Category Archives: White Papers

Cloud Whitepaper: Bring Your Own Mobile Devices To School

Cloud Whitepaper: Bring Your Own Mobile Devices To School

HP BYOD in Education Students and faculty are free to use personal mobile devices to access school resources while IT maintains control.

Who should read this paper?

School administrators, IT directors, security managers, and network managers should read this white paper to learn how HP Networking solutions simplify security and network access control to help schools make the most of bring your own device (BYOD) initiatives.

In today’s educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school’s network. This presents a unique challenge to the IT administrator. This paper discusses the challenges and solutions IT administrators are facing and how HP is addressing the security and management of the multiple devices being introduced into the wireless/wired network.

Executive summary

CloudTweaks Comic #100 - David FletcherMany higher educational institutions and K-12 schools are enticed by the idea of allowing students and faculty to use their own tablet computers, notebooks, and smartphones to access school resources. However, they are concerned about the security risks—and the impact on IT operations.

HP Education for today’s learners 

Networking is helping educational institutions realize the potential of BYOD initiatives by enabling schools to allow students and faculty to use their own mobile devices in a way that is secure and operationally efficient. HP Intelligent Management Center (IMC) provides a simple way to enforce network access control that is ideal for BYOD initiatives.

Technology is an essential element to keeping today’s students engaged. Demand for the expanded use of technology in education to raise academic achievement comes from virtually all constituents, from the federal government, to state education departments, to local school boards, teachers, parents, and students themselves. Tablets, notebooks, and other mobile devices takes learning out from computer labs and libraries and puts it directly into student’s hands. Especially for students who have grown up with Internet, gaming consoles, and texting. Digital curricula allow teachers to create new levels of interactivity that are ideal for individual and team learning, developing science and math skills, and language immersion. Mobile devices open up a universe of possibilities for science labs, distance learning, and student presentations. Teachers have new ways to assess students’ individual progress and provide additional instruction to students before they fall significantly behind. Continue Reading

Also see:  Strategy Guide: Cloud In Government and Educational Institutions

 

Free eBook: HP Converged Infrastructure For Dummies

Free eBook: HP Converged Infrastructure For Dummies

Free eBook: HP Converged Infrastructure For Dummies

Are you ready to accelerate the value of IT in your business? Would you like to simplify your data center and your IT processes so you can focus on innovating for the future rather than being mired in the past? If so, you’ve come to the right place.

Everyone in the IT arena understands that the speed and scale of business have been pushing traditional IT to the breaking point. Compounding this pressure are the new challenges CEOs are facing to meet the new wave of customer, partner, and employee expectations due to mobility, social media, and the information explosion. These constituencies are smart, savvy, and connected. They have little patience for businesses that can’t respond to their needs right now.

To compete in this instant age, organizations need an IT infrastructure that enables agile and rapid service delivery. They expect their IT organization to deliver applications and services that are fast, always available,  scalable, and interoperable while driving down costs. With all the complexity in today’s data centers, that’s a tough proposition when you consider the new wave of evolving business models and the changing workforce.  Things simply have to happen much faster.

About Infrastructure Convergence

Before you dive into the book, we want to offer a simplified definition of infrastructure convergence: Infrastructure convergence enables organizations to accelerate time to business value. This is achieved by turning today’s rigid technology silos into adaptive pools of assets that can be shared by many applications and managed as a service. The result is greater IT speed and agility, the ability to shift more resources from operations to innovation, and better alignment with the growing demands of the business.

The Era of Convergence

Leading industry analysts agree that converged technologies will deliver tremendous value and savings — in other words, they feel that the whole is better than the sum of the parts. What’s more, these analysts support the idea that mobile, cloud, and pervasive computing technologies will fundamentally shift the expectations and roles of IT in the enterprise. The role of IT will move from one of managing physical assets to that of being a broker of IT services from inside and outside to satisfy business needs.

Over the past couple of years, technology vendors have started pitching a convergence story; key analysts support the trend and businesses understand they need to embrace the concept. The cost, speed, and efficiency advantages are just all too real. But convergence means you’re being confronted with seemingly endless technology choices and confusing messages. All this makes it difficult to understand how best to get started and with which vendor — and which convergence solution is best aligned to your specific needs. This book will make it easier for you to understand convergence and the ways you can move forward with it quickly and safely.

Free Registration To Access Full eBook

 

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest.

A collaborative project by ISACA and CSA, the Cloud Market Maturity study  provides business and IT leaders with insight into the maturity of cloud computing and will help identify any changes in the market.  The report, released today, provides detailed insight on the adoption of cloud services among all levels within today’s global enterprises and businesses, including the C-suite.

The study reveals that cloud users in 50 countries were least confident about the following issues. Read Press Release

Read The Results: ISACA_CSA_2012_Cloud_Market_Maturity_Study

 

Source: ISACA

Harmonize The Best Capabilities Of Cloud And On-Premise Solutions

Harmonize The Best Capabilities Of Cloud And On-Premise Solutions

What distinguishes the most innovative, dynamic backup and recovery solutions from the rest of the pack? Is it the benefits that come with transitioning from tape to disk? Is it shorter backup windows and faster recovery times? Is it the confidence that no matter where data is stored, it is totally secure and can be recovered right when you need it?  Yes, it’s all of these.

But a more elemental, evolutionary leap is underway. It’s the cloud, connected to your organization.

While the cloud may not be the ideal foundation for every organization’s data protection needs, it undeniably offers virtually every company many clear and compelling data storage advantages. Organizations that fail to put the cloud to use for backup and recovery, in the right way at the right time, are handicapping a vital business process.

Cloud-connected storage solutions use the power of the cloud selectively, enabling you to combine cloud-based and on-premise technologies in a seamless hybrid that provides exactly the right mix of security, accessibility, affordability, and performance.

This paper explores how cloud-connected offerings are taking center stage and helping customers thrive in the evolving, exciting data protection environment.

A New Paradigm for Data Protection

It’s not an easy time to be tasked with protecting corporate information. First, your organization is probably generating enormous amounts of new data—by everything from large-scale applications and heavy volumes of emails to massive files in new media formats. At the same time, user demands and service-level expectations continue to grow. And to intensify matters, IT operating environments are becoming more complex; they commonly comprise multiple sites around the world—each running its own unique blend of hardware, applications, and databases, as well as distinct business processes.

Despite facing these challenges, many management teams are reluctant to invest in the very solutions that could better manage their environments. Alas, government and industry overseers aren’t sympathetic to this frugality; they continue to devise and enforce regulations mandating information integrity and access. And of course, data damaging disasters and outages are an ever-present threat.

For many years, companies have used magnetic tape to harbor their backed up information, but these legacy technologies simply can’t keep up. They lack compression and encryption, and they rely on laborious, manually intensive processes, making them slow and vulnerable. Disk-based solutions provide a much faster, more efficient, and more secure foundation for backup and recovery.

Disk-to-disk data protection is state of the art. When you pair on-premise disk-based technology with the powerful scalability and flexibility of the cloud, your organization can do even better.

Welcome to the Cloud: How Did We Get Here?

Sign In To Read The Full Article

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

A devoted group of researchers at North Carolina State University have painstakingly developed a novel software tool aimed at addressing performance disarrays in cloud computing systems. The tool functions to automatically classify and respond to potential network disruptions before they actually occur.

Cloud computing provides the freedom of creating numerous virtual machines provided to the end-users across a single computing platform – all that functions autonomously. Performance issues with such an approach are bound to occur. In case of a software glitch or a closely related hiccup, problems arising across a single effected virtual machine may end up bringing down the entire cloud down on its knees.

Determination of various contingencies across a system can be simplified by sensing and keeping a track of numerous machine related variables. The software does exactly that. By calculating the current network traffic, extent of memory consumption, CPU utilization, and several other parameters of data within a cloud computing infrastructure, the tool is able to estimate an effective measure of the overall system health. This renders the software flexible enough to formulate an adequate data-range characterization that can be safely considered as being normal. The processor usage, for instance, reflects the amount of computational power being required at any instant of time. The software outlines normal performance for every virtual machine in the cloud, and reports deviation of almost any sort. Based on the aforementioned information the tool predicts incongruities that might potentially affect the system’s capacity to provide service to users.

This particular approach is immensely beneficial in terms of associated benefits, including the all-important savings inherent with the alleviation of personnel training requirement. The software, being entirely autonomous depicts aberrant behavior on its own. In addition, the ability to predict anomalies is a feat that has never been achieved before. Not only that, upon sensing abnormal behavior in a virtual machine, it executes a pre-defined black box diagnostic test that determines which variables (memory usage, for instance) might be affected. The diagnostic data is then used to prompt the suitable prevention subroutine without making use of the user’s personal data in any form.

Helen Gu, co-author of the paper articulating this research marvel and an assistant professor at North Carolina State University explained: “If we can identify the initial deviation and launch an automatic response, we can not only prevent a major disturbance, but actually prevent the user from even experiencing any change in system performance.”

Most importantly, the software is not resource hungry (power in particular) and does not consume considerable amount of processor cycles to operate. It has the ability to fetch the preliminary data and classify normal behavior much quicker than the existing tactics. With CPU power consumption less than 1% of the total and a mere 16 megabytes of memory, the software is bound to pack a punch.

During the testing phase, the program recognized up to 98% of incongruities, which is the utmost as compared to existing approaches. It prompted a mere 1.7% of false alarms. Gu says: “And because the false alarms resulted in automatic responses, which are easily reversible, the cost of the false alarms is negligible.”

The software does sound like a real game-changer altogether. However, commercialization of the said research would eventually reveal the true benefits this tool has in store for the cloud computing industry – fingers crossed.

By Humayun Shahid

 

Best Practices for Cloud-Based Recovery

Download this Whitepaper today to learn more best practices for Cloud-Based Recovery.

Methodology Of Cloud Computing Risk Assessment

Methodology Of Cloud Computing Risk Assessment

A Break in the Cloud’s Silver Lining

Though cloud computing is considered as the new paradigm of computing, it should not be considered as a new technology but merely a new implementation or application of existing technology, specifically networking and telecommunications technology. So this brings with it some inherent security risks, with some security experts stating that “the economies of scale and flexibility (that cloud computing brings) are both a friend and a foe from a security point of view.”

When your application and data is streamed half way around the world from your geographical location, there is a risk that whatever data is traveling may be intercepted by a third party with malicious intent. And as data and resources are massively concentrated virtually or literally, this creates a very attractive target for attackers. But cloud-based defenses can also be made to be robust, scalable and cost-effective. That is the goal that the ENISA working group had in mind when they drafted the Methodologies for Cloud Computing Risk Assessment.

Methodology for Cloud Risk Assessment

Because of the inherent risks associated with cloud computing, an ad-hoc working group within the European Network and Information Security Agency (ENISA), the European Union’s center for excellence in network and information security, made an assessment of the benefits and security risks that are present in cloud computing. Then the group gave recommendations on how to mitigate these risks and enhance the benefits of cloud computing.

The working group responsible for the risk assessment also determined a methodology which allows direct comparison between items that enable organizations to perform their own risk assessment and risk management of cloud services and infrastructure. The purpose of which is:

  • To be able to determine the most appropriate risk assessment and management items that an organization may use depending on their situation like which business sector they belong to, the size of the organization, culture, regulation requirements, the sophistication of their risk approach, and their available resources.
  •  To enable a direct comparison between risk assessment and management items in order to achieve a better understanding and permit expert advice on their suitability for use in the given situation of the organization.

The methodology considers the process of risk assessment and management items and together with their inputs and outputs, scores them against set benchmarks that were determined by the group. Depending on the nature of the organization, their business, and their geographical location which determines regulatory processes, they can determine their overall requirements for risk assessment and risk management (RA/RM) by considering and listing down a number of “use cases” and then determining the RA/RM requirements based on that. The organization then assign scores to their processes based on the benchmarks which results in an alignment profile created using a radar chart. It is recommended that individual organizations produce their own ideal alignment profile on which they may compare the score of their profile against.

All the recommendations and methodology are on a document that can be downloaded from ENISA’s website: http://www.enisa.europa.eu.

Conclusion

The importance of assessing and managing the risks that comes with cloud computing is very important so that an organization’s cloud computing foray may return positive rewards. If this was neglected and the organization jumps in blindly, they may not achieve the full potential of cloud computing and may not be able to cope with the risks involved.

By Abdul Salam

Gussy Up Your Employment With Cloud Computing

Gussy Up Your Employment with Cloud Computing

With reports of 50,000 new jobs being launched in cloud computing/IT in Los Angeles alone, it’s official: the employment iron is hot. Strike into the fray with a sophisticated grasp of how cloud computing can improve your approach and your potential company.

Chasing versus cultivating. The sphere of cloud computing’s involvement with the hunt for a great job is populated with two contingents: those who seek to “chase” literal cloud computing positions, and those who opt to “cultivate” a reputation for their own cloud expertise. The former group, the “chasers,” are currently enjoying a bumper crop of positions as consultants and providers of cloud. However, the well of such posts may run dry as the demand for them begins to slow. To best incorporate the cloud into your work life, emulating the “cultivators” — nurturing your reputation as a cloud professional, even at your current workplace — is vital. Doing so positions you at the vanguard of the cloud in your own occupational backyard, a sage move toward solidifying your value and enhancing your cachet.

Earn cloud skills that pay the bills. You will require more than a well-stocked DropBox and regular reading of CloudTweaks (which remains highly recommended, nevertheless) to claim cloud computing proficiency at your workplace. Consider your genius in relevant, related skill sets that can support your protestations of cloud excellence. How smoothly can you cajole your co-workers (heck, even your own family) into taking up the cloud along with you? Can you rattle off the five most essential new cloud applications on demand? Can you demonstrate to your boss how participation in cloud can boost the business, offset risk and encourage reward? And can you serve as a cloud architect, proposing a structure that safely yet profitably involves your company in cloud? Until you can answer such questions with ease, hold back on tooting your cloud computing horn too loudly.

Before you head up to cloud, get grounded. Many employers will grow annoyed with staff or applicants that tout reams of information on cloud computing without a mastery of the business itself. Ground your excellence in cloud know-how with equally specific respect for the industry or enterprise at hand. Going for a position in healthcare, for example? Research the business vein of that hospital or facility, then base what you can offer via the cloud on that information. Tailoring your genius to a particular gig is doubly impresses: it educates and inspires confidence all at once.

By Jeff Norman

The Cloud: Inevitable, But Not Ambiguious

The Cloud: Inevitable, But Not Ambiguious

With so much hype surrounding the cloud, most IT professionals understandably are left scratching their heads and wondering: Should I move to the cloud? Where will it be the most helpful? How can it help drive efficiencies? Where does it not make sense? How can I separate the potential from the marketing fluff? Read this white paper to separate the technology and business potential from the marketing fluff. Get answers to your most pressing cloud questions and  better understand when and where the cloud makes the most sense for your organization.

Cloud hype

There’s lots of hype about the cloud. It will change IT forever; it will replace the way we currently compute; it will change the way we work, the way we interact, and the way we live. The hype is definitely intense, and to some extent it accurately reflects the potential of what the cloud can do. But how can you separate the technology and potential from the marketing fluff? You need to understand that while just about every enterprise will soon use cloud computing, not everything will be in the cloud.

Where the cloud works

Cloud computing can be the cure to the colossal complexity, considerable costs, and substantial capital investments needed to manage the sprawl of today’s data centers. Service providers see the cloud as a catalyst for revenue growth. Businesses and governments want the benefits of having information technology delivered as a pure service throughout the organization, metered, ubiquitous, and available on demand much like electricity or water.

However, companies face a number of obstacles to cloud adoption. Among them: differences between business users and IT executives about the pace of adoption, differing stages of maturity within the cloud adoption continuum, different understanding of the business risk that public cloud computing could introduce, and the need to avoid compromising the cloud’s benefits with haphazard, uncoordinated adoption.

Without a proper goal and a clear plan to get there, organizations risk re-infecting their IT environments with complexity and sprawl that are every bit as counterproductive as the data center problems the cloud was meant to correct….

Read this white paper to separate the technology and business potential from the marketing fluff. Get answers to your most pressing cloud questions and better understand when and where the cloud makes the most sense for your organization.

CloudTweaks Comics
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…