Bluelock Blog

About Jake Robinson

October 10, 2010 by Jake Robinson
About Jake Robinson

Hi, I'm Jake Robinson+! I'm a Solutions Architect at Bluelock who specializes in virtualized infrastructure and infrastructure automation. I also assist in sales and solutions engineering. There is no greater thrill to me than writing code that saves someone hours of time. Powershell is my weapon of choice, but I can write code in a variety of languages. I'm also a VCP, a former CISSP and a VMware vExpert.

Bluelock Portfolio gives you the vCloud Forecast

January 23, 2012 by Jake Robinson
Portfolio, Bluelock's vCloud portal and decision support tool just learned a new skill: Cost Projection!

Bluelock already excels in providing predictable costs in the cloud, but what about those months you need to burst by adding additional resources to your capacity? Portfolio is now outfitted with helpful run rate calculations, allowing you to see early on what your costs will be at the end of the month.

Portfolio cost projection

By knowing your cost projection well in advance, you'll be able to dial back the resources...Read More »

VMware vCloud Powershell (Part 1: Get-vCloud)

November 4, 2010 by Jake Robinson
VMware vCloud Director (and vCloud Datacenter) is the answer to a lot of needs. It gives the VMware Administrator the ability to grant more control to different departments (or orgs), provide better insight into how orgs are using resources, and the ability to control a worldwide infrastructure from a central management system.
There are, of course, caveats. vCloud Director, like Lab Manager, tends to get a little fussy when we do things to infrastructure behind it's back. You must make sure...
Read More »

Custom Security in the Cloud

May 16, 2010 by Jake Robinson
In my previous post, I mentioned some challenges made by Dan Lohrmann, CTO for the State of Michigan. Mr Lohrmann had some great insight into the challenges within within the Cloud Computing Security domain. Let's talk about 3 specific challenges:

Who owns the end to end security?
Who owns the responsibility in the event of a breach?
Who owns the logs?

Now, before I answer these, we need to look at how the answers between cloud computing providers will vary. Let's take a look at what I refer to as...
Read More »

Security: The Thunder in the Cloud

March 23, 2010 by Jake Robinson

Every Information security buff knows the
Triad of Information Security:

  • Confidentiality: No unauthorized users can access our data.
  • Integrity: No unauthorized users can modify our data.
  • Availability: My data is there when I need it.

Security in Cloud Computing should be no different. 

I recently read an article by Michigan's CTO, Dan Lohrmann with some great questions around Cloud Computing Security. 

Some of Mr. Lohrmann's challenges were:
  • Who owns the end to end security?
  • Who owns the...
Read More »