Monthly Archives: March 2017

ASC 606 Promises Audit Fee Changes, Disclosure Complexities

websitelogo ASC 606 Promises Audit Fee Changes, Disclosure Complexities

Posted by Kelly Scott, Software Industry Marketing Lead

Upcoming changes to ASC 606 could have an impact on audit fees moving forward. At least that’s what about half the attendees at a recent webinar think.

In Part 2 of our 4-Part series around Revenue Recognition and preparing for ASC 606, we heard from Prasadh Cadambi, Partner at KPMG and someone that has been living and breathing ASC 606 for over eight years. Cadambi spent two years with the Financial Accounting Standards Board, FASB, specializing on Revenue recognition which led to his experience with ASC 606.

Companies in all industries are going to face changes from the transition in revenue and expense accounting, Cadambi noted. The standard requires businesses to capitalize commission costs of the expected contract. The change to the revenue and expense accounting will have an immediate PnL benefit because of the capitalizing of sales commission.

A polling question around audit fee increases due to the adoption of ASC 606 stirred up some conversation. Not only did we find that about half of the attendees see some impact to the audit fees but what was even more interesting was the discussion around disclosures. ASC 606 has very incremental disclosure requirements, one around the backlog disclosure requirement and the amount of interaction your auditor has on the requirement. As an auditor, you must sign off on the backlog numbers on a quarterly basis as well as the numbers on the contracts. With the complicated specifications around contract terms in ASC 606, there needs to be thought around the terms and transaction prices. Auditors must be involved on the future roll out of how the revenue will be recognized.

Cadambi’s advice on ASC 606 and back office systems? “If you have too many systems, it will be problematic.” Have revenue recognition as part of your ERP system.

The webinar also provided insights into:

  • Impact on private companies considering an IPO within 12 to 24 months.
  • Areas that require the most judgement and interpretation.
  • Audit fee impact on companies adopting the new revenue recognition standard.
  • Impact on financials, resources, processes and internal controls of adopting companies.
  • New audit procedures and testing.
  • What technology can help mitigate the overall impact of adoption.

To get a greater understanding of ASC 606’s impacts from an auditor’s perspective, watch the recording.

Join us for Part 3 of our Revenue Recognition series with Kash Rangan, Managing Partner Merrill Lynch for Wall Street’s view of the impact on ASC 606.

Posted on Fri, March 31, 2017
by NetSuite filed under

Let’s block ads! (Why?)

The NetSuite Blog

Why Some Azure VM Sizes are Unavailable When Resizing in the Portal

Let’s block ads! (Why?)

Blog – SQL Chick

Dynamics 365 enables Casino Hosts to “up the ante” with Tribal Platforms™ Player 365

Casino Hosts have a responsibility to develop working relationships with their players.  Both to identify players who would benefit from a Host’s service in addition to assisting an upset guest and working to resolve the issue.  All of these require effective communication to be successful.

Another way to look at this issue is imagine that you move to a new town or city.  You don’t know many people and need to start building a local network of relationships.  You are introduced to new faces and

Dice small 300x196 Dynamics 365 enables Casino Hosts to “up the ante” with Tribal Platforms™ Player 365

must find commonalities to get to know them.  This effectively describes a Host, except they have to do this with literally hundreds of new people.

Learning about a person is simple:  ask questions and remember responses.  Share stories, discuss common interests and listening to learn allows the Host to build a relationship that can benefit everyone.  The key is to capture what the Host learns to create a starting point for the next client encounter.

Legendary Hosts are those that are able to remember little details from past conversations and bring those details up in future conversations. They remember a birthday, spouse’s names, a special event, or their favorite hobby.  The Tribal Platforms™ Player 365  solution can be a tool to store these personal details to help Hosts who don’t have a photographic memory.

Bryan blog march pic 1 300x189 Dynamics 365 enables Casino Hosts to “up the ante” with Tribal Platforms™ Player 365

Tribal Platforms™ Player 365 is a mobile-enabled solution based on the Microsoft Dynamics 365 platform that Hosts can use to capture all patron encounter details.  Hosts can easily look up players that are “on the gaming floor” at the moment and locate the player in real time.   Once the Host has a discussion with the guest, Hosts can quickly make notes of the discussion on their mobile device using the Player 365 – Touch Player feature and save the note to the patron record.  Additionally, the Host can see the LAST Player Touch date and schedule the “Next Player Touch” date to create a follow up reminder.

Bryan blog march pic 2 1 300x133 Dynamics 365 enables Casino Hosts to “up the ante” with Tribal Platforms™ Player 365

Organizations that use the Tribal Platforms Player 365 solution are providing an important tool for Hosts to use as the centerpiece of player communication.  Providing tools like this for your Hosts can make everyone a Legendary Host.

By Bryan Schmidt, Arctic IT Business Applications Consulting Manager,  [email protected].

Let’s block ads! (Why?)

CRM Software Blog | Dynamics 365

Tank Versus Tractor Brawn

 Tank Versus Tractor Brawn

Bragging rights go to the civilian.

“Who wins in a tug of war? tank or tractor?”
Image courtesy of http://imgur.com/gallery/VlrSAJb.

Storage Considerations for Dynamics 365 Attachments

Attachments in Dynamics 365 generally consist of important Microsoft Office documents, image files, PDF files and other crucial files for your organization. What you may not know is that you can save money and reduce your Dynamics 365 data usage by storing your attachments outside of CRM. This post will let you know how to do just that and teach you how to change the size limit for any attachments you intend to store inside of CRM.

image thumb Storage Considerations for Dynamics 365 Attachments

An often overlooked feature of CRM is the ability to alter the file size limit for attachments. To do this navigate to System Settings and click on the Email tab. Here you will find a section called ‘Set file size limit for attachments’ in which you can set the maximum file size for attachments in kilobytes. The default size limit for attachments is 5120kB/5MB but can be increased to 32768Kb/32MB for older versions of CRM and 131072Kb/128MB for newer versions of CRM. This is great for any business that regularly deals with large attachments and needs to ensure that they can be stored in CRM.

Attachments are stored inside the CRM database and any extra storage is priced at a premium rate of $ 9.99 USD per GB while SharePoint is much cheaper at around $ 0.20 USD for every extra GB of storage. It is therefore important to consider moving your attachments from the CRM database into a document management and storage system such as SharePoint to save money. A good way to do this is by using the Attachment Extractor for Microsoft Dynamics 365 by mscrm-addons. This tool allows you to quickly extract your attachments to SharePoint and makes great use of the native Dynamics 365 SharePoint integration so you can easily attach and surface SharePoint documents from within CRM.

By following these tips your organization won’t have to pay escalating costs for additional data storage in order to continue making changes to CRM. Don’t forget that you can check how much space your CRM organization is using under the ‘Resources in Use’ section of the administration area. Monitoring this section is a great way to prevent your cloud storage limit from maxing out, so you can continue to make changes to CRM without issues.

Let’s block ads! (Why?)

Magnetism Solutions Dynamics CRM Blog

(via https://www.youtube.com/watch?v=HSMFXWeSXEo)

PLEASE NOTE: this blog’s focus has changed. As of 9/1/2013, my posts will be zeroing in on the FUTURE OF PRIVACY and the role of ‘BIG DATA’ as well as on the latest developments in HUMAN-MACHINE relationships. Previously, this blog provided insights on…

Let’s block ads! (Why?)

Privacy, Big Data, Human Futures by Gerd Leonhard

12 Ways to Boost Your Website’s Lead Generation Performance

12 Ways to Boost Your Website’s Lead Generation Performance 351x200 12 Ways to Boost Your Website’s Lead Generation Performance

This is lead gen 101. But while I was looking for live examples of this to show you (check out the one at the close of this post), it stunned me how many marketers and companies are not employing this tactic.

As always, the bad news here is how much business is being lost. The good news is it’s an easy fix: Get some gate-worthy content together ASAP, and add those lead gen boxes.

On the other hand, don’t go too crazy with gating your content.

Sometimes you’ll get more leads if you don’t require people to fill out a form. Your content (particularly your high-value content) may get more shares if you skip the lead gen form and let the content be accessed freely.

In fact, there’s evidence that not gating content sometimes creates more leads, or higher quality leads. But you have to do it just right. Balance is the key.

4. Make sure your tracking works.

“What gets measured, improves.” If you haven’t yet set up tracking on your website, the time is now. You need to know which pages are generating the most leads, and which pages aren’t performing well enough.

If you’ve got a nice CRM system set up already, great. But even a free Google Analytics account has a good basic tracking feature. Just set up a “goal” for each lead generation page you’ve got. Within a week, you’ll be amazed with the information. If you weren’t doing any tracking before, finding out your results is kind of like turning on the lights in a dark room.

Take note: This will show you which of your marketing efforts are working best. That alone can be extremely helpful. Once you’ve got the information on what’s actually driving your leads, do more of that … and consider backing off from the marketing efforts that aren’t actually working.

5. Archive your webinars for play on demand.

Webinars are a great way to generate leads. Every time you do another one, you get the contact information of hundreds (maybe even thousands) of people.

That’s a good start, but don’t stop there. Post your webinars on your website, too. Gate them … or consider not gating a few of the ones that are more introductory.

This will give your visitors a couple of webinars they can view without having to fill out a form (thus getting those webinars far more views than they’d otherwise get), but it still saves you some content to use for lead generation.

It’s a nice combo – you get great content to share with visitors, but you also get to do some lead generation. And you’ve got a way to balance the cost of all those webinars you’re doing.

Want to see an example of this in action? We have a whole page of webinars on demand.

6. Maximize “forward to a friend.”

Referral marketing, aka word of mouth marketing, is one of the most effective marketing strategies ever. It works because when a real person recommends your company to another person, that recommendation carries with it more trust than your marketing ever will. (Sorry…)

You can use this for lead generation, too. For instance, at the close of a blog post, instead of offering a content upgrade or a gated white paper, what if you showed a simple form with a call to action that says something like this:

“We hope you found this article helpful. If you know someone who needs this information, please send it to them via the form below.”

Often these are used for “Send to a friend” shares, where someone forwards an article to a colleague via email. Interestingly enough, that’s the most common way for executives to share content. And all that sharing, inevitably, can lead to … well, more leads.

You may want to run a couple of tests to see which copy gets the most referrals. It’s absolutely worth a try. This is an excellent sleeper tactic that can drive quite a bit of leads when it works.

7. Demonstrate how you’ve helped people.

Got a testimonials page on your site? If you don’t, you should. It might not result in leads directly from that page (unless you put a lead gen form on that page), but demonstrating how happy your past customers are is a great way to give your website visitors confidence. That confidence can translate into leads.

Testimonials aren’t the only way to show how you’ve helped your customers. Case studies are excellent, too. These “customer stories” don’t have to be much longer than a page or two. But that brevity packs a punch – case studies are one of the most effective content marketing formats.

Let’s block ads! (Why?)

Act-On Blog

Become An Insight-Driven Enterprise With Predictive Finance Analytics

In today’s climate, it’s necessary for both small businesses and large global enterprises to have comprehensive cybersecurity plans. In this blog, I’d like to discuss how vulnerable small businesses can be to modern cyber threats, and share how global enterprises  are largely unprepared for the EU General Data Protection Regulation (only 14 months away).

A 2017 small-business cybersecurity story

I was sure that it was a “bum dial” when the name “Simon R” appeared on my phone close to midnight last Monday. Simon’s son plays football on the same team as my son but, although we share a Whatsapp group, he’d never actually called me before so I was sure it was a mistake. Unfortunately, it wasn’t!

“Hi, sorry it’s so late. I’m just not sure whether you can help me, but I didn’t know who else to call and I’m not sure what to do. My company has been hacked!”

Before this call, we had previously chatted at football matches a few times, and we had been to some of the same parties, but almost all of our shallow knowledge of each other came virtually, through social media. So with that limited information (and a fair amount of misunderstanding), Simon identified me as an appropriate person to contact for advice on his cyber breach.

When a small company gets hit with an encrypting ransomware attack

image002 2 300x235 Become An Insight Driven Enterprise With Predictive Finance AnalyticsIt wasn’t good news. His company was the victim of an encrypting ransomware attack. The three machines in his office had had all their files encrypted, and on initial investigation, all that could be found was a small text file indicating that the attackers would like to be paid through the Bitcoin Digital currency. Simon was a designer, not a computer expert, and unfortunately, he had completely underestimated how reliant his business was on the computers in his office. He had not considered a cyberattack as a significant risk at all. After all, he just used the computer for e-mails and research … right?

Unfortunately not. All his business accounts were on those computers: all his employees’ human resources information and salary detail, and all e-mails from clients (many of whom had sent ideas and designs with confidential information that he needed to work on). Gradually, he started to realize the enormity of his situation

The value—and difficulties—of backups

I explained that under no circumstances should he pay any ransom and that I would find a “real” cybersecurity expert to speak to him about the possibilities of decryption. However, I warned that decryption may not be possible, and he may need to just accept the situation and restore everything from backups. The silence at the other end of the line spoke volumes.

Computer backups had not been seen as a major priority for his company. When his backup tapes were full, someone was required to walk all the way across the office to agree to the “overwrite” prompt on the screen. Nobody had ever really been given responsibility for this task, and soon it simply stopped being done. The most recently available backup was 11 months old!

A week later, the situation is still not resolved, but is being managed. He has now engaged a computer management firm that will, in future, provide all network and application support, manage security and backups, and provide training to his team on an ongoing basis. He has had to accept the loss of tens of thousands of pounds and, more importantly, suffered significant reputational damage. For a small company fighting for a larger share in a busy market, Simon and his team were completely blindsided by this.

“I just don’t understand why someone would target me,” Simon said. “Surely there are more lucrative targets.”

The risks for small businesses

That, I think, is the biggest misunderstanding amongst many small business owners. The idea that someone would target them seems so unlikely that cybersecurity is a minor concern. The fact is that his company was not targeted, but simply received a mass spam phishing e-mail that someone in his office opened. That was the door opener. So he was not the victim of a targeted attack, but had simply not prepared to defend against random, hopeful, low-complexity, high-volume attacks.

According to Symantec, cyberattacks against small businesses increased from 18% in 2011 to 43% in 2015. Attackers are realizing that there is money to be made from smaller companies whose executives put little thought into their own protection. The most important things are usually the simple things—a cybersecurity policy, education of employees, and, of course, strong passwords.

image004 Become An Insight Driven Enterprise With Predictive Finance Analytics

The truth about passwords

Using the very limited information I thought I knew about Simon, I asked if I could try to guess his password. As a Facebook friend, I knew that he had just turned 52, had a wife called Sara, three young boys, and a dog called Sonic. I knew that he went on a skiing holiday once a year, had parents who lived in Spain, and that he voted differently from me in the last election. He was a fan of U.S. basketball, Spanish football, and cricket, and had a frustrating tendency to misspell the words “their” and “there.” He often played something called “Boom Beach” on his iPhone and repeatedly shared “People are Awesome” YouTube clips. As a LinkedIn contact, I knew that he grew up in Cardiff and went to University in Leeds, started his career in recruitment consulting, and for the last 12 years ran a small, 8-person design company in north London.

Within two minutes of my guessing, he admitted that I had mentioned an approximation of his, his wife’s, and his corporate domain passwords. Honestly, he’s not alone—for 20 years, security consultants have continued to highlight the importance of complex passwords, yet it still seems that this message is not getting through.

Common passwords and public information—two password don’ts

You can easily download a list of the 10,000 most common passwords from this site to try a “brute-force” attack, but you probably wouldn’t need that many. The figures are shocking:

  • 1.6% of users have a password from the top 10 passwords
  • 10% of users have a password from the top 100
  • 30% of users have a password from the top 10,000

Also, using personal, yet relatively public information is vulnerable due to social media. Almost everyone today has a Facebook page, a Twitter account, and various other forms of social media. People post their birthdays and their kids’ birthdays online. They give anyone who cares to look a glimpse at the most common dates and people in their lives – not a terrible thing, but it should make you wary of using that same information to safeguard vital systems and data.

This experience was a painful learning experience for Simon— the realization that even the smallest companies must consider cybersecurity as a major business risk. How could he have missed something so big?

“I’m so embarrassed,” he said. “I’m sure that if I ran a much bigger company, this would have been a much higher priority for me.”

I didn’t say anything because unfortunately, I think that he’s completely wrong. Even large companies don’t prioritize cybersecurity correctly. Right now, we have the perfect example of how cybersecurity continues to be underappreciated by the majority of global companies.

The underprepared global company and the EU General Data Protection Regulation

image001 300x236 Become An Insight Driven Enterprise With Predictive Finance AnalyticsA small number of companies are rushing to prepare for the biggest overhaul of data protection regulations ever: the EU General Data Protection Regulation (GDPR). Only 14 months away, with massive fines promised and huge hurdles to overcome. Yet although a few companies are desperately seeking answers, figures suggest that the majority of companies are still totally unaware of what it entails or its myriad implications.

Perhaps some companies still persist with the myth that this is an IT issue and not a C-suite problem. A recent global survey by Dell makes worrying reading and to conclude, I’d just like to point out some of the findings.

  • More than 60% of respondents say they are aware something is going on with GDPR, but they know little or nothing about it.
  • Only 4% of respondents outside of Europe said they are very knowledgeable about the details of GDPR, while just 6% of those in Europe said they are very familiar with the requirements.
  • Fewer than 1 in 3 companies feel they are prepared for GDPR today.
  • Nearly 70% of respondents say their organization is definitely not or don’t know if their organization is prepared for GDPR today, and only 3% of these have a plan for readiness.
  • Less than half of respondents say they feel confident they’ll be ready when GDPR kicks off in 2018, while only 9% expect to be fully prepared in time.

This article, GRC Tuesdays:Cybersecurity In 2017—Don’t Be Afraid, Be Aware!, originally appeared on the SAP BusinessObjects Analytics blog and has been republished with permission.

Follow SAP Finance online: @SAPFinance (Twitter)  | LinkedIn | FacebookYouTube

Comments

Let’s block ads! (Why?)

Digitalist Magazine

Deploying IaaS VM Guest Clusters in Microsoft Azure

Authors: Rob Hindman and Subhasish Bhattacharya, Program Manager, Windows Server

In this blog I am going to discuss deployment considerations and scenarios for IaaS VM Guest Clusters in Microsoft Azure.

IaaS VM Guest Clustering in Microsoft Azure

GuestClustering 500x245 Deploying IaaS VM Guest Clusters in Microsoft Azure

A guest cluster in Microsoft Azure is a Failover Cluster comprised of IaaS VMs. This allows hosted VM workloads to failover across the guest cluster. This provides a higher availability SLA for your applications than a single Azure VM can provide. It is especially usefully in scenarios where your VM hosting a critical application needs to be patched or requires configuration changes.

Learn more about the advantages of Guest Clustering in this video:

Supported workloads for Guest Clusters on Azure

The following Guest Cluster configurations are supported by Microsoft:

  • SQL Server AlwaysOn Availability Groups (no shared storage needed)
  • Storage Spaces Direct(S2D) for shared storage for SQL Server FCI
  • S2D for shared storage for RDS User Profile Disk
  • S2D for shared storage for Scale-out File Server (SoFS)
  • S2D for shared storage for File Server (Information Worker)
  • File Server using Storage Replica
  • Generic Application and Services on Guest Clusters

SQL Server Failover Cluster Instance (FCI) on Azure

A sizable SQL Server FCI install base today is on expensive SAN storage on-premises. In the future, we see this install base taking the following paths:

  1. Conversion to virtual deployments leveraging SQL Azure (PaaS): Not all on-premises SQL FCI deployments are a good fit for migration to SQL Azure.
  2. Conversion to virtual deployments leveraging Guest Clustering of Azure IaaS VMs and low cost software defined storage  technologies such as Storage Replica (SR) and Storage Spaces Direct(S2D): This is the focus of this blog.
  3. Maintaining a physical deployment on-premises while leveraging low cost SDS technologies such as SR and S2D
  4. Preserving the current deployment on-premises

SQLServerFCI 500x288 Deploying IaaS VM Guest Clusters in Microsoft Azure

Deployment guidance for the second path can be found here

Creating a Guest Cluster using Azure Templates:

Azure templates decrease the complexity and speed of your deployment to production. In addition it provides a repeatable mechanism to replicate your production deployments.

It is easy to create a Guest Cluster in Azure using these “1-click” templates! Learn more in the following video:

The following are recommended templates to use for your IaaS VM guest cluster deployments to Azure.

  1. Deploying Scale out File Server (SoFS)  on Storage Spaces Direct

    Find template here

    a 500x121 Deploying IaaS VM Guest Clusters in Microsoft Azure

  2. Deploying SoFS on Storage Spaces Direct (with Managed Disk)

    Find template here

    b 500x290 Deploying IaaS VM Guest Clusters in Microsoft Azure

  3. Deploying SQL Server FCI on Storage Spaces Direct

    Find template here

    c 500x188 Deploying IaaS VM Guest Clusters in Microsoft Azure

  4. Deploying SQL Server AG on Storage Spaces Direct

    Find template here

    Template2 500x164 Deploying IaaS VM Guest Clusters in Microsoft Azure

  5. Deploying a Storage Spaces Direct Cluster-Cluster replication with Storage Replica and Managed Disks

    Find template here

    Template3a 396x350 Deploying IaaS VM Guest Clusters in Microsoft AzureTemplate3 500x306 Deploying IaaS VM Guest Clusters in Microsoft Azure

  6. Deploying Server-Server replication with Storage Replica and Managed Disks

Find template here

Template4 500x316 Deploying IaaS VM Guest Clusters in Microsoft AzureTemplate4a Deploying IaaS VM Guest Clusters in Microsoft Azure

Deployment Considerations:

Cluster Witness:

It is recommended to use a Cloud Witness for Azure Guest Clusters.

CloudWitness 383x350 Deploying IaaS VM Guest Clusters in Microsoft Azure

Cluster Authentication:

There are three options for Cluster Authentication for your guest cluster:

  1. Traditional Domain Controller

    This is the default and predominant cluster authentication model where one or two (for higher availability) IaaS VM Domain Controllers are deployed.

DomainJoined Deploying IaaS VM Guest Clusters in Microsoft Azure

Azure template to create a new Azure VM with a new AD Forest can be found here

DJ3 500x157 Deploying IaaS VM Guest Clusters in Microsoft Azure

Azure template to create a new AD Domain with 2 Domain Controllers can be found here

DJ2 500x105 Deploying IaaS VM Guest Clusters in Microsoft Azure

2. Workgroup Cluster

A workgroup cluster reduces the cost of the deployment due to no DC VMs required. It reduces dependencies on Active Directory helping deployment complexity. It is an ideal fit for small deployments and test environments. Learn more here.

Workgroup 500x304 Deploying IaaS VM Guest Clusters in Microsoft Azure

3. Using Azure Active Directory

Azure Active Directory provides a multi-tenant cloud based directory and identity management service which can be leveraged for cluster authentication. Learn more here

AAD 500x222 Deploying IaaS VM Guest Clusters in Microsoft Azure

Cluster Storage:

There are three predominant options for cluster storage in Microsoft Azure:

  1. Storage Spaces Direct

    S2D 500x181 Deploying IaaS VM Guest Clusters in Microsoft Azure

    Creates virtual shared storage across Azure IaaS VMs. Learn more here

  2. Application Replication

    AppRep Deploying IaaS VM Guest Clusters in Microsoft Azure

Replicates data in application layer across Azure IaaS VMs. A typical scenario is seen with SQL Server 2012 (or higher) Availability Groups (AG).

3. Volume Replication

Replicates data at volume layer across Azure IaaS VMs. This is application agnostic and works with any solution. In Windows Server 2016 volume replication is provided in-box with Storage Replica. 3rd party solutions for volume replication includes SIOS Datakeeper.

Cluster Networking:

The recommended approach to configure the IP address for the VCO (for instance for the SQL Server FCI) is through an Azure load balancer. The load balancer holds the IP address, on 1 cluster node at a time. The below video walks through the configuration of the VCO through a load balancer.

Storage Space Direct Requirements in Azure:

  • Number of IaaS VMs: A minimum of 2
  • Data Disks attached to VMs:
    • A minimum of 4 data disks required per cluster i.e. 2 data disks per VM
    • Data disks must be Premium Azure Storage
    • Minimum size of data disk 128GB
  • VM Size: The following are the guidelines for minimum VM deployment sizes.
    • Small: DS2_V2
    • Medium: DS5_V2
    • Large: GS5
    • It is recommended to run the DskSpd utility to evaluate the IOPS provided for a VM deployment size. This will help in planning an appropriate deployment for your production environment. The following video outlines how to run the DskSpd tool for this evaluation.

Using Storage Replica for a File Server

The following are the workload characteristics for which Storage Replica is a better fit than Storage Spaces Direct for your guest cluster.

  • Large number of small random reads and writes
  • Lot of meta-data operations
  • Information Worker features that don’t work with Cluster Shared Volumes.

SRComp 500x322 Deploying IaaS VM Guest Clusters in Microsoft Azure

UDP using File Share (SoFS) Guest Cluster

Remote Desktop Services (RDS) requires a domain-joined file server for user profile disks (UPDs). This can be facilitated by deploying a SoFS on a domain-joined IaaS VM guest cluster in Azure. Learn about UPDs and Remote Desktop Services here

Let’s block ads! (Why?)

Clustering and High-Availability

Sometimes Less Really is More

rsz bigstock less is more minimal simplicit 109514375 Sometimes Less Really is More

When you hear the term “less is more”, what comes to mind? Some people use that term when they refer to simplifying their lifestyle, some use it as a philosophy to describe their approach to cooking, and to others it can a reference to how they spend their leisure time.

In  the software world, the term “less is more”  doesn’t seem to be widely observed. Software continues to get more powerful, but more complex, over time. In many cases, this is a good thing, because the nature of the problems we deal with are also getting more complex all the time.

However, sometime you don’t need or want all of that complexity from Day 1. It is often the case that you grow into more sophisticated capabilities and functionality over time. Giving someone more capability than they initially need can result in higher initial up front software costs and slower ramp up time.

In the world of API initiatives and digital transformation, success is not always a given. A lot of API programs don’t succeed initially and may require some tweaking and experimenting to find the right combination of capabilities and business models to be successful. If this sounds like you, then you may want to consider using an API Management product designed and priced for more limited initial capabilities, but which allows you to scale up cost effectively as your API program gets traction and grows.

TIBCO has a product designed to do just that. It’s called Mashery Professional and has almost all of the same features as a standard Mashery SaaS subscription, but at a very affordable price point. The exciting new offering was announced this past week at TIBCO NOW Singapore. This is a good product for companies that have any of the following needs:

  • Their API program is modest in scope and API call volumes are not expected to exceed about 10-20 million calls/mo.
  • They are still experimenting with their API program and are not yet willing to make an investment in a full scale production environment
  • Their plans call for a phased ramp up over time on scaling up their API program

A lot of vendors offer these kind of entry level products, but many of them are dead ends, in the sense that either there is no way to affordably add capacity to scale up your initial configuration, or limited or incompatible migration paths that you can grow into. With Mashery Professional, you can add as much additional call capacity as you want and move into a full Mashery subscription at any time you want, with a seamless migration.

So, if digital transformation is moving up your priority list, but you’re not willing to go all in at this point, you should consider Mashery professional as an affordable way to get started. If you’d like to try it out for free, go to www.mashery.com.

Let’s block ads! (Why?)

The TIBCO Blog