Category Archives: Security

Does Google Chrome Reflect Broader Browser Issue?

Does Google Chrome Reflect Broader Browser Issue?

Does Google Chrome reflect broader browser issue?

Last week, software developer, Elliott Kember, blogged that clicking on Chrome’s settings would return browser passwords in plain text if a thief briefly gained access to an unattended computer. Several publications reported on this apparent “security flaw” in the Google Chrome

Kember complained that, while the Chrome password store is designed to make it easier for consumers to use multiple passwords for different web applications, it is inherently insecure to have these saved in plain text within the browser.

Google has responded that giving anyone else access to your computer operating system renders it insecure and providing a master password would simply give consumers a false sense of security and encourage risky behavior.

Another expert warned that storing passwords in plain text also renders them vulnerable to malware designed to harvest passwords saved within browsers, so a data thief wouldn’t need to physically access the machine.

Writing in Wired, former Black Hat, Kevin Poulsen, agreed with Google that using a master password will not prevent a determined hacker. However, he suggests that Google could include a barrier to slow down unskilled opportunists from accessing the password store.

What Kember has failed to mention is that the storage of browser passwords is not restricted to Google Chrome, most browsers offer the ability to store passwords. If Firefox users don’t set a master password, then all log in details can be accessed easily, in plain text, with just a few lines of code.

The issue that this story really highlights is the use of IT features within the corporate world that were originally designed to provide convenience and ease of use to consumers. Security is often inconvenient and slows you down. This is why organisations have seen an increase in shadow IT, because consumers want to enjoy the same rapid access to applications and information, without being interrupted by security controls. There is an expectation among employees that they should be able to search, download and begin using an application within minutes on a mobile device, or browse the web, sign up with a company credit card and start consuming a SaaS-based service almost as quickly.

Before they make the move to cloud-based services, businesses must re-educate employees on how to safely use common browser features. IT managers cannot rely on employees to consider the risks associated with storing passwords in clear text within the browser. They must explain the potential consequences and put additional controls in place.

Chrome includes a setting to “Offer to save passwords I enter on the web”, as well as the option to synchronize stored passwords to a Google Account, so that they are available on other devices. Employees need to be made aware of these settings and IT staff may wish to remove them, using existing Chrome policies. Alternatively, businesses can implement an enterprise-grade Single Sign-On solution so that employees (or hackers) cannot access their passwords.

Enterprises that are moving to the cloud should also consider employing server-side authentication to web applications, to protect passwords from being compromised. Server-side authentication prevents web login credentials from being stored on devices. Users do not know their login details, so they cannot write them down, share them, or have them stolen via malware on the device.

By Richard Walters

Richard Walters is CTO of SaaSID, a vendor of web application control and auditing software that enables businesses to govern web applications with on premise equivalent authentication, application control and auditing.

Recognizing Your Current ERP Software’s Inadequacies

Recognizing Your Current ERP Software Inadequacies

There comes a time when your Enterprise Resource Planning (ERP) software may struggle to keep up with your business’s growing needs and/or changes. Developers are constantly improving functionality and integrating changes based on a user’s requirements.

When facing the fact that your business has outgrown your current accounting and ERP software, you may think that an entire new package is the only answer. Chances are that a simple package upgrade or enhancement is sufficient.

If you are not sure whether your business has outgrown your current accounting and ERP software, refer to the following signs:

1. Slow Performance

It is common for slower software function to occur when the amount of data stored becomes larger. This can become a serious issue and decrease productivity. It is often difficult to find a more powerful solution to this problem.

2. Dependence on External Applications

If you find that there is a need to manually create Excel reports due to your current accounting software being incapable of providing the reports you need, an upgrade that includes the features you need is in order. An efficient accounting and ERP software program should be capable of providing push-button reports.

3. Manual Data Entry

An upgrade is definitely in order if you are manually completing tasks that should be handled by software. Tasks such as manual entry of orders is inefficient and could be avoided with the right software. If you have to implement several methods of keeping your accounting records in order, it is time for an upgrade. This is not uncommon as businesses grow and change over time, and ‘make do’ methods are implemented.

4. Timely Access Inefficiencies

Without real-time access to vital data your business is suffering. When you need to wait until the end of the day, or worse still, month-end to have access to the data you require for efficient running of your business, your current software is seriously lacking and may be impacting your bottom line.

Up to date information and data is crucial to the decision-making process of any business. Any system that is slow, requires excessive manual input relies on additional applications to provide the reports needed, is clearly not addressing your current business needs. Fortunately, you do not have to continue in this manner. Check into the latest available software and see what it will take to get your business back to an efficient, productive and capable business that addresses yours and your customers needs.

By Tom Johnson

Tom Johnson is a former sales manager who moonlights as a Tech columnist. He is currently retired in Jacksonville, Florida. 

What The Egg McMuffin Teaches Us About Enterprise Cloud Computing

What The Egg McMuffin Teaches Us About Enterprise Cloud Computing

Enterprise adoption of cloud computing is at an interesting juncture.


On one hand, cloud computing has unleashed a new degree of innovation, enabling line-of-business users to become incredibly nimble. Gartner last year famously predicted that CMOs would spend more on IT than CIOs within the next five years. We see that happening already in organizations such as Vail Resorts, where the CIO and CMO are collaborating to make consumer-facing apps that drive their business forward.

On the other hand, central IT departments face growing pressures to manage costs, security, and other aspects of governance that are critical to the overall success of their organizations. Robert Grazioli, CIO of SAP Cloud, recently wrote a great primer on tackling cloud fears.

This tension between a central organization that manages risk and line-of-business groups who are compelled to innovate isn’t new. We saw it in the ’90s with the advent of client/server software. And, as I learned on a recent trip to a Santa Barbara McDonald’s with my young son, it was present in the food industry in the early 1970s.

In the late 1960s, a McDonald’s franchise owner in Santa Barbara, Herb Peterson, created what became a locally popular breakfast dish – the Egg McMuffin. The problem was that he broke all of the corporate franchise rules when he started selling this sandwich. When McDonald’s corporate executives discovered Peterson’s unauthorized breakfast offerings, they threatened him with a number of penalties for breaking the franchise agreement.

Luckily, McDonald’s CEO Ray Kroc saw the potential for a new revenue stream in Peterson’s creation. McDonald’s had never served breakfast before. On the back of the Egg McMuffin, McDonald’s rolled out breakfast as a major new revenue generator the following year.

This tension between managing risk and driving innovation will always be a part of corporate America. With cloud computing, for instance, enterprise teams need governance solutions to control costs and compliance, yet need the freedom to give individuals tools to unleash the creativity that can help their business innovate and grow.

Here are three ways you can balance innovation and control using cloud computing:

  • Enable line-of-business innovation: The cloud provides organizations with fast, inexpensive access to powerful computing resources.  One effective approach we see is when companies create an “IT vending machine,” where developers and anyone else who need IT resources can get self-service access to the cloud resources they need, constrained by any necessary governance the organization designs in. Leveraging this approach, a company can successfully provide developers and end users with standard configurations that they can launch without having to create a ticket or make a request for service or a phone call. Provisioning a new server can take 15 minutes or less, and no one in IT has to take time to make it happen.
  • Enable governance and security: As a number of industry thought leaders said earlier this year in this video, security and governance are completely manageable in the cloud, and using them to an organization’s advantage is a matter of focus and experience. You don’t have to lose IT agility when you use cloud securely and govern your cloud usage appropriately. As the 2013 RightScale State of the Cloud report detailed, the more you use computing in the cloud, the better you get at things like security.
  • Accurately forecast cloud costs: Trying to forecast cloud costs is complicated and sticker shock can slow down enterprise cloud usage and innovation. Forecasting costs accurately using a spreadsheet is nearly impossible. Use websites such as that make forecasting easy and accurate with more than 12,000 cloud data points across major cloud providers and servers, storage, databases, data transfer costs, etc.

From a cloud computing perspective, enterprises are at a point where they can have it all. They can enable solutions that help line-of-businesses users move quickly and innovate, and at same time help central IT groups with governance, security, and cost control.Cloud usage in the enterprise is growing rapidly and improving the ways smart companies work, grow and innovate. Ray Kroc would approve.

By Bret Clement,

Bret Clement manages global communications at RightScale. With RightScale Cloud Management, IT organizations can deliver instant access to a portfolio of private, public, and hybrid cloud services across business units and development teams while maintaining enterprise control.

(Image Source: Wikipedia)

Cloud Infographic: Is Your Data Secure?

Cloud Infographic: Is Your Data Secure?

Cloud Infographic: Is Your Data Secure?

When choosing a cloud-computing provider, the data center is one of the most important factors when making a decision. The data center in the place where your information will be stored, and the point from which it will be accessed in the future. It is imperative to research the data center used by your service provider.


Is the data center close to your service provider? Are they able to freely access the building if a problem were to arise? Data centers need to be staffed at all times in order for constant monitoring and maintenance. Does the location of the site pose risks? Can it still function in extreme weather conditions such as snow and rain?


As well as a data center being constantly manned, it is also essential to know the level of security in place. What security does the physical perimeter have (gates, CCTV, locks, scanners)? You also need to be aware of in-house security, what level of security clearances do they have for staff?

Continue Reading Article… 

Attached is an excellent infographic found over at the hostwinds blog which takes a closer look inside top data center security.


Infographic Source: hostwinds

Cloud Startup:

Cloud Startup:

Cloud Startup: Has the Infrastructure for Mobile Application Creators Inching towards Backend Break

Because Application Programming Interface (API) is not enough for the more enthusiastic of application developers, especially in the mobile realm, a cloud startup has a solution. is an innovative server-end company behind whose success is a team consisting of veterans in Information Technology with experience, according to their website, spanning half-a-decade in famous companies. Their rollercoaster of services are all in the cloud and particularly the backend: they provide the infrastructure or offer server space to creators of cellular apps, thus giving the latter the ability to concentrate only on the development aspect.

For a young company which has made it to GigaOm’s Structure Europe final list for 2013, the multiple services it has to offer to users are quite a milestone. Some of these include API-syncing and calling across cellular platforms, multi-platform Push Notification capabilities and open source interaction between diverse apps.

API Synchronization

In order for a client to access the exceptional end-user cloud of, the former must make his or her application compatible with that of the source. This implies authenticating and, thereafter keying in data, using a password, to penetrate the server and initialize an API call via The latter’s REST APIs requires encoding information, common to that of similar service providers. This includes the application’s unique code, as well as, the app’s password for encryption purposes. Other information includes the type of data the client is keying into the REST API of the service provider.

Multi-Functional Pushing Interface

More often than not, subscribers around the world have, without doubt, ever dealt with Push Notifications. These are similar to text messages that their service providers generate automatically and send them their way. Indeed, while this may be annoying in certain occasions and sometimes helpful to the end-user, the fact remains that it costs the generator nothing other than the marketing aspect. This is because the server sends the Push Notification even before the client has time to ask for it or in most cases, when there has been a subscription that requires such messages. This describes the backend assistance of to the full, with the exception that it goes an extra mile by making this push technology intelligent.

Instead of selecting a single channel to pass the messages through, the creator of the app has a chance to decide on a number of channels that most suit the premise. Of course the downside is that here the client has to decide or even use algorithms to determine which customer specifically should go to either channel. All in all, it is an objective means of reducing the folly of classifying all consumers who use one’s cloud service or application as suited to one channel.

Interaction across the Platforms

Devices are many and each superior in its own way, and in recognition of this fact, assists its backend users with a chance to use their apps across all mobile devices. The startup has now ‘helper classes’ for users of diverse devices itching to use the service. Some of the mentions include Windows Phone 8, Android and iOs. The initialization stage includes that of downloading the code that is conformant with the application or particular device before importing the entire library that has one’s files for the application.

The startup comes from the often overlooked British Indian Ocean Territory.

A Note on Pricing

The pricing criterion of is similar to that of others but for one instance. Though the three basic pricing offers of Free, Basic and Professional one will find anywhere in the cloud are available, there is also an Enterprise edition that serves businesses in the pricing sheet of this startup. The only detraction is that at, $119.99 a month, the Enterprise account is more than double that of the Professional at $47.99. Still, the Enterprise steals the show by offering 20 gigabytes worth of data transfers each month, with limitless storage, countless device inclusion, advanced analytics, and includes week-long assistance on call. The Free version offers 150 megabyte data transfer, limitless server space for storage, and thirty devices to include.

Recap in Brief

In short, is an application launcher that enables creators to have backend assistance on demand. Indeed, the developers of the startup claim that it is possible to launch an application with all its features in a platform in a few minutes. This is despite the fact that there will be no necessity of committing oneself to the cloud side: server appropriation will be in the hands of this startup. The company may serve as a great leap for developers of mobile apps, always combing cyberspace for exceptional backend help. This is why it deserves a slot in the top European startups for this year.

By John Omwamba

Wake Up! The Speed Of Business Is In Milliseconds!

Wake Up! The Speed Of Business Is In Milliseconds!

Wake up! The Speed of Business is in Milliseconds!

Back in the mid 1980’s a ground-breaking television series called Max Headroom heralded the high-speed, media-saturated age in which we now live. In addition to the acerbic title character, the show’s protagonists were journalists, working for a television network whose commercials, called “blipverts,” were merely seconds long. The executives who ran the network sat perpetually around a boardroom table, watching real-time graphics of audience viewership-by-the-second, and they fine-tuned the intensity and volume of the commercials immediately in response to those numbers.Maxheadroom

As business moves toward a full or partial embrace of the cloud, the Max Headroom “blipvert analytics factor” is becoming a reality, and one of the people who knows this best is Rob Malnati, VP of Marketing Cedexis.

His company is a specialist in performance measurement on the cloud, and it exists in part because the cloud continues to grow on a daily basis, but also because the cloud isn’t one cloud at all, but is an interconnected series of cloud providers, each with different standards, protocols and subscribers. As companies seek to serve their global or regional marketplaces, they may not realize that there’s more than just one cloud up there – there’s actually an entire weather system.

Malnati points out that for an end user, whether a client company, or an individual looking to buy a spoon collection on Amazon, the websites and supporting channels that assist in the transaction can run into trouble in a number of ways. These challenges include different browsers and operating systems, different software versions, different devices and different connection types. When it comes to satisfying people, time is truly the enemy.

Publicly available reports (available on the Cedexis website) demonstrate some fascinating facts about time and patience online. For example:

  • 81% of Internet users will abandon a page if the video fails to load immediately

  • 4.9% of sales on Yahoo can be attributed to a 400ms delay in page load time

  • Amazon can experience a 1% drop in sales when a 100 ms slowdown occurs

Bottom line, things move fast and people expect it to stay that way.

In the age old tradition of building a better mousetrap, Malnati and his team at Cedexis created Cedexis Radar to help alleviate lost opportunity from these micro-downtimes by measuring cloud performance worldwide, and helping organizations bounce between clouds in a way that best serves their traffic demands. They provide a sophisticated approach to connecting to new resources on demand. As Malnati states, “organizations have always been focused on redundancy, superfast servers, and high-speed dedicated resources. But this is going away as people migrate toward cloud, where things are much more out of control. Audiences are becoming more demanding, more global.”

The Cedexis Radar community collects performance data from all over the world – one billion measurements per day from over 34,000 network systems, actually. Malnati points out that some of the fastest growing business markets, such as Brazil, China and Indonesia do not or cannot always provide best-in-class networks. For example, trying to reach someone on a WiFi 3G connection in a developing economy can cost significantly.

Cedexis Radar tries to help orchestrate and simplify the use of new cloud-based tools by providing a single global platform for measuring performance and automating the use of them.

He says the number one issue is the need for more visibility in performance. Companies need to know if – or how well – they are delivering to their end customer. They need to understand who is else serving their customers well and who isn`t. They also need to compare objective data to assess the performance potential between Cloud A and Cloud B. Once this data is compiled, Cedexis Radar finds ways to create optimized content delivery strategies and then measure their effectiveness.

The Cedexis Radar community, now in its fourth year of operation, constantly tests platforms and systems to observe their performance, and it provides much of its computing intelligence in the form of free collaboration between the “amazons” of the world.

One technique, for example, is its Radar Tag – a line of code embedded on a web page, which assesses how the page was served. Once the page is downloaded, Cedexis can pull data from existing cloud vendors in terms of how they could have maximized their services through more access.

This means that not only does the Cedexis Radar system assess what has happened, it looks at what could have happened, through what-if simulations, to ensure that in the future its clients will be able to proactively route data through the global cloud structure, based on a wealth of both existing and theory-driven scenarios.

All this intelligence isn’t presented only on a large scale formalized platform; it is available in very simple, straightforward interface, even as as an app for Windows 8, and is very hands-on, for example, a user can drag a line across a territory map, and observe immediately where service is good and where it deteriorates. “The Cedexis Radar app is a great example of how Windows 8 puts business intelligence at the fingertips of business professionals, and adds value to the data through compelling interactivity and visualization,” said John Richards, senior director of Windows App Marketing for Microsoft Corp.

Of course Cedexis also offers a value-added paid service called OpenMix, which takes Radar data and combines it – basically performing load balancing magic to identify best routes for traffic. Malnati adds, “this lets the customer define their own app to do things like using the Radar centre to identify the best [cloud] center, but let’s handicap any overloaded center  to avoid bursting charges.”

These types of advantages lead to reduced bounce rates – where people go to a web page and then abandon it in a couple of seconds; it also means lower latency: more people are staying on a website and for longer periods.

Business today is done by the millisecond. Malnati states that today’s CIO or CTO  should be redefining themselves as the leader of a strategy focused on end-user experience, and this can only be done through the agility drawn from real-time data. As Marty Kagan Co-Founder of Cedexis adds, “the new Windows 8 app provides IT decision makers with quicker access to the performance data of both existing and potential providers, so they can make well-informed decisions, in real time.

By Steve Prentice

Benefit Of Using Power-Aware Provisioning In Real-Time Cloud Services

Benefit of using Power-Aware Provisioning in Real-Time Cloud Services

There’s a growing trend of abbreviating anything you put on the Cloud as (Anything) as a Service or XaaS paradigm and with the increasing deployment of the Cloud based platform in the practical domains, the issues of power consumption and dynamic power allocation have begun to surface. Power aware provisioning of virtual machines for real-time services is the need of the hour and there are many schemes under active R&D with the intention to minimize the power consumption within the Cloud based environments. Power smart Clouds are not only cost effective but they also are of great utility for the enterprise level Cloud migrations where serviceability and power management is dedicated issue to address.  Cloud based Dynamic Voltage Frequency Scaling (DVFS) schemes are in practice for the smart power aware Clouds. These schemes do not only make the Cloud performance optimized in the real time environments, it also makes it much easier to handle the power complexities of the Cloud.

Cluster based request handling on the Cloud heterogeneous clusters is also a smart strategy to establish power aware environments across the Cloud platforms. Whenever there is a request to a heuristic system or Cloud node for resource, multidimensional bin packing is used to find a server to allocate the request. If the slot is available then the resource allocation takes place, otherwise a new machine is switched on along with from scratch for allocation of new resources. SLA based Cloud computing paradigms are also useful in introducing the new higher resource utilization and decreased power consumption trends in the Cloud computing. The peculiar progression in the real time Cloud based updation systems is the real task ahead. There are complex algorithms which are responsible for on the go installation and deployment of the machine resources. Whenever there is a request from the end user, the penalty function works at the back end to calculate the diminishing value of the power required to run the machine level interfaces.

In the real time power saving algorithms, the hypervisor and VM gives a broker through which the requestor of the service always interacts with Cloud. If the machine is available, the resources are located for the time which is always less than the penalty time. If the allocated timeslot is increased, the penalty time limit starts with a controlled resource allocation process in which power saving modes is switched on.  The real time resource provisioning always helps the Dynamic Power Management Techniques (DPM) to come into action and deplete the power resources allocated to the zombie devices which are not in use. The real time Cloud based power smart algorithms are being developed for increased performance and minimized latency to boost up the Cloud computing capabilities in enterprise domains.

By Salman UI Haq

US Cloud Computing Industry Might Lose Up To $35bn Over NSA Revelations

US Cloud Computing Industry Might Lose Up To $35bn Over NSA Revelations

US Cloud Computing Industry might lose up to $35bn over NSA revelations 

US tech giants fear that they can lose up to $35bn in cloud computing contracts over the next few years after the news came out that US companies share stored data with the government’s surveillance organization NSA.

After recent revelations that popped up online indicating the possible sharing of data with NSA, many companies outside the US have already showed concerns over handing out their data to US firms running the cloud computing business and the effect has already started to make an impact as some US companies claim that they have already lost millions of dollars due to this proclamation.


It is firmly believed that many of the UK and other European firms are looking for cloud computing services outside the US. British Executive Simon Wardley has already shown its disappoint over this matter in a very sarcastic way by saying, “Do I think we should be prepared to go the whole hog, ban US services and create a €100bn investment fund for small tech startups in Europe to boost the market … oh yes, without hesitation.”

A recent survey taken by the ITIF about the US companies offering cloud computing and storage systems clearly showed that businesses in the US are in very bad shape following the NSA revelations. According to the survey, US companies may lose about 20% of the cloud computing share of the overseas market to its other European rivals.

Projects such as Prism and Xkeyscore are also considered to be top assets for NSA in accessing stored data of all the big firms including Apple, Google and Microsoft. According to the sources, Prism was used by NSA to access user details of individuals that live outside the US while the Xkeyscore is believed to have access to almost every individual’s data on the internet that NSA can access any time.

According to the chairman of ANS Group of UK Scott Fletcher, people in UK are already pushing for a local UK based cloud computing service since the relationship between the two countries are not great in terms of reliability.

So far, no US government official has either denied or responded to these allegations about the cloud computing and the level to which NSA has access to people’s data that travels inside the US. It is believed that the total worth of cloud computing business in the whole world is around $207bn by the end of 2016 and more than half of it belongs to US. But with the recent allegations over NSA could really hurt these figures for the US, and they should take any precautionary measure whatsoever to save their cloud computing market from going into total chaos.

By Ben Anderson

CloudTweaks Comics
Timeline of the Massive DDoS DYN Attacks

Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…


Sponsored Partners