Category Archives: Technology

Expect Open Source Security to Become a Major Focus in 2017

Expect Open Source Security to Become a Major Focus in 2017

Open Source Security

There is no doubt about it: We are living in the middle of the Digital Age.

But we didn’t get here alone. Thousands of people from all over the world have come together to develop programs, apps and software to get us where we are now. In order to maintain the level of technology that we have become accustomed to, we need the help of coders and programmers from all over to help solve problems and make changes.

When the coding community is invited to manipulate the source code of a program, it is known as open source. But what does open source really mean for your software — and your security?

Open Source vs. Closed Source

Open Source Security

(Infographic Source: Kinvey)

Behind each program you are running, there is a set of codes that allow your computers, cellphones or tablets to read. For large companies, this code is heavily protected. When a company does not allow customers or users to manipulate the code of the program, this is known as closed source.

A company may choose to keep their code secret in an effort to protect their ideas or property. They may fear a competitor stealing their code to make a similar program, or they may not want to lose control of how the program or app runs. But in keeping the code a secret, customers and users are unable to understand how it works or make changes for themselves.

On the other hand, an open source code is available for users, coders and programmers to manipulate as they see fit. For example, Vid.ly is an open source video platform and an excellent example of the benefits one offers. Another popular example is GitHub, an open source community where developers and coding fanatics can follow or create projects.

Using an open source code rather than a closed source code gives users the opportunity to solve problems for themselves or recruit coders to make necessary changes for them. Open source code also gives users the opportunity to see and understand how the program works.

But open source codes can also bring up questions of security.

Why Is Open Source Security Important?

When code is open source, anyone can make changes or view the code. There are not restrictions on who can access that information, make adjustments or pull details.

Unfortunately, this means that hackers also have access to open source codes. Does this mean that open source is less safe than closed source? Not necessarily.

Having a source code open to the public means that many individuals can look for potential areas where hackers may attack. When multiple professionals can make changes when they are needed, codes are updated more frequently. Users can also browse through the code to determine its safety and security, something they are unable to do with closed code.

As we move into 2017, open source codes are only going to become more popular. This also means that security for open source codes will continue to grow.

What Open Source Security May Look Like in 2017

While open source code is no stranger to the world of database management systems, 2017 will be the year that it truly takes off. As more companies adopt open source codes as the standard, there will also be a new focus on how to keep that code safe from hackers.

As the demand for open source code grows in 2017, so will the demand for open source security. With more companies using open source code to run their programs, it can be expected that 2017 will see an increase of attacks on open source codes. To combat this and protect users, open source security will increase as well.

With the right security measures, there’s no reason to believe that open source code is less safe than closed source. By allowing teams of coders from all over the world to find potential problems and recommend solutions, open source code may actually be safer than closed source. In 2017, we will continue to see that level of security increase as more companies focus on protecting their open source codes.

By Kayla Matthews

How Venture Capital Has Changed Online Travel Agencies and Travel-tech Start-ups

How Venture Capital Has Changed Online Travel Agencies and Travel-tech Start-ups

Venture Capital and Travel-tech Start-ups

For the last decade, investment in Online Travel Agencies and Travel-tech start-ups from Venture Capital has been on the rise. The main driving factor behind this transition towards OTA’s has been the rise of the smartphone. The computing power of smartphones has increased exponentially over the last few years, with Wired even predicting in 2015 that, by the end of this year, we could be using our smartphones as our only computer. While that still seems a way off the prediction explains the mass investment in Travel-tech start-ups, especially those who focus on a mobile platform.

Atlas Venture’s Jeff Fagnan commented that “the major driver is how easy it is, the device factor has changed travel in itself,” – noting that the ease of booking has been the central reason for the shift towards mobile devices. Consumers now have the ability to book a last minute flight, a hotel, and an Uber to and from the airport in a matter of minutes on their smartphone – a trend which is only accelerating.

Travel-tech Start-ups

Investors have rapidly moved beyond mobile digital models of traditional travel services like booking a hotel room or a flight, towards more innovative and abstract businesses and ideas. FlyteNow the private plane ride-sharing service, Fishfishme a worldwide fishing charter booking platform, and Sailogy the on-demand yacht chartering service all raised new rounds of investment at the beginning of 2014.

This onslaught of investment can also be attributed to the fact that travel is typically one of the first markets to monetize online in emerging markets. Brian O’Malley of Accel argued that the lower physical barriers in terms of established consumer base and target markets, mean that there is much more opportunity to successfully monetize traffic.

The market today for Travel-tech start-up investment is not as pretty a picture as it was 2 years previous. However, total worldwide travel start-up investment in Q3 2016 has been estimated by venture capital research firm CB Insights, to reach $3 billion – a significant drop from the record breaking $4.5 billion raised in funding in 2015. However, it has to be noted that these figures do exclude Uber, who have now raised $15 billion in equity and debt, following an injection of cash from Saudi Arabia’s Public Investment Fund.

The drop off in funding (if you can call it that) was somewhat unexpected, but a record breaking year is rarely followed by a subsequent record breaking year.

Katherine BarrMany investors are waiting a bit longer to see more traction in companies before they invest,” said Katherine Barr, an investor and founding partner at Wildcat Venture Partners in a July 2016 interview with Skift. She postulated that many VC firms were simply adopting a “wait and see” approach in an attempt to moderate the highly optimistic company valuations of 2015.

Matt Keezer of Momentum Ventures has long been a believer in a more marked approach to VC investment, more like the investment market we have today. Although VC investment has begun to move towards Travel-tech start-ups and away from Online Travel Agencies, there is still huge potential for profit when investments are more cautiously managed. Skyscanner, has recently been valued at £1.4 billion when VC firm Scottish Equity Partners sold one third of it’s stake to a Chinese firm for £465 million – a massive return on their 2007 investment of £9 million.

Matt Keezer has helped to invest in, and grow, Flight Hub and Justfly, two hugely successful OTA’s through smart investment and a cautious approach to investment. That said he is in the minority as Travel-tech investment has begun to move over-seas in the past few years, to emerging markets in Asia and Africa.

Venture Capital Investment and the rise to prominence of the smartphone as a booking platform, pushed investment in Online Travel Agencies and Travel-tech start-ups to incredible heights in 2015. Yet, with emerging markets becoming increasingly more stable and thus lucrative, especially in terms of travel-based investment, VC investment in the US has declined and begun to move towards these emerging markets. Investment in Online Travel Agencies and Travel-tech is unlikely to hit the wild heights of 2015 in North America again, but markets in China, Singapore, Africa, and other emerging nations, is unlikely to peak anytime soon.

By Josh Hamilton

A Resilient Cloud Strategy: Standardize or Diversify?

A Resilient Cloud Strategy: Standardize or Diversify?

A Resilient Cloud Strategy

Over the past few years, I have seen IT organizations adopt cloud in very different ways. Some organizations prefer to standardize their cloud infrastructure to drive efficiencies in their data centers. As a result, they eventually reduce the number of suppliers across their entire IT value chain. Conversely, other organizations adopt a ‘best of breed’ approach and tend to put in place complex and heterogeneous IT environments that enable them to optimize their IT infrastructure for the specific applications they need to run.

For example, a large enterprise – whose CIO recently visited our executive briefing center – runs their backend ERP system in their data centers; they rely on public cloud providers primarily for a portion of their office productivity applications. They also have multiple LoB applications running in their self-managed on-premises private cloud. Additionally, they have deployed a large portion of their customer-facing billing applications in a hosted private cloud environment managed by a large system integrator. This type of mix of environments to suite different business needs is typical in the organizations I have worked with.

As organizations continue to increase their appetite for cloud services, do we expect senior IT decision makers to increase or decrease their choice of cloud providers? We asked IDC to help us understand these trends on a global scale and we sponsored a broad cloud market research study, which was completed earlier this year. The market study highlighted important findings. 

Organizations with Advanced Cloud Strategies Use Multiple Cloud Providers

Diversify, Diversify, Diversify. I know just common sense you may think … We see this principle being applied by smart investors (they diversify their investment portfolio to better manage risk across a number of possible and unpredictable market conditions.) We also see the same principle applied when selecting suppliers (for example to increase your bargaining power.) We can all think of other examples I am sure. So you may wonder, why would we expect the thinking behind the formulation of cloud strategies to be radically different?

The use of multiple cloud providers is another hallmark of mature cloud organizations. The most mature organizations expect to be able to choose from multiple cloud providers based on location, policies, and governance principles. This was one of the key findings of the IDC study.

More interestingly, as organizations get better regarding their ability to extract maximum value from their cloud environments their appetite to consume cloud services from multiple cloud providers grows. In fact, 84% of organizations with ‘optimized’ cloud strategies expect to choose from multiple cloud providers. Similarly, organizations with more mature cloud strategies are more likely to have implemented collaborative business and IT governance to define cloud management policies and SLAs. 

The Challenge

However, multicloud environments can increase complexity. The challenge many organizations face is that of being able to manage and orchestrate that diverse portfolio of cloud-based applications. And this where we can help.

Specifically, Cisco CloudCenter™ is an application-centric hybrid cloud management platform that securely provisions infrastructure resources and deploys applications to data center, private cloud, and public cloud environments.

With our Cisco CloudCenter application-centric technology, you can:

  • Model: Quickly and easily build a cloud-independent application profile that defines the deployment and management requirements of an entire application stack.
  • Deploy: Use one click to deploy the application profile and related components and data to any data center or cloud environment.
  • Manage: Apply a wide range of application lifecycle actions to set policies to enable in-place scaling, support cross-environment bursting or high availability and disaster recovery, and stop the deployment.

Cisco CloudCenter administration and governance capabilities span applications, clouds, and users. Administrators can centrally manage cloud accounts, better control costs with financial plans, and report on use. They can also manage tenants and users and provide tag-based governance and role-based access control (RBAC). If you focus on the application, you can tailor IT services to meet the unique needs of your users. With an application-centric service model – IT stays in the loop wherever workloads are deployed.

All of this helps IT organizations pursue a well-diversified and hybrid IT strategy that includes IT as a service (ITaaS), automated DevOps or continuous delivery, temporary capacity augmentation, and permanent application migration capabilities. And if you need help navigate the multicloud maze our Cisco Cloud Professional Services portfolio can provide additional guidance and reduce your risk profile.

Originally published on November 29th, 2016

By Enrico Fuiano, Senior Solutions Marketing Manager, Cisco Cloud Marketing

Autonomous Vehicles – Are European Drivers Ready To Go Driverless?

Autonomous Vehicles – Are European Drivers Ready To Go Driverless?

Driverless Autonomous Vehicles

Technology is progressing so fast that we are able to now do things that were never thought possible. We can step inside of our cars and relax while the car drives itself. These are called autonomous vehicles (AV’s), and are certainly the future.

One of the biggest tire manufacturers on the planet, Goodyear, decided they wanted to know more about this emerging industry. They decided to collaborate with the London School of Economics and Political Science (LSE) on a study. They study would find out European’s attitudes towards driverless cars via an online survey in 11 different countries and a focus group in 4 countries.

The results of the study seem to be largely mixed. One on side, respondents believed that AV’s would likely be safer and that accidents would be lowered because most are caused by human error. However, a majority of respondents said they wouldn’t be comfortable being driven around and would want to maintain some kind of control and would worry about the car malfunctioning. Overall, it seems like people can see the benefits of driverless cars, but simply don’t know enough about them or how they would work to feel totally comfortable with relinquishing all control to the AVs.

To the General Director of the Goodyear Innovation Center, Carlos Cipollitti, the results were not too surprising:

AVs are coming. Understanding how drivers experience the road today and how they feel AVs should fit in is crucial. Goodyear is exploring some of the key areas that are shaping the future of mobility. We hope that the insights generated by this research will help all relevant stakeholders to work together towards a successful introduction of AVs.

This study was a part of the ThinkGoodMobility platform that Goodyear has. This platform is looking to the future and analyzing the relationship between cars and their drivers. It also aims to look at smart and sustainable mobility. However, the existence of AV’s is more than just a new technology, as Dr. Chris Tennant of the LSE explains:

AVs are not simply another new technology. They are emerging in an intensely social space with a wide range of factors influencing the public’s levels of openness towards them.”

Driverless Autonomous Vehicles

(Infographic Source: Goodyear/Marketwired)

The 11 countries that were included in the study were: Spain, Czech Republic, Germany, Italy, Serbia, France, Poland, Belgium, the Netherlands, Sweden and the UK. Of these countries, those from the Netherlands and Italy seemed the least concerned about the possible drawbacks of AVs, while those from the Czech Republic were the most concerns. Nations such as Poland and France were on the fence as they showed some belief in the technology, but also some concern as well.

By Kale Havervold

STC Group Is Leading A Biometric Authentication Revolution

STC Group Is Leading A Biometric Authentication Revolution

Biometric Authentication

The explosion of online services that involve personal data, classified information, and the free flow of wealth around the globe has brought with it the need for innovative top-notch security systems. Sophisticated online fraudsters with access to massive resources are able to collect passwords and data, which enable them to cause massive disruptions to the way we do business today. Biometric data is increasingly viewed as the most secure method of protecting data and ensuring that the people who we are interacting with online are actually who they say they are.

Market Growth

There is no doubt that the market for speech recognition software is growing rapidly. The sector is projected to be worth just under US$10 billion by 2022, with a compound annual growth rate of 15.87%, according to market research firm, Markets and Markets. The firm cites many factors as being behind the growth, including “the growing instances of fraud in several end-user industry segments such as enterprise, healthcare, and so on and the adoption of mobile banking by several national and international banks and e-commerce retailers.

social-data

While the primary market focus at the moment is on security applications of the technology, there is a widespread expectation that speech and voice recognition software will be seamlessly integrated into the emerging Internet of Things, to facilitate interactions with appliances such as refrigerators, thermostats and vehicles.

Major companies such as Google, Apple, and Microsoft are leveraging their large customer base and neural networks to process, understand, and take decisive actions based on real-time voice inputs from the user...”

Speech recognition’s share of the market is increasing due to growing popularity of using on voice recognition instead of a text-based interface. One of the largest drivers of growth, according to the research, is the fact that mobile devices are becoming increasingly powerful and manufacturers are actively integrating speech and voice recognition technologies into them.

Fraud

One of the most intractable problems facing the industries in which the data safety comes as a top priority is the issue of fraud. Banking industry is a prime example of one. For instance, when a bank receives thousands of voice calls every day, it becomes a prime target for global fraudsters to try and access someone else’s account via the telephone. The standard security processes include asking for full Name, ID number, date of birth etc. However, that type of data can easily be hacked, stolen and used. In much the same way, the answering of secret questions is a widespread securitization method, but that too can be discovered and exploited by sophisticated algorithms.

Biometric data on the other hand is almost fool-proof. From fingerprints to eye scan to the growing field of voice recognition, biometrics are the next wave of security.

Biometric Authentication

A biometric system implemented in a bank speeds up verification process, thereby improving the quality of interaction with clients and provides world-class security in a seamless fashion. During any conversation, whether incoming or outgoing, the system starts the user check in the background as the call begins, and collects a sample of the voice data. Then it matches that data against a reference sample which it has in a database. This whole process takes only a few seconds before the results appear on the operator’s monitor, giving them the all clear to carry on with the process, or raising a red flag, which requires further investigation.

It is important to note that biometric systems mainly do not rely on language in any way, so it is still reliable if a client speaks from any device and in any language.

Ultimately, there is a very strong case for biometric software to replace the use of passwords and more traditional security methods. As the number of cases of malware or Trojans use increases, victims are targeted in ways that improve conversion rates to monetize corrupted accounts. Biometrics, and in particular voice and speech recognition, are far more secure than traditional passwords can ever be and they provide easier and simpler access for most users who struggle to remember multiple passwords over time.

The Banking Environment

Belorussian branch of Austrian group Raiffeisen represents one of the largest commercial banks in Belorussia and is one of the leading local financial institutions in terms of efficiency and profitability. Data analysis revealed that the number of voice calls the bank was receiving that required active identification was increasing every year. They took the decision to implement voice identification software that would dramatically cut the time needed to perform identification, provide excellent reliability and accuracy, and take place in the background so that clients were not even aware that they were being verified unless there was a problem.

money-big-data

Raiffeissen turned to the technology company STC to develop the software.

The CEO of the STC Group, Dmitry Dyrmovsky, explains: “A multimodal biometric authentication platform can be easily used for providing safe and secure user authentication, and at the same time decreasing the cost of remote services.”

STC’s platform called VoiceKey is at the heart of several solutions offered by the company. One of its key features is the ‘’liveness detection” technology, which makes it impossible to use photos or recordings to fake authentication. STC has also developed a programming interface for user application so that it can be integrated into various software applications for use in banking, hospitals, call centers as well as mobile applications. Anywhere that identification is key to an online process, VoiceKey can be adapted and integrated seamlessly.

One of the latest innovations developed by STC is OnePass – a multimodal biometric authentication solution based on both face and voice identification. As the service is cloud-based, it can easily be integrated into any mobile application, web service or corporate information system. High level of security, reliability and simplicity of verification process can help attract new customers, decrease the demand for offline customer services (therefore, costs), increase customer loyalty and satisfaction.

Company

STC Group is a global provider of innovative systems in high-quality recording, audio and video processing and analysis, speech synthesis and recognition and real-time, high-accuracy voice and facial biometrics solutions.

STC Group is extremely well positioned to ride this next wave of security technology, with a global footprint and solid experience that will see them at the forefront of biometrics, in both security and the internet of things, in the foreseeable future.

By Jeremy Daniel

IIA Report Infographic: Mobile Shopping Statistics

IIA Report Infographic: Mobile Shopping Statistics

Mobile Shopping Statistics

The internet has been blowing up in recent years and offering people things they never thought possible. Not only that, but a new report from the Internet Innovation Alliance says mobile shopping can save you a ton of money too.

In fact, the report has indicated that the average American family can save more than $11,000 a year on household spending thanks to the internet. This is due to the fact that there are many significant opportunities to save money on the internet, especially around the holidays. Certified financial planner Nicholas Delgado says “Getting caught up in the holiday spirit doesn’t mean you have to overspend on Thanksgiving, Christmas and New Year’s Eve, to name a few,” said Delgado. “Thankfully, broadband delivers a significant return on investment with valuable opportunities for deal comparison, group-buying, and online-only discounts that make it easier to stick to a budget…

Since 2010, the IIA has recorded savings that are internet-enabled in a number of different categories. Their data comes from the annual Consumer Expenditure Survey from the Bureau of Labor and Statistics. The possible savings have skyrocketed from around $7000 in 2010, to well over $11,000 this year. You can find big savings on anything from clothing, to apparel, to health insurance and more.

The biggest savings are in the areas of entertainment, housing and automotive. The report found that you can save upwards of $3,000 in each of these categories.  (Included is an infographic by the IIA providing a further breakdown)

Mobile Shopping Statistics

Compared to IIA’s financial analysis last year, the greatest increases in savings opportunities emerged in Housing (23.50% in 2015, compared to 16.53% in 2014) and News (54.05% in 2015, compared to 39.29% in 2014). However, the percentage of savings on food (12.65% in 2015, compared to 25.68% in 2014), apparel (44.84% in 2015, compared to 62.55% in 2014) and gasoline (2.05% in 2015, compared to 12.28% in 2014) dipped. Of note, in 2015 spending on gasoline decreased by 15.32%, down from $2,468.00 the year prior.

Holiday season is spending season — from buying presents to traveling for vacations and family visits,” commented IIA Co-Chairman Jamal Simmons. “Luckily, savvy use of broadband tools can help families get more for their money.” Of the 180 million U.S. adults expecting to shop Black Friday week through Cyber Monday this year, 114 million plan to shop online and 70 percent will use mobile devices, according to a new Consumer Technology Association (CTA) survey.

Simmons added, “Encouraging investment in 5G technology that will extend broadband to all Americans, from urban centers to rural areas, should be a top priority for policymakers...”

These are impressive numbers and are surely to only keep rising in the coming years as more people flock to using the internet to save money.

Kale Havervold

Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker (CASB)

Cloud is the new address for businesses nowadays. The number of applications, hosted on the cloud, is rapidly increasing and that contributes in the streamlining of various business operations. Accounting applications, PBX, ERP, and CRM, etc. are some of the business applications that bring in more convenience and efficiency with the touch of the Cloud.

Cloud hosted applications can modernize the way businesses connect –be it employee connectivity or customer retention strategies. With the ability of cross-integrating different applications, cloud provides a more able and productive platform to deliver enhanced business solutions. On the other side, this ability arrives with some valuable business data, concerning to customers, employees, and several other parties. So, any lack of security on these nodes can make way for some dreadful consequences.

Cloud Access Security Broker

Businesses are willing to move to the cloud to enjoy smoother operations, but that should not come at the cost of security vulnerabilities. This need of security leads to the rise in demand for Cloud Access Security Broker (CASB) products.

CASB – Definition & Basic Importance

In simpler interpretation, CASB can be defined as dedicated security points deployed between cloud server and the user device. They together enable a highly secure and protected line of access for exchange of information for cloud applications by enforcing better authorization, encryption, loss-protection, vulnerability-detection, etc. CASB introduces innovative access, control, and monitoring solution for the enterprises to meet the rising business necessities, such as – BYOD, real-time collaboration, permission-restricted user access, etc.

Think of it as a third-party security broker hired to safeguard the application data during the transmission from premise to the cloud. Businesses strive to maintain data security at the user-end while cloud providers are burning candles at all ends to mitigate the security flaws. The gap between them remains susceptible. Implementing CASB will secure the gap between them and eventually, the overall cloud system will become secured.

The importance of CASB can be judged with the prediction of Gartner that states close to 85% of the large enterprises will have CASB product in action, by 2020. Currently, less than 5% of enterprises have these services in action. So, the coming years are all set to see a tremendous rise in the number of CASB implementation. This improved level of security will also allow the developers to deliver more productive applications on the cloud.

What CASB Can Do For Business Applications

Cloud security has grown by leaps and jumps in the recent years. But it may still have certain weaknesses and anyone with the proper knowledge and malicious intent can hack their way into the system and wreak havoc. A cloud-based business service, such as – Hosted PBX, can carry crucial details of your business like call logs, client contact details, call recording, etc. Such information cannot be compromised upon by the business. So, there is demand for more reliable security measure – CASB. CASB ceases the flaws that exist between the local device and the cloud server. Mitigating those errors, cloud can be even more reliable solutions for business, as well as the end-user.

Here is what CASB has to offer:

1. Application Governance

Applications governance refers to understanding and the controlling of permissions associated with the Cloud hosted applications. To help this cause, CASB enforces an enhanced credential mapping, encryption, device profiling, and policy classification. These actions help better application detailing and boosting the security points accordingly. It is very much like a personalized security setup for the application. Regardless if its a soft-phone, tax software, or any other Cloud hosted application, CASB will offer special security governance as per the need of application.

2. Access Monitoring

security watch

Better access monitoring ensures that every attempt made to access the application is detected and duly logged. By defining the access permissions on the basis of recent and usual log in activities of the users in an intense manner for different users (support agent, customer, manager, etc.), they are restricted to access only the permitted data and hence, shielding the key data from the different users. CASB utilizes various methods, such as- single sign-on, authentication, authorization, logging, etc. to monitor the accessed application.

3. Controlled Safekeeping

Different CASB products have various boosted security measures that help them detect and prevent any malware intrusions. To keep such attempts at bay, they are even able to offer them non-sensitive (worthless) data to steal away using the ‘tokenization technique’. So, attempts for the data intrusion can be mitigated without much damage.

Wrapping It Up

Cloud computing is considered one of the finest examples of technical advancements as it offers on-the-go solutions without any restrictions of the device platforms. Cloud dependent services, such as – application hosting, VoIP, etc. have eased the data control element for businesses and enhanced the productivity measures. The technology has advanced to offer high-on-quality and low-on-expense solutions. However, the challenges associated with data security has often restricted the Cloud from being a supremely accepted option for businesses. Implementation of CASB products promises a near-perfect security for the cloud setup. But the fingers are kept crossed for now as the service is yet to face the real usage testing.

By Kirti Khanna

CloudTweaks Comics
Cloud Computing and Finland Green Technology

Cloud Computing and Finland Green Technology

Green Technology Finland Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there is little doubt that…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…