$723.9m sounds like a lot
But in reality will disappear quickly if they happen to spin up DynamoDB for a few weeks usage.
201 publicly visible posts • joined 9 Jun 2008
I thought exactly the same - most times orgs just plough on regardless and hope for the best. Just goes to show though that requirements analysis is a dying art form and the cause of most public sector project failures (in my experience). Quite often the mass tangle of stakeholders don't really know what they want and end up chasing a shiny dream that just doesn't materialise, conflating functional and non-functional requirements and looking for a CV booster before they move on.
The fact that it seems to be small businesses bearing the brunt of this makes it even harder to accept because they are the sort of organisations who can ill afford to have a day of downtime, let alone three weeks. Rackspace has been dropping in quality like a stone for years and their indifferent response to this problem makes me want them to finally disappear into a big black hole and never surface again.
You can't take analysts opinions as gospel, those that do should be beaten. I love a bit of public cloud as much as the next man, but it has to be appropriate in the use case and be fully thought through. Talk of K8S in the article also reminds me of that XKCD strip about the use of buzz words. Just because you say it doesn't make it the silver bullet.
Finally, as for VMware not innovating as much once Broadcom take them over. Don't make me laugh, they haven't innovated in years. Like Apple, they just keep rehashing existing features and claiming "further and faster" every time.
I've seen both monolithic contracts and also the "tower" model, either way, you're never going to get the result you want. The best part of tower arrangements is that the tower owners refuse to speak to each other and/or drag their heels because it might mean them losing money further down the line. Self preservation is the most basic instinct of all.
Based on other anecdotal evidence I've seen, MU will be strong armed into going onto OCI whether they really want to or not. Oracle are offering very "competitive" pricing to move stuff into their bit barns, past history would suggest you will be gouged in year 4 at renewal time.
All in all, make sure you know OCI if you're bidding for this.
There's not now and there will never be a perfect solution to this, we live in an imperfect world. Where there is networking, storage, compute and a whole gamut of plumbing from different vendors making it all work, something will break at some stage.
That being said, I remember the last fairly major Azure AD meltdown and it turned out that the bulk of requests went to a Texas DC which fell over. Since then, Microsoft claim to have improved this but remember that underneath the hood, AAD is nothing more than a custom build of ADAM. It's not the same as "conventional" AD and so the usual rules don't apply.
Some people prefer on prem, and that's fine. Some people prefer cloud, that's fine. Pick the appropriate tool for the job, don't just follow dogma.
I consider myself a big cynic of Apple, especially their "magical and revolutionary" schtick, but the main reason I moved to iPhone from Android is what is spelled out in this article - a clear lifespan for a device and regular OS updates. None of this garbage where a carrier has to certify it first and then add their own crapware.
I know we have Android One etc and Nokia kept up to date quite well, but it was still patchy in terms of device support in at timely manner.
Well while world leaders continue to over react to a virus that statistically has minimal risk to the man (or woman, or gender fluid) in the street, this is bound to happen. Reverse the lockdown, manage at risk groups (mainly care home residents) and get rid of those virtue signaling, placebo based "face coverings".
I've not much time for Bezos but even less for politicians trying to make headlines. For starters, if S3 buckets are the attack vector then firewalls have sod all to do with it, S3 buckets are internet facing by design. Secondly, the instructions are clear on good practice - private by default (which new ones are now anyway) and don't embed secret keys in human readable code.
The other aspect to this story is that from what I can gather, it was an inside job anyway. So regardless of whose computer it was, if you have the keys to the kingdom, you can do what you like.