NYT

Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000

MIAMI — The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary vote to pay nearly $600,000 in ransom to hackers who paralyzed the city’s computer systems. Riviera Beach, a small city of about 35,000 people just north of West
/
Tech Crunch

MIT develops a system to give robots more human senses

Researchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have developed a new system that could equip robots with something we take for granted: the ability to link multiple senses together. The new system created by CSAIL involves a predictive AI that’s able to learn how
/

Computing Obstacles

According to Buyya et al. (2008), “A Cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers.” The enormous advantages of cloud computing in improving businesses have generated unprecedented interest in its adoption. However, customers face numerous cloud computing obstacles such as service requirements; unexpected outages; invalid assumptions about the operating environment; poor isolation between users, hardware degradation, misconfiguration of software; cost implications of failure and uncertainty about cloud providers’ ability to meet service level agreements (SLA). Cloud providers are usually responsible for problems related to their own infrastructure. Although cloud providers monitor their physical resources such as servers, storage and network systems to provide a highly stable infrastructure, they usually do not guarantee individual instance availability.

In addition, Benson and his colleagues analysed the problems users faced and categorized them into five categories: Application-related (e.g. Email server setup, Windows Licensing, LAMP setup, Linux), Virtual Infrastructure-related ( e.g. Virtualized Storage, Attach/Detach, Virtualized load balancer, DNS & Virtualized IP) , Image Management-related ( Image bundling issues, storage and migration of image between buckets, Update/kernel install issues),Performance-related ( Instance not responding, Instance stuck in terminating, EBS performance), and Connectivity-related (General connectivity, Firewall, Connection performance, Connecting to app).

These risks hinder the adoption of cloud. Zardri et al. (2013) believe that “evaluating pre adoption choices at early stages is cost-effective strategy to mitigate risks for probable losses due to wrong or uninformed selection decisions”. They suggested that companies should identify obstacles and their importance through understanding their consequences on the adoption process (obstacle prioritization). Then, appropriate tactics should be used to handle, manage, and solve the problems. Furthermore, analysing Service Level Agreements (SLA) of cloud providers and matching them against users’ requirements can be useful in revealing potential SLA violations, conflicts and probable risks.

Benson (2013) also  introduced several strategies that cloud providers can apply to help users.

Best Effort Support Model: “user forumis considered as one of the most common version of support models. Unfortunately, cloud providers do not make guarantee on the response time of the operators and the resolution time of the problem.

Premium Support Model: In this model, cloud providers guarantee the user that problems will be resolved within a certain period of time. The SLA provided to a user is inversely proportional to the price paid by the users; a higher price demands a guaranteed for a shorter resolution time. Certain providers also ensure that users have access to dedicated operators who are familiar with the user’s environment and needs.”

As discussed above, it would seem that companies should identify and understand early the properties of the problems that they will face in using a cloud before migrating any servers, databases, applications or data to the cloud.  Data security and privacy breaches, as well as regulatory and legal compliance are significant issues when moving from in-house IT infrastructure to cloud services. Therefore, specific standards, education, and appropriate support mechanisms should be designed to solve the problems.

By Mojgan Afshari

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

Kayla Matthews

Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

2018 Augmented Reality If you’ve never heard of “Pokémon Go” — or at least never had the concept explained to ...
5 Reasons to Head for the Cloud – Part 1

5 Reasons to Head for the Cloud – Part 1

Head for the Cloud Last month Salesforce held its 14th annual Dreamforce event in San Francisco. It has become the ...
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
GDPR Compliance

Avoid Breaking the Bank to Protect Your IT by Automating These 3 Departments

Protect Your IT by Automating In the big data world, companies have more information than any human (or team of ...
IDC

Earwear and Watches Expected to Drive Wearables Market at a CAGR of 7.9%, Says IDC

/
FRAMINGHAM, Mass., June 19, 2019 – The market for wearable devices is on track to reach global shipments of 222.9 million units in 2019, growing to 302.3 million units in 2023 ...
Slack

Slack to take unusual route to public markets, likely valuing it around $16 billion

/
NEW YORK (Reuters) - Slack Technologies, the fast-growing workplace messaging and communication platform, is poised for an unusual public listing on Thursday that will see it trade on the New ...
Bloomberg

Facebook crypto plan draws fire

/
European leaders have reacted with alarm to Facebook’s plans for a cryptocurrency. Citing privacy and money laundering concerns, French finance minister Bruno Le Maire says Libra must not “become a sovereign ...