Announcing Legacy Application Modernization Live Workshops

It is an exciting (and stressful) time to work in IT. The IT organization is challenged to maintain the existing applications and infrastructure that power the business, and is pressured to adopt modern, cloud-based technologies to deliver scale and agility, or cut costs.

The journey to the cloud (and cloud-native technologies, like containers) is the biggest transformation in IT since virtualization—and is far greater in scope and magnitude. Migrating existing workloads to the cloud is complex and can disrupt the business if not treated carefully. This is where Apcera comes in.

Simplified Policy Maintenance via Data Tables

Apcera's platform gives you trust in your system through its pervasive policy controls. We've further enhanced policy syntax to remove repetitive policy. Instead of requiring detailed policy rules with literal values to be authored for each combination of realm, user and activity, you can now use a flexible template policy rule which references a policy variable. The policy variable is backed by a data table which defines values for realm, user, input claims and intermediate claims as a series of rows where each row captures one scenario.

Hybrid Cloud — Welcome Back, “Heterogeneous” IT

Since the dawn of the client server age we’ve been working on finding ways to treat the rack mounted server the same way we used to treat a mainframe, with some caveats; Like a mainframe we’re trying to make the server useful for more than one application, so that we’re more efficient with costs and resources. The caveat vs a mainframe is that if you were running a mainframe from Tandem, you weren’t going to be sharing applications between it and an IBM.

The Big and the Small of IoT

The world of the Internet of Things (IoT) is commonly described within a swirl of superlatives: ”billions of devices,” “brand new business models,” “the destruction of business as we know it,” and the list goes on. Such a technological revolution seems too big to be tamed. So how is a cloud platform developer to approach and assimilate such a beast?

Our customers have posed this same question to us here at Apcera. Interestingly, some of these customers already have pretty specific desires or “proof points” in mind as they approach the whole concept of purpose-built IoT.

Put That There: Workload Placement and Mobility

In 1979, Chris Schmandt and Eric Hulteen, researchers at the MIT Architecture Machine group (the predecessor to the MIT Media Laboratory), put together a demo that wows me even to this day. I learned about the demo when I worked at the Lab for a stretch in the 1990s. It was called "Put That There" and was an attempt (again, in 1979!) to demonstrate a system that could use simultaneous speech and gesture recognition to allow you to interact with objects in a natural way.

Mark Thiele States Don't Forget to Invest in Your IT

Quick! Which is cheaper? The public cloud or on-premises infrastructure?

Not so fast. Before you scoff and say “Public cloud, naturally,” you might want to hear what Mark Thiele, Apcera’s Chief Strategy Officer, recently had to say on the subject.

The Policy-Led Approach to Securing Workloads and Infrastructure

Securing and governing workloads and infrastructure have been long-standing challenges for IT organizations. With the adoption of new application environments and architectures, traditional security measures can no longer scale with the speed and complexity of your business.

Editing Policy In Real-Time

If you've talked to someone from Apcera at any point, chances are you've heard us mention "policy" at some point—perhaps repeatedly. We tend to talk a great deal about it because it provides an excellent way to frame the conversation around what is allowed to run (and by whom), what resources can it consume, where it is running and what can that thing talk to/who can talk to it.

Is Network Ingress or Egress More Important to Your Security?

If you are ever in a hotel bar with a several people who do security for a living and you have some time to kill, ask one of them whether they think ingress (incoming connections to) or egress (outgoing connections from) systems are a greater threat to security. If your spark catches the tinder just right, you may be able to start a multi-hour debate amongst all of the bar denizens.