Create value with technology

Ravi Bhangley

Subscribe to Ravi Bhangley: eMailAlertsEmail Alerts
Get Ravi Bhangley: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Ravi Bhangley

Last week, I attended the Oracle Enterprise Cloud Computing summit in New York. It was a very good event; had great speakers - a good mix of thought leaders and those who very well knew how to engage the audience. They shared quite a bit of their vision of how the cloud will take shape within enterprise IT. They also shared information on their products that will enable cloud implementation and integration. Overall, it was more of a cloud computing information sharing event than a typical marketing one which made me quite happy. But, what made me happier was the message that came out of it. It was delivered quite subtly. For most of the products that were presented, the focus was on cloud integration. Here, by "cloud" I mean the public cloud. In fact, there was one whole 45-minute session on integrating on-premise applications with cloud applications. That, to me, ... (more)

Cloud Strategy First

Just returned from the AWS re:Invent conference in Las Vegas. It was a grand event with three days of serious business nicely interspersed with fun. With fifteen tracks to choose from, it had sessions for every IT role from developer to CIO, every cloud-based technology, companies of all sizes from startups to global enterprises, and partners to customers. I have been working with AWS for four years now, and have attended almost all of their events. I have seen the attendance grow every time. But, this time, it was a big jump – something beyond my expectations. Six-thousand people... (more)

Demilitarized Cloud (DMC) Pattern

The traditional web hosting architecture is built around a common three-tier web application model that separates it into presentation (web servers), application (application servers) and persistence (database servers) tiers. From the security perspective, while database and applications servers almost always reside in the secure internal network, web servers could possibly go into DMZ if external access needs to be provided to the application from the untrusted network. We are all very much familiar with what a Demilitarized Zone (DMZ) is. Wikipedia defines it as a physical or... (more)