Deliver Leading Hybrid Cloud Management for Business Critical Applications

November 19, 2015
By Originally appeared on Cloud Application Manager blog

Visualization

New application architecture visualization advances enterprise deployment and management.

We’ve heard your feedback loud and clear. And as such, today marks the formal release of Cloud Application Manager 3.5 which is filled with new capabilities to enable IT to drive value, productivity and confidence throughout the enterprise. As a result, we continue to focus on the enhancements that simplifies the daily routine of IT experts by providing a highly adaptive model for standardizing the process of deployments and environment provisioning.

Company Feedback
451 Research “Cloud Application Manager does a good job of supporting the application deployment process and infrastructure management with its self-service portal and box blueprints for popular and widely-used software components, including containers. This means application owners and IT operations can more effectively collaborate on applications and releases with visualization for traditional, production, mission-critical and multi-tiered applications.” ~ Jay Lyman, Research Manager, Cloud Management and Containers, 451 Research
Brainshark “Cloud Application Manager allows us to create predictable and repeatable processes removing the need for manual infrastructure provisioning and configuration. The solution offers a very powerful IT workflow and provisioning automation platform combined with an intuitive user interface we are proud to expose to our internal customers. Adding Cloud Application Manager to our continuous delivery pipeline has
...

Read on...

Colocation Buyer’s Guide

November 19, 2015
By Joseph Nguyen

Colocation-globe

In regards to Colocation, the saying: "You get what you pay for...” is especially true. Generally, the least expensive quote does not always offer the best value. In this article, we will cover an array of important topics that affect the cost-to-benefits ratio in an effort to arm you with the necessary knowledge to make educated decisions throughout the process. Whether you are just beginning the quest of determining if Colocation is a viable option for your business, or are just starting to shop the market for providers, this guide highlights some of the things to consider throughout the process.

Meet with the Prospective Teams

Talk with the sales and technical staff to gauge if their knowledge and routines are a match for your business needs, which is important because they will become an extension of your existing team. The staff will help you support equipment, answer questions, and you can leverage them to provide additional insight on the best practices for deploying and scaling your operations.

Schedule a site visit.

A site visit is a must. Evaluate the site and confirm everything is "as promised" while gaining a deeper understanding of what will be available in the future. This is a great time...

Read on...

Fedr8 on AppFog is Driving PaaS Usage in Unique Ways

November 16, 2015
By @KeithResar

fedr8-logo

The PaaS Promise - as Implemented

As an industry we see a need for faster iteration on business solutions and an expectation of higher quality. AppFog, like all cloud-based Platform-as-a-Service (PaaS) offerings, is supporting this by changing the way these applications are developed, hosted, and deployed. This change permeates throughout organizations far more deeply than the adoption of Information-as-a-Service (IaaS). In his Forbes article Mike Kavis pointed out the following:

The intent of PaaS was to abstract away all of the messy and challenging IT plumbing work so developers could just write code. PaaS’s original promise was “forget about infrastructure and operations, we will handle that for you.”

This usually presents itself as developers operating with less day-to-day involvement with IT processes as well as the staff focused on infrastructure operations. No more logging tickets for resources and waiting for manual procurement and provisioning. Once developers are using a PaaS in production, the day-to-day management and scaling of the app is highly automated.

Fedr8 Takes PaaS Adoption One Step Further

This is why the Fedr8 model on AppFog struck such a unique chord. True their service depends on PaaS for all the typical operational efficiencies in the web front-end, release management, and...

Read on...

Preview Application Boxes: Deploy Like Never Before

November 4, 2015
By Originally appeared on Cloud Application Manager blog

Application

A couple of months ago, we announced general availability of public boxes, a knowledge repository of sample deployments for popular application stacks.

But, we couldn’t just leave it there because we know that customers want more. How about simplifying your application deployment processes? Cloud Application Manager is now enabling customers to deploy complete application stacks with Application Boxes which include all of the dependent components and infrastructure that can be deployed in a predictable manner.

Application boxes are inspired by the need to reduce and simplify the deployment of complex applications with multiple tiers and multiple instances. To deploy most applications, you need several instances cooperating together in a logical way. Application boxes are a way to define and reuse several boxes that work together to run an application.

App Box

Application boxes are smart boxes that allow you to define your topology, add boxes and bindings, and choose the variables for each one: name, version, tags, policy, etc in only a few minutes. Modeling your applications in these easy-to-deploy boxes prevents errors and saves time. Isn’t it magical?

Get a step closer to democratizing software automation configuration and infrastructure. Learn more about Application Boxes and how they work. Create one of your own here.

Want

...

Read on...

Data Center: Media Protection

October 30, 2015
By Daniel Morton, et. al.

Data Center Media Protection

Ensuring the privacy and confidentiality of data and that customer media is protected are strategic priorities at CenturyLink. That filters down into our chain of custody procedures when handling or transferring customer media and in our procedures for the sanitization and disposal of media. Here's a shocking observation from the National Institute of Standards and Technology (NIST) Special Publication 800-88, Rev.1 on a leading source of media vulnerability and what is needed to close the gap.

An often rich source of illicit information collection is either through dumpster diving for improperly disposed hard copy media, acquisition of improperly sanitized electronic media, or through keyboard and laboratory reconstruction of media sanitized in a manner not commensurate with the confidentiality of its information. Media flows in and out of organizational control through recycle bins in paper form, out to vendors for equipment repairs, and hot swapped into other systems in response to hardware or software failures. This potential vulnerability can be mitigated through proper understanding of where information is located, what that information is, and how to protect it.

Part 3 of the Data Center series highlights the safety measures in place for digital and non-digital media in a CenturyLink data center. We've limited...

Read on...

Deploying Environments and Applications with Source Code: The Cloud-based Approach to Application Creation

October 28, 2015
By Chris Kent

Runner

Creating and deploying applications is like a carefully choreographed dance. One that requires balancing business goals with expectation setting. This feat includes steps like writing groundbreaking code, solving timing restrictions, and overcoming the technical obstacles between all of the teams involved. Ensuring that the dependencies and timelines between the development and testing teams are in sync and align with the hosting company and their assigned help desk engineers can be a daunting task in itself, and it often creates a bottleneck in the process. Even though this dance can be repeated countless times, it’s usually this last step that is clumsy and always results in a different outcome. What if there was a more streamlined, succinct approach to creating and duplicating environments?

What Is Killing Your Deployment Timeline?

Often, the environments in which applications are developed, tested, and deployed compose one of the biggest variables that can impact an overall timeline. The elements of the environments are the same almost every time: a carefully constructed staging environment, which is a cleaner, more stable version of the development environment, both of which closely mimic QA and production environments. When the time comes for deploying to a live environment, unless the environments closely align,...

Read on...

Data Center: Environmental Protections

October 23, 2015
By Daniel Morton

Data Center Environmental Protections

Cyber attacks on major corporations generate big news headlines, especially when they are successful. Threats to a data center from heat, humidity, water, or smoke aren't as flashy in terms of media coverage. They are, nonetheless just as real and, potentially, just as devastating. That's why you need a full array of environmental protections in and around your data center.

Any data center provider will affirm that they're required; and that all built-in protections fly under the radar until you really need them. To illustrate the point, on January 9, 2015 several news agencies covered a 3-alarm fire at a data center in Ashburn, Virginia. The massive building was under construction. The conflagration apparently had started on the roof. Fortunately, there were no injuries and firefighters were able to extinguish the blaze after about an hour.

This is Part 2 in a 3 Part series highlighting different protections inside and around a CenturyLink data center. This time we focus on the environmental safeguards that protect the facility, personnel, the infrastructure, and your data. If you missed Part 1 in the series, Data Center: Physical Security, you can find that topic right here.

Data Center Locations

We carefully choose the location of a data center...

Read on...

Starting from Scratch with Cybersecurity: Introduction to Security Products Part 1

October 21, 2015
By Stephanie Wong, Product Owner.

Security is newsworthy. Recently, the IRS reported as many as 330,000 taxpayer accounts they believe were accessed by thieves. These security breaches often result in identity theft and the loss of critical corporate data, and can cost your company millions of dollars in unrecoverable expenses.

As a company, you need to be aware of IT security and your need to be protected, and you might be wondering where to start. This post is the first in a multi-part series about the various types of security products available and what they can do for you. These tools can be used to secure anything -- whether it's a home PC or laptop, an enterprise tech stack or even a hosted hybrid cloud solution. The same principles apply everywhere. Initially, we’ll begin with host-based security products.

Host-based security products are those that reside on or help to protect one host, server, or virtual machine. These host-based security products can be used at home or at work. The three fundamental types we’ll discuss here are Anti-Virus/Anti-Malware, firewalls and IDS/IDP.

Anti-Virus or Anti-Malware

Let’s start with Anti-Virus or Anti-Malware products. These products detect and protect against software viruses on your host. These harmful files get to your host through...

Read on...

Data Center: Physical Security

October 16, 2015
By Daniel Morton, et. al.

Data Center Physical Security

"Data security starts with physical security." Natalie Lehrer underscored that point in her Information Week article called A Guide to Physical Security. She's right. Protection of company personnel, facilities, and data begins with physical security. It's a strategic priority at CenturyLink. The "rubber meets the road" in the management and operation of the facilities. Our data centers earn a M&O Stamp of Approval Certification from the Uptime Institute. Joel Stone is responsible for Global Data Center Operations at CenturyLink. Here's his take on the importance of a data center receiving M&O Certification:

"Earning the M&O certification demonstrates the effectiveness of a data center’s management and operations, giving customers “peace of mind” by ensuring the facility that houses their critical IT functions has passed a rigorous, third-party audit to conform its practices to the highest of standards."

This is Part 1 in a three part series covering various aspect of data center security. Part 2 will discuss environmental protections. Part 3 will cover media protections.

Security Policies

It starts at the top. Physical security at a data center is governed by CenturyLink Corporate Security. This group oversees the policies, processes, and work rules ensuring that all data centers operate under a consistent set of procedures...

Read on...

Time to Plan Your IPv6 Transition!

October 14, 2015
By Marla Ankenman

IPv6andIPv4

For several years now, the question around the shift to IPv6 has been "When?" NOT "If". As of September 24th 2015, the American Registry for Internet Numbers (ARIN) announced it had issued final IPv4 addresses and the free pool for IPv4 addresses had reached “zero.” The time to prepare for your businesses' IPv6 transition is now!

Why Now is the Time to Start Planning

While a majority of the world's devices today are not yet compatible with IPv6, dual-stack technology ensures that legacy IPv4 devices will still work for the foreseeable future. However, soon IPv6 will be the only option for adding new devices or hosts on the Internet. Understanding the background behind IPv4 and the benefits of IPv6 are the first steps in proactive planning.

IPv4

Computers use Internet Protocol (IP) to find one another and permit communication. IP Version 4 (IPv4) was developed in the early 1980s during a much simpler time in Internet evolution. At that time, 4 billion addresses seemed like a huge number! Since then, the number of computers attached to the Internet has multiplied many times over. Plus, our vehicles and many devices in our homes and pockets use network connections. With the growing trend toward the Internet of...

Read on...

Hybrid IT: Migration as Evolution

October 8, 2015
By Steve Tarver

Improving your business requires changing your business. When dealing with Migration, changes need to be researched per business case and methodically implemented. Stakeholders and leadership are always looking for opportunities rooted in IT and product improvements. Whether these improvements are driven by cost savings or the need for increased capacity, disaster recovery, proximity to customers, or IT/product agility, a diversified data center solution could provide the advantages you are looking for. Over half the market of Enterprise IT decision makers are in the same boat and are researching change that will include a hybrid IT solution by 2017.

To help outline the benefits you might achieve through migration, this article introduces:

  • Four basic hosting options
  • Hosting option characteristics
  • Hosting option selection goals:
    • Converting capital to operating expenses
    • Offloading staff responsibilities
    • Specific operational goals

Data Center Options

The market has responded to customer needs by providing several layers of data center options, offering increased offloading of facility and infrastructure management. Although individual providers have different mixes of features to offer and different ideas about what services to offer at each level, we can divide the space into four general categories.

On-Premises

Company-owned data centers run the gamut of sophistication from a gear closet to a stand-alone data center with dedicated facilities management....

Read on...

Why Managed Services in the Cloud? Exploring the Present and Future State

October 7, 2015
By Navin Arora and Ben Swoboda

People generally agree on what the term "Managed Services" means, right? Unfortunately, "Managed Services" is a bit more complicated than a surface-level term. It’s easy to roll a collection of services, products, and tasks under one broad umbrella statement and call it a day. However, the problem is most companies, product owners, IT managers, customers, and engineers have their own version of what a “Managed Service” actually is, as each one’s experiences are unique. Recently, pressure from consumers for clarity around the term and details of Managed Services necessitates exploration in the effort of yielding a more concise explanation.

Welcome to the CenturyLink Cloud, Managed Services.

Bringing Managed Services to the cloud is one of the many facets of the CenturyLink Cloud® Platform offerings.

CenturyLinkPlatform Offerings

Managed Services on CenturyLink Cloud provides experts at the ready to maintain and administer your cloud deployments for optimum performance and value. CenturyLink Cloud provides businesses with the power to instantly create managed environments for their most important applications such as production websites, SQL databases, and directory services. Additionally, managed workloads can be scaled with the same speed and agility people have come to expect from the public cloud.

Brief History of Managed Services

Managed Services started with break-fix. Over time,...

Read on...


Connect

    Follow us on


Start Your Free Trial

High performance, fast deployment times and intuitive management capabilities that will push your business forward

*We will send a SMS message to verify your account, standard rates apply.