Create value with technology

Ravi Bhangley

Subscribe to Ravi Bhangley: eMailAlertsEmail Alerts
Get Ravi Bhangley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Ravi Bhangley

Just returned from the AWS re:Invent conference in Las Vegas. It was a grand event with three days of serious business nicely interspersed with fun. With fifteen tracks to choose from, it had sessions for every IT role from developer to CIO, every cloud-based technology, companies of all sizes from startups to global enterprises, and partners to customers. I have been working with AWS for four years now, and have attended almost all of their events. I have seen the attendance grow every time. But, this time, it was a big jump – something beyond my expectations. Six-thousand people attended the conference. It was very impressive! So, what has really changed to attract such a huge crowd? One thing I noticed from my conversations with other attendees was that the proportion of enterprise IT personnel (as against those from startups) was significantly higher than on pr... (more)

Has Cloud Computing Reached a New Inflection Point?

Last week, I attended the Oracle Enterprise Cloud Computing summit in New York. It was a very good event; had great speakers - a good mix of thought leaders and those who very well knew how to engage the audience. They shared quite a bit of their vision of how the cloud will take shape within enterprise IT. They also shared information on their products that will enable cloud implementation and integration. Overall, it was more of a cloud computing information sharing event than a typical marketing one which made me quite happy. But, what made me happier was the message that cam... (more)

Demilitarized Cloud (DMC) Pattern

The traditional web hosting architecture is built around a common three-tier web application model that separates it into presentation (web servers), application (application servers) and persistence (database servers) tiers. From the security perspective, while database and applications servers almost always reside in the secure internal network, web servers could possibly go into DMZ if external access needs to be provided to the application from the untrusted network. We are all very much familiar with what a Demilitarized Zone (DMZ) is. Wikipedia defines it as a physical or... (more)