Tuesday, October 23, 2012

Approyo Announces Hana Post Production Support


Approyo Announces Hana Post Production Support

Approyo's always available PoC’s and support approach automatically allows the business process, end-user, application, datacenter and cloud perspectives, providing unmatched support across the entire Hana solution

PRLog (Press Release) - Oct 23, 2012 - 
NEW YORK, NY - October 23, 2012– Approyo the leader in SAP Hana business transaction-driven Proof of Concepts & Support offerings, today announced a new Post Production Support (PPS) solution to serve its growing client base in the Hana arena. The new (PPS) offering is part of a prestigious demand from the SAP eco-system customers, and key to the company's growth and strategy. Clients and partners such as SAP, CSC, and Booze Allen Hamilton just to name a few accounts have engaged Approyo for the solution.


Read More Here....

Saturday, September 22, 2012

SAP Hana POC's


SAP Hana POC Through the Cloud
Hana Proof of Concept NOW!
The Silver Lining® Cloud for your SAP Hana Proof of Concept allows you to jump right into your research without waiting for hardware or time to build an on-site system. You can immediately deliver capabilities to numerous staff members for assessment and acclimation. We designed our Silver Lining® solution to be seamless to your environment.

Sign up and go through a normal SAP log on GUI pad or on an Ipad or thru the web. You will have full Hana Studio access to a fully configured SAP Hana Cloud that allows you to grasp the new Hana solution, build upon knowledge needed in the complex issue of SAP, all while not having to install, service or support the solution.

Companies using SAP are engaged in evaluation, of the new Hana in memory solution. 
As companies strive to justify and leverage these investments, executive management is looking for the following –
• Reliability in testing for your POC
• ROI from the investment in new tools and applications (Try it before you buy it)
• Higher levels of acceptance, utilization and production from its user and technical communities

What is needed is the option to access a fully functional SAP Hana system where SAP users can construct Proof of Concept and Conference Room Pilot environments to experiment with this new SAP functionality – with full control and usability and no disruption to your production environment!  Approyo has invested over two years working hand in hand with SAP experts in creating a reliable, fully functional SAP Hana cloud solution to address this need.

This offering will enable any SAP client to access their own fully functional SAP Hana  environment for Proof of Concept and experimentation purposes.

Your “cloud” is highly secured and only accessed/used by your organization and requires NO internal resources (systems/ or technical staff) to utilize (Only to do a Hana Studio implementation).

This solution is intended for non-production utilization as an alternative to buying/supporting incremental servers whereby we handle the hosting of your Hana cloud instance –in 17 minutes!! As confirmed by select trial users of this offering, “the Silver Lining SAP Cloud Solution” adds tremendous value throughout the SAP POC process and is ideal for rapid, low-cost access to a fully functional Hana environment.

Contact Approyo to confirm your interest in deploying our Silver Lining SAP Hana cloud solution. We will discuss your interest and requirements for using the solution and provision your own SAP clouds. A POC term for Hana is typically been 90 days.

Companies today are adopting Hana to drive higher value to their users while stretching increasingly scarce IT dollars. Approyo is committed to assisting these companies in pursuit of this goal and strive to provide meaningful solutions that drive value into the SAP landscape.

Friday, June 15, 2012

Cloudsoft Expands its Advisory Board with the Appointment of Major General David Shaw CBE


Former Director of Army Media and Communications to Drill Cloud Computing Start-up in Institutional and Government Markets

EDINBURGH, June 14, 2012 – Cloudsoft Corporation, a software innovator specialising in multi-cloud application management, today announced they have appointed Major General David Shaw CBE to their strategic advisory board. Shaw joins the board to help shape Cloudsoft‘s approach to government and institutional markets, and to provide guidance in media and communication.

Tuesday, June 5, 2012

How Enterprises Can Bend the Programmer Learning Curve

http://sandhill.com/article/how-enterprises-can-bend-the-programmer-learning-curve/

Wednesday, November 16, 2011

ServiceMesh Fires It Up with $15 Million From Ignition Partners

Frank Artale Joins ServiceMesh Board of Directors

SANTA MONICA, Calif. – Nov. 16, 2011 – ServiceMesh, provider of the market-leading enterprise cloud platform for Global 2000 companies, today announced that it has completed a funding round of $15 million through Ignition Partners. Frank Artale, a partner at Ignition, will join the ServiceMesh board of directors. ServiceMesh will use the capital from this funding to accelerate its global market penetration and partnerships.
Founded by former Microsoft and McCaw Cellular executives, Ignition Partners focuses on emerging and future leaders in communications, Internet, software, and services across business and consumer targets. The firm boasts a pedigree team of partners including Artale, a former executive at Citrix, Microsoft, XenSource, and VERITAS; John Connors, former CIO and CTO at Microsoft; and Brad Silverberg, a founding partner and a former senior vice president and member of Microsoft’s nine-member Executive Committee.
“Through ServiceMesh, we believe the promise of enterprise-scale cloud computing is finally becoming a reality,” said Artale. “To successfully derive business value from these technologies, organizations must be able to provide flexible access to cloud environments under a unified SLA, governance and compliance framework. Further, organizations need a transparent mechanism for departmental chargebacks and usage analysis. The ServiceMesh platform is unique in its ability to deliver these capabilities and enable businesses to rapidly derive optimal benefit from a cloud deployment in a customizable yet tightly controlled environment. We see an immediate market opportunity for ServiceMesh in businesses of all sizes, including the largest enterprises and governments, because ServiceMesh is the only way to ensure that these organizations achieve significant business value from their cloud investment.”
The ServiceMesh Agility Platform helps enterprise customers unlock the business value of cloud computing, including the empowerment of business units with self-service provisioning and management of standardized and fully governed IaaS, PaaS and SaaS offerings that improve business agility and lower operating costs. The Agility Platform enables companies to compress the time-to-delivery for enterprise applications, allowing them to move fast on fleeting business opportunities, while governing and securing a company’s most sensitive applications and data across internal and external clouds, keeping the business safe.
“The investment community now recognizes that we are at the beginning of a massive and long-term transition to a cloud operating model,” said Eric Pulier, CEO of ServiceMesh. “But enterprises must be able to turn raw technology into business value. The ServiceMesh Agility Platform provides the unique missing link by bringing business IT services directly to users while at the same time keeping the environment safe and controlled.  With this round of funding, Ignition Partners has affirmed ServiceMesh as a leading player in this rapidly expanding market.”

About ServiceMesh
ServiceMesh provides the industry’s leading enterprise cloud platform that enables Global 2000 clients to compress the time-to-delivery of enterprise business applications while governing and securing those applications and data across internal and external clouds. ServiceMesh also delivers professional advisory services and market-ready solution accelerators for common cloud usage scenarios.
Enterprise customers select ServiceMesh to design and implement IT strategies that offer game changing competitive advantages through a federation of internal and external IaaS, PaaS, SaaS, and cloud service providers. Customers use the Agility Platform to automate their plan, build, share, and run lifecycle with the security, governance, transparency, identity management, and policy control required by large enterprises. Some of the world’s largest and most sophisticated companies in financial services, health care, and other IT-intensive industries rely on ServiceMesh to realize quantum improvements in business agility, lower operating costs, and enable new business and economic models that support their strategic business initiatives. To learn more, visit www.servicemesh.com.

About Ignition Partners
Ignition Partners (www.ignitionpartners.com) is a premier private investment group with offices in Bellevue, Washington and Shanghai, China. Ignition Partners’ affiliated family of funds includes Ignition Ventures and Ignition Growth Capital in the U.S. and Qiming Ventures in China. The investment group’s three categories of funds – early stage venture, growth capital and China ventures – brings together an unparalleled combination of domain focus, functional expertise and global operational experience with partners from leadership positions at Microsoft, McCaw Cellular Communications, AT&T Wireless, Cisco, Starbucks and other industry leaders.

ServiceMesh Contact:
Elyce Ventura
Eastwick
408-470-4870

Ignition Partners Contact:
Heather Fitzsimmons
Mindshare PR
650-947-7400

Wednesday, October 26, 2011

What are Enterprises Really Doing in the Cloud?


by James Staten on October 25, 2011
You know there are developers in your company using public cloud platforms but do you really know what they are doing? You suspect it’s just test and development work but are you sure? And if it is production workloads are they taking the steps necessary to protect the company? We have the answers to these questions and you may be surprised by how far they are going.
It’s tough being an infrastructure & operations professional these days. According to our ForrSight surveys for every cloud project you know about there could be 3 to 6 others you don’t know about. Business unit leaders, marketing and sales professionals and Empowered developers are leading the charge. They aren’t circumventing I&O as a sign of rebellion – they simply are trying to move quickly to drive revenue and increase productivity. While every I&O professional should be concerned about this pattern of shadow IT and its implications on the role of I&O in the future, the more immediate concern is about whether these shadow efforts are putting the company at risk.
The bottom line: Cloud use isn’t just test and development. In fact, according to our ForrSight research there’s more production use of IaaS cloud platforms than test and development and broader use is coming (see Figure 1 below). The prominent uses are for training, product demonstration and other marketing purposes. Our research also shows that test and development projects in the cloud are just as likely to go to production in the cloud as they are to come back to your data center.
So how much should you be concerned about this trend? Well first off, you can probably forget about trying to stop it. Your focus should be on determining how much risk there is in this pattern and this may take a leap of faith on your part because as of right now, your developers know more about how to use public cloud platforms than you do. This means they are more knowledgeable than you about what it takes to make them highly available and secure. This experience deficit is a much more problematic issue than anything else because when you start asking your developers what they are doing to ensure the availability of their applications on IaaS, you don’t really even know what to ask.
Sure, you can ask what they are doing to ensure availability but do you even know what the availability options are on the leading clouds and how best to leverage them? Do you know what data replication takes place by default and what options they could turn on?
At the same time, you can’t just trust the developers to care as much about data integrity, BCDR and availability as you do because, normally, they entrust this to you. So rather than engage in a frustrating back and forth that risks misunderstanding by both parties, let’s see if we can accelerate your learnings, bring these cloud efforts out of the shadows so you can learn exactly what is going on and how much you really should be worried.

Friday, October 21, 2011

Dynamic Cloud Security: Test Driving the Benefits


Cloud security represents a spectrum of capabilities that you can tailor to your needs


Many IT organizations assume that security risks increase with a shift to cloud computing. The reality, however, is not so clear-cut. In fact, many of these same organizations will be surprised to learn that adopting cloud operating models with appropriate governance and security controls can actually reduce the level of risk relative to their current IT environments. Here's why:
IT professionals frequently develop unwarranted security concerns regarding cloud computing primarily because cloud environments are dynamic and enable new levels of workload portability that are very different from what they're familiar with. In cloud environments, application workloads can be moved to totally different physical infrastructure or service providers from one deployment to the next. The underlying application data can move even more frequently, depending on the type of instance and persistent storage options you've selected.
This means your security boundaries have to be dynamic too. They have to move with the workload and the data, and self-configure themselves in new environments in a consistent and automated manner.
Taking Cloud Security for a Spin
A simple analogy can be made between securing cloud workloads and securing a car. When you park your car in your home garage, typically you just close the garage door and that's it. You assume your car is safe inside your garage along with your other belongings, so you typically don't worry about locking your car doors or taking other precautions.
However, when you park your car somewhere else, you typically lock the doors to secure it. There are several ways you can do this. The door locks could be activated by a remote, a keypad on the door, or the proximity of an RFID tag in the key fob. You may decide to upgrade your security by adding a factory alarm system, steering wheel lock, LOJACK tracking system, or other security system depending on the car's value. Finally, you can also decide where to park your car depending upon your risk tolerance. For example, you may accept your favorite restaurant's offer of valet parking in a monitored lot instead parking down a secluded street.
The point is that you can create a portable security boundary around your car that can be equal to or even more secure than your garage. Cloud security is similar in concept where portable cloud workloads offer a wide range of options to establish a very effective portable security boundary. In fact, cloud workload security has an additional important benefit over the car analogy, which is that security configurations can be completely automated and policy-driven. Using the car analogy, this means you no longer have to worry about forgetting to lock your door or arming your alarm system in the parking lot, because the car will automatically do it for you.
Under the Hood: Cloud Security Options
This new approach to securing a moving workload is a big departure for many IT groups that are used to working in more static and controlled environments (similar to the home garage). These IT groups are used to working with physical data center infrastructure, traditional firewalls, mostly static networks, and familiar resources that they own and control. The idea of moving workloads in and out of new environments they don't control is a big concern, especially knowing they've expended tremendous time and attention manually configuring their own environment.
However, today a broad range of proven technologies can deliver consistent, automated security for portable cloud workloads. They include virtual private networks, encrypted data storage, host intrusion detection systems, hypervisor-based firewalls, and federated identity management systems. These systems can complement each other to provide an end-to-end security solution that encompasses instances, data, network, and role-based access as desired.