your application. That decision may not be as clear-cut as you might think. [ Also on InfoWorld: Vercel, Netlify, and the new era of serverless PaaS ] Types of multicloud strategies In general, multicloud is a strategy with which a single application is deployed using more than one cloud provider. For example, as shown in Figure 1, an application could be deployed to both Amazon Web Services (AWS) and Google Cloud Platform (GCP), and take advantage of both sets of cloud services.To read this article in full, please click here

  • Is low-code safe and secure?
    by [email protected] (InfoWorld Lee Atchison) on March 14, 2022 at 10:00 am

    I was intrigued by an article I read the other day in CSO Online titled “4 security concerns for low-code and no-code development”. The premise of the article was, essentially, that enterprises must beware of low-code solutions, because they can cause security concerns.In the article, author Chris Hughes says, “By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.” [ Read the InfoWorld reviews: Amazon Honeycode | Microsoft Power Apps | Google Cloud AppSheet ] I fundamentally disagree with this premise. Specifically, there is nothing inherently secure or insecure about low-code or no-code solutions. The key to all application development frameworks, systems, processes, and policies—manual or automated—is that they are as secure as the enterprise invests in making them secure.To read this article in full, please click here

  • When your app should be smooth, not sticky
    by [email protected] (InfoWorld Lee Atchison) on February 28, 2022 at 11:00 am

    Consumers are changing.When was the last time you went into a bank? Or do you do most of your banking via an online application or website?What about shopping? Do you still go to the mall to find that perfect Christmas present, or are you more likely to look online? How many empty boxes from delivered packages do you have in your garage right now? [ Also on InfoWorld: Complexity is killing software developers ] What about eating dinner? How often do you go to a restaurant versus ordering from an application and picking up the food or having it delivered? Even if you are eating at a restaurant, are you interacting with a menu on your phone? Are you paying your bill from your phone?To read this article in full, please click here

  • Do you need a cloud center of excellence?
    by [email protected] (InfoWorld Lee Atchison) on January 31, 2022 at 11:00 am

    In the past few years, cloud computing has become a dominant trend in enterprise IT. The benefits of moving to the cloud are clear: lower costs, increased flexibility, and improved scalability. But as more companies move their infrastructures into public clouds such as AWS or Azure, they face a challenge that is often overlooked: How do they transform an organization from a typical on-premises company to a cloud-native, cloud-centric organization?A cloud center of excellence (CCoE) is an organizational entity that has emerged as a driving influence for accelerating cloud-native transformations. As cloud-based applications become ubiquitous and cloud adoption rates continue to rise, CCoEs are becoming more prevalent in many modern organizations. But what does a cloud center of excellence look like? How does it fit into modern IT organizations? And how can it assist in your organization’s transformation?To read this article in full, please click here

  • Manage permissions to keep applications safe and secure in the cloud
    by Lee Atchison (Lee Atchison – diginomica) on January 20, 2022 at 2:48 pm

    Security breaches frequently hit the headlines, but enterprises can limit their exposure by adopting three key principles when managing permissions.

  • 4 models for escalating access permissions during emergencies
    by [email protected] (InfoWorld Lee Atchison) on January 17, 2022 at 11:00 am

    When building modern applications, managing access permissions during operational events is tricky.Security best practices specify that engineers—developers and operations engineers—should have as little access as possible to the production application and its infrastructure. Sometimes business requirements or industry regulations require access to production to be severely restricted. But even without industry or business requirements, security best practices, such as the principle of least privilege, dictate that engineers should have as little access to production as possible, including those engineers responsible for managing on-call operational issues.To read this article in full, please click here

  • 8 steps to better DNS
    by [email protected] (InfoWorld Lee Atchison) on January 3, 2022 at 11:00 am

    DNS is essential to the operation of all aspects of the internet and modern digital businesses. DNS is a highly available, highly redundant, highly reliable service that is absolutely essential to your company’s applications and business operations. A failure in your DNS can bring business to a halt, jeopardizing your company’s future.The problem with DNS is that a tiny mistake in a configuration file can have a ripple effect through the entire DNS and impact all aspects of your company’s operations. A DNS failure will impede your customers’ ability to use your products and your company’s ability to make money. Without solid DNS configuration management in place, you make yourself vulnerable to simple but costly mistakes.To read this article in full, please click here

  • Five causes of poor availability to watch out for
    by Lee Atchison (Lee Atchison – diginomica) on May 13, 2020 at 12:28 pm

    Poor availability always hits at the worst possible time. New Relic's Lee Atchison outlines five of the main causes in digital applications

  • Are you ready to scale your digital business?
    by Lee Atchison (Lee Atchison – diginomica) on April 27, 2020 at 9:45 am

    It's crucial for a digital business to architect your application so it can scale for growth and unexpected loads. New Relic's Lee Atchison explains why