Category Archives: Cloud Computing

The Call for Humanism in Technology

The Call for Humanism in Technology

I just got back from Gartner’s U.S. Symposium in Orlando.  It was a great week, meeting with lots of technology providers of all ages and sizes.   As always, I was impressed with the passion and creativity of many emerging providers.

The theme of this year’s conference was Digital Business, and one theme really jumped out at me—a call for humanism. As the Internet of Things continues to mature, businesses will have the opportunity to automate more and more. Read the source article at Gartner Blog Network

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management

Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater plan, there’s no denying that it aids cities, for example, in squeezing the most out of the available infrastructure.

Big Data and Public Services

New York, once a crime-ridden concrete labyrinth and inspiration for telling titles like Taxi Driver and Escape From New York, has become much safer. From 1990 to 2009, there has been a 79-percent reduction in murders, even though the social factors haven’t changed much. The Domain Awareness System, as Microsoft’s team-up with the city is called, doesn’t fall into that time frame but shows the commitment that NYC has made for safety, with an added anti-terrorism spin in the form of radiation/chemical detection in key locations of the Big Apple.

New-York-2

That being said, Big Data was already used for public safety purposes in NYC before, in the form of call record processing, allowing police to focus on areas from which more crime-related calls are made. The efficacy of this practice has been proven quite some time ago: criminologist Lawrence Sherman studied call records in Minneapolis, showing that some 3.5 percent of the addresses produced about 50 percent of the crime calls. And crime doesn’t simply move to another neighborhood.

In Rio de Janeiro, however, the use of Big Data has taken a different course. The municipality focuses on predictive analytics as well as real-time city insights that alert public services to impending trouble. The intelligent operations centre, as the 2010 joint project of the municipality and IBM is called, focuses on weather reports, public surveillance, cleaning services and transport. The effort has produced mixed results, as evidenced by the embarrassing protests, which coincided with the 2014 FIFA World Cup, calling for better public services.

One can surmise that the 560+ cameras wired to the operations centre in Rio provide a very rough approximation of the city; however, the scale of data is not really at hand here. Big Data is but a part of the effort, as it is in New York City, to make the city more safe. The centre was established after a series of lethal landslides caused by rainfall, so its main efforts lie on emergency prevention and detection.

Crimewaves still plague the city, and the protests showed that infrastructure-related problems still linger. The biggest boon is the lives saved (not necessarily improved) due to better coordination between public services.

Conclusions

These early efforts show that cities have a lot of room to tread before operations centres become completely ingrained and vital for the city’s sustenance. In New York, Big Data has become part of long-term efforts to reduce crime. In Rio, Big Data is leveraged to improve the overall coordination and squeeze more out of scarce infrastructure. There is, however, only so much you can do before the time is ripe for concrete and bulldozers.

(Image Source: Stuart Monk / Shutterstock.com)

By Lauris Veips

Dropbox Confirms Compromised Account Details But Says Its Servers Weren’t Hacked

Dropbox Confirms Compromised Account Details But Says Its Servers Weren’t Hacked

After last week’s Snapchat photo hack, it’s cloud storage provider Dropbox’s turn in the unsavory insecurity spotlight. An anonymous Pastebin user has claimed to have compromised almost seven million Dropbox account credentials (emails and passwords), posting the first 400 direct to Pastebin with a call for Bitcoin donations to leak more. Read More

Read the source article at TechCrunch

Dell Boomi Joins New Salesforce Analytics Cloud Ecosystem to Provide Enterprise-Ready Application Integration and …

Dell Boomi Joins New Salesforce Analytics Cloud Ecosystem to Provide Enterprise-Ready Application Integration and …

SAN FRANCISCO–(BUSINESS WIRE)–Dell Software today announced that Dell Boomi has joined the Salesforce Analytics Cloud ecosystem to enable customers to connect any application—whether in the cloud, on-premises, mobile or social—to provide access to the critical data they need to support their strategic business analytics initiatives. Wave, the Salesforce Analytics Cloud, is the first cloud …

Read the source article at businesswire.com

EMC Answers The Call For up-to-the Minute Cloud Infrastructure Education

EMC Answers The Call For up-to-the Minute Cloud Infrastructure Education

EMC Answers The Call For Up-To-The Minute Cloud Infrastructure Education

Building and managing cloud infrastructure is not easy. Comprising a collection of fast-changing technologies that compete with shifting policies and laws, user needs, and corporate objectives, it emc_logorequires technical knowledge paired with the skills to talk to non-technical decision-makers as well as programmers and software specialists.

The role of Cloud Architect is a new kind of career for a new age, requiring new skills to help meet the unique challenges that cloud infrastructure presents. As traditional universities and colleges struggle to keep pace, new sources of cloud skills development and certification are widely recognized as the most effective providers of this must-have education.

Chief among this new breed is the professional education arm of EMC, a global IT solutions organization with approximately 60,000 employees, that helps its clients move toward information technology as a service (ITaaS) in areas such as cloud computing. EMC Education Services, which specializes in skills development and certification targeted to IT professionals, was the first in the industry to develop a comprehensive cloud computing curriculum, launched in 2011.

starter_kit_discount_banner_3

Delivered in classroom, streaming, and flash-drive-based formats, EMC’s industry-leading cloud curriculum and certification have helped bridge the cloud skills gap, leveraging an ‘open’ approach that focuses on concepts and principles applicable to cloud environments built on multiple vendor technologies. The Cloud Architect curriculum is aligned with EMC Proven Professional, a leading certification program in the IT industry.

EMC recently announced the release of its Cloud Infrastructure and Services (CIS) v2 course, described as a cloud essentials course that focuses on concepts and principles of building and managing cloud infrastructure. The course enables IT managers to gain a full understanding of the Cloud Computing Reference Model. The model is designed to convey the basic functionality of a cloud infrastructure and enhance understanding of the fundamental principles of building it. Additionally, it facilitates efficient communication of cloud infrastructure details between stakeholders. The course aligns to EMC Proven Professional Cloud Architect Associate-level certification (EMCCIS). EMC Education Services is offering a significant discount on pre-order of the streaming version of the CIS v2 course prior to October 17, its official go-live date.

cloud_infrastructure_image

IT managers have become vital contributors in the corporate-level decision process. Today, decisions regarding security, ecommerce, operations, or marketing must include the input of IT management. Consequently, the education they invest in must prepare them for the new roles they are taking on. Without IT there is no cloud, and with no cloud there is no business.

The five-day CISv2 course covers nine modules:

  • Introductory Cloud Concepts
  • Building the Cloud Infrastructure
  • Physical Layer
  • Virtual Layer
  • Control Layer
  • Service and Orchestration Layers
  • Business Continuity
  • Security
  • Service Management

In the past few years, EMC’s industry-leading cloud courses have seen more than 28,000 course registrations and 5,500 certifications. Students come from a wide range of large and medium-sized organizations worldwide.

More information about the CIS v2 course can be found at http://education.EMC.com/CIS.

By Steve Prentice

(Sponsored By EMC Education Services)

Data Center Security Market by Vpn, Dns, Ssl, Biometrics, HDCCTV, Video Surveillance Projected to $13.77 Billion By …

Data Center Security Market by Vpn, Dns, Ssl, Biometrics, HDCCTV, Video Surveillance Projected to $13.77 Billion By …

The Data Center Security Market report majorly focuses on analysis of the key players in logical and physical security ecosystem & recent developments. The report also focuses on key issues & opportunities, global adoption trends in the market. ( http://www.marketsandmarkets.com/Market-Reports/datacenter-security-market-920.html ) (PRWeb October 12, 2014) Read the full story at http://www …

Read the source article at prweb.com

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too

With security threats to information services growing in sophistication, frequency and variety, IT professionals on all sides of the marketplace are realizing an urgent need to reinvent themselves to better anticipate the bewildering variety of attacks that they and their customers face. The problem that they are discovering, is that the systems’ maliciousness and weaknesses exist not only in the software and hardware at their fingertips, but in the minds of those that have access to it.

cyberman-hp

A good example of this can be seen in just one form of attack: SQL injection, in which destructive code finds its way into a database by way of a vulnerable opening. These vulnerable openings might be the “username” or “password” panels on a login form, or the space for a credit card number on an ecommerce form. It would never occur to the average user to insert anything other than the required information into this panel, but for the bad guys, this panel is as tempting as an open window, or a set of misplaced keys. It is the way in to an unprotected treasure.

It is the mindset that is essential here. Good guys don’t think like bad guys. Therefore, IT defense often appears to be playing a game of catch-up with opportunists who may exist anywhere on the planet, yet who can access a server with ease.

A recent Brighttalk.com webcast featuring data collected by the Ponemon Institute pointed out that U.S. companies reported an average of “$12.7 million in losses to cybercrime,” with “the most costly cybercrimes … caused by denial of services, malicious insiders, and malicious code. These threats account for more than 55 percent of all cybercrime costs.

The rise of the use of mobile technologies and BYOD serve to compound this problem, given the wide variety of apps, platforms and devices in use, but once again, it is very often the users themselves that are the chief offenders. A classic example of network vulnerability in past years was the act of leaving a password on a sticky-note under the keyboard. A modern variant of this is the free and open use of mobile technologies – part of the BYOD culture that is making its way into the workplace. Users seldom employ the vigilance required to ensure their devices are clean and impermeable as they connect to their employers’ cloud servers.

As CIO Community Manager John Dodge pointed out recently the results of a survey from Centrify Corp. reveals that “only 43% of employees using mobile devices for work are keenly aware of mobile security. That means 57% are not.” The survey points out that “on average, 45 percent of the enterprise employees surveyed have more than six third-party applications installed on their personal device” and “43 percent have accessed sensitive corporate data on their personal device while on an unsecured public network, such as the airport or a coffee shop.”

These findings point out a disturbing reality for IT security specialists: they not only have to think like bad guys, they also have to think like average, innocent good-guys, for whom password and security protocols are tedious, and in the case of younger professionals, unfettered access to Internet technologies is a given.

DDoS attacks, for example highlight how this weak link can be exploited. One documented case, an attack on a group of U.S. banks in January 2013 was carried out by waves of botnet zombies located around the world. The source of the outbreak was determined to be an innocent general-interest website based in the U.K. that had been poisoned by a web design company based in Turkey. The weak link: an administrative password on the U.K. website.

These events, just a couple of the many thousands that happen every day, reveal a requirement for security specialists to maintain a number of different mindsets – to think like a thief, certainly but to also not overlook the most obvious source of IT vulnerability: the average human being.

This post is brought to you by the Enterprise CIO Forum and HP’s Make It Matter.

By Steve Prentice

CloudTweaks Comics
Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…