Cloud Computing has my attention in a big way. As an IT Consultant and a Small Business Owner, I can see the potential that Cloud Computing has to offer. There are many cloud providers out there. More providers are entering the market every day. I chose to create accounts with three of the most well known cloud providers: Amazon Web Services, VMware vCloud Air, and Microsoft Azure.
What does a Professional Consultant do in their downtime? The good ones Read and Study! In addition to watching technical videos on CBT Nuggets and reading technical books on Safari Books Online, I have a stack of Business Books that I’m slowly working through. You can find my current reading list in the links below.
I love working in my lab. It’s a place where I can experiment with complete freedom. In this weeks post I present the case for IT Professionals to set up and use a home lab environment.
I launched my first instance on Amazon Web Services last night. It is a t2.micro instance running Red Hat Enterprise Linux 6.6. It’s a small server with 1 CPU and 1 GB of RAM. I’m on the free tier which allows me to run small instances for a certain number of hours per month. It’s perfect for the learning experience that I’m after.
When I sign into the AWS Management Console I feel like I have an entire Datacenter at my fingertips. There is no need to invest in a million dollar facility filled with equipment and a full time staff to support it. With cloud computing you pay for just what you need. The cloud service provider takes care of the rest.
You can start small with just a single instance on the free tier like I’m doing. As your needs grow you can quickly access additional resources in order to scale up. The possibilities are endless.
I look forward to publishing more posts on Amazon Web Services in the future. For now, my journey has just begun.
Bret Miller – Owner and Principal Consultant, LMR Computer Services Inc
Privacy and Security are important topics for anyone who uses technology. In this weeks post I will describe a technique that is used by Proxy Servers to intercept encrypted traffic.