Key Points:
- While this is the 13th version of the report, it is the first with the
Flexera
name, as cloud optimization and management vendor?Snow Software, which Flexera acquired on Feb. 15, conducted the previous versions.
- Public cloud adoption continues to accelerate, with 29% of all respondents spending more than $12 million annually on public cloud services - a significant increase from the previous year. Additionally, nearly a quarter of respondents are spending the same amount on software-as-a-service (SaaS) solutions, highlighting the growing importance of cloud-based software in modern organizations.
- Cloud computing has become very complex, which impacts cloud cost management, according to
Brian Adler
, senior director of cloud market strategy at Flexera, told ITPro Today. He noted that across the cloud providers, there are thousands of infrastructure-as-a-service (IaaS) options and many different PaaS offerings and multiple ways to pay for them.
- "Governance helps keep cloud resource owners on track and limit over-provisioning, while multicloud optimization processes and tools help keep costs under control," Adler said.
You already know that every day at ITPro Today is about helping IT Pros learn about, assess, and manage the acquisition of next-gen technology that drives business innovation.
That means original reporting from our team of journalists and unique commentary you won’t see anywhere else! But in case you missed them, here are some of our other must-read favorites from this week:
Coding Creates Opportunity in Cybersecurity
Key Points:
- On balance, it's worth noting that some niches within cybersecurity don't benefit much from coding. If you focus on physical security, for example, programming skills are not very important because code doesn't play much of a role in physical security risks. Likewise, teams focused on cybersecurity incident response may not need to know much about coding.
- But most other types of cybersecurity risks do center around code. Specifically, they involve either application code (where bugs can lead to security vulnerabilities like code injection and buffer overflow risks) or configuration code (which may contain oversights that expose resources to problems like unauthorized access).
- Along similar lines, most cybersecurity analysts will benefit by learning how to write the code that IT engineers rely on to provision resources via the process known as infrastructure-as-code, or IaC.
- Having a basic understanding of fundamental aspects of programming — such as how to write application code, how to manage code through CI/CD pipelines, and how to develop basic scripts — can do much to help cybersecurity professionals up their game.
New NAS Appliances? Read This First
Key Points:
- The first best practice I’d like to share is to proactively refresh your storage before it becomes an urgent need. Obviously, you don’t want to wait until you run out of storage space before you install additional capacity, but there is a little more to this best practice than meets the eye.
- Given the hardware shortages, it’s important to confirm that you have received your order and that none of the items are missing or incorrect. The last thing you want is to encounter issues mid-installation, only to realize your vendor didn’t send the correct items or that a crucial component is missing.
- Depending on the NAS hardware you’re installing, you may need to install some extra hardware into the appliances. I’m not talking about the hard drives. Oftentimes, you may need to install PCIe cards, memory, or even additional fan modules.
- This article will focus on best practices for preparing to install a new network-attached storage (NAS) appliance.
Getting to Know JavaScript
Key Points:
- Combine these advantages with the fact that JavaScript has been the go-to solution for building dynamic and interactive web pages for decades, and it's easy to see why JavaScript code runs virtually everywhere today.
- To help aspiring JavaScript coders get started with this flexible and dynamic language, we've developed a reference guide that covers the fundamentals of JavaScript programming.
- In the story above, you'll find simple examples of how to perform core tasks using JavaScript — such as working with strings and variables, doing math, managing arrays, and creating functions.
- There's certainly much more to JavaScript than what you'll find here, but this sample code will help get you started in learning this ubiquitous programming language.
A Path Toward Secure and Measurable Software
Key Points:
- The ONCD has released a new report arguing that technology companies should adopt memory-safe programming languages as a way to prevent major cybersecurity vulnerabilities.
- The report, titled "Back to the Building Blocks: A Path Toward Secure and Measurable Software," makes the case that memory safety issues have been the root cause of some of the worst cyber-attacks over the past 35 years.
- Memory safety is a programming language feature that prevents certain types of bugs related to the use and management of memory, which can lead to security vulnerabilities and program instability. A memory-safe programming language integrates features to ensure that a program cannot access memory it has not been allocated or has already freed.
- While the report primarily focuses on programming languages as a primary building block, it also explores memory-safe hardware architecture and formal methods as complementary approaches to achieve similar outcomes.?
REGISTER NOW!
"Strategies for Maximizing IT Automation"
On Thursday – March 28, beginning at 11am ET – tune into?our free virtual event! Our featured keynote speakers are
Eve Logunova-Parker
- CEO & Founder at
Evenness
, and
Barak Turovsky
- VP of AI at
思科
. This live broadcast by will be moderated by?our colleague Dana Gardner - President & Principal Analyst at Interarbor Solutions. REGISTER?now at the link above!
"Strategies for Maximizing IT Automation"
Although IT automation is quickly becoming more commonplace, IT leaders are still struggling with the best strategy for implementing at scale, as well as wrestling with how new technology trends like generative AI are transforming the automation landscape.
In this event we’ll explore the options available to IT leaders to better understand not only ways to automate, but also how to intelligently plan the strategy to take advantage of new features while avoiding costly overruns and complexities in implementation.
IT automation is a broad, all-encompassing effort that involves networking, security, operations, business processes, cloud computing, software development, and so much more, so sifting through all the details and crafting a strategy that’s right for your business involves understanding all the parts and including the right stakeholders.
Before embarking on your own IT automation effort, join us and our expert speakers to learn about the latest tools, best practices, and pitfalls to avoid.
These seismic shifts in cybersecurity will shape the face of zero-day attacks, ransomware, and supply chain compromises, leaving security teams wondering if their existing defenses can hold up against a new wave of threats powered by AI and new cloud-borne and cloud-targeted attacks.
In this event we’ll discuss:
- Automation as an essential survival skill
- The risks and rewards of using Generative AI to accelerate IT Automation Adoption
- Strategies for successfully automating ITSM
This is just a taste of what’s going on. If you want the whole scoop, then register for one of our email newsletters,?but only if you’re going to read it.?We want to improve the sustainability of editorial operations, so we don’t want to send you newsletters that are just going to sit there unopened. If you're a subscriber already, please make sure Mimecast and other inbox bouncers know that we’re cool and they should let us through.
Our bi-weekly LinkedIn newsletters arrive on Saturdays, so keep your eyes peeled for the top stories you may have missed between now and then.