Quantcast
Channel: Latest News from The Cloud Computing Newswire
Viewing all 477 articles
Browse latest View live

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

$
0
0

Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with customers’ payment card information and employee data while companies and federal authorities investigate the source of the leaks and spend millions of dollars to repair the harm.
Some see these breaches as a threat to national security and in response, the U.S. government has launched the “30-day Cybersecurity Sprint” as a tactic designed to beef up cybersecurity protocols. According to media reports, specific program steps include:
  • Immediately fixing any cybersecurity vulnerabilities
  • Tightening policies and practices for privileged users who can access sensitive information
  • Implementing multifactor authentication procedures for accessing federal networks
  • Employing electronic “indicators” provided by the Department of Homeland Security that show when there has been a malicious cyberattack
Do your part in supporting the sprint by educating yourself about cybersecurity. The “Insight Partner Views on Cybersecurity” e-book can help. By addressing security from multiple viewpoints, the e-book reinforces the need for society to build a culture that embraces information risk management.
The “Insight Partner Views on Cybersecurity” captures the latest news, trends and best practices surrounding cybersecurity by influential bloggers in the Dell Insight Partner program. Topics include:
  • The chief information security officer (CISO) role in cybersecurity
  • Security attacks and countermeasures
  • Mobile device security
  • U.S. Department of Defense cloud security guidelines
  • The emerging science of digital forensics
http://www.slideshare.net/kvjacksn/security-e-bookv5pg


Share the “Insight Partner Views on Cybersecurity” e-book within your personal and professional social networks. In doing so, you will support the “30-day Cybersecurity Sprint,” be more informed about the subject and serve as a crucial partner in guarding data privacy for yourself, your organization and your nation.



This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell's thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.



Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



read more


Tune into the Cloud: The Story So Far By @GregorPetri | @CloudExpo #Cloud

$
0
0
In 2014 I started publishing my series of “Tune into the Cloud” columns on the Gartner Blog Network, below some of the highlights so far. On how time to market – enabled by ever more productive cloud platforms – is ruling the battle for cloud dominance, and how virtual servers are increasingly becoming table stakes when it comes to cloud competition.

read more

Cloud Workspace Suite v 4.1 from @IndependenceIT | @CloudExpo #Cloud

$
0
0
IndependenceIT has announced general availability of its latest generation Cloud Workspace® Suite software featuring enhanced capabilities. New features include universal and fully automated RemoteApp server role deployment and configuration; multi-application delivery with Microsoft RemoteApp; RemoteApp data layer and corporate shared file structure access, and fully automated RemoteApp application collection entitlements for end users.

read more

Cloud Computing Price-Performance Could Vary By 1000%!

$
0
0



Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This also means that the cost to you of processing the exact same job in the cloud could vary by this much as well.
This surprising result was discovered by a Rice University group, headed by Dr. T. S. Eugene Ng, that has been focusing on cloud computing. Recently they published their joint work with Purdue University: Application-Specific Configuration Selection in the Cloud: Impact of Provider Policy and Potential of Systematic Testing, in the IEEE INFOCOM 2015 Conference Proceedings. That paper took a first step towards understanding the impact of cloud service provider policy and tackling the complexity of selecting configurations that can best meet the price and performance requirements of applications. That work resulted in a collaboration between Rice University and Burstorm, a developer of computer aided design (CAD) software specifically built to support cloud computing architects.
The Burstorm platform contains a product catalog of over 36,000 products across 900 CSP product sets. Working with Dr. Ng’s group, the study looked at seven suppliers across three continents (Asia, North America and Europe) with a total of 266 computer products spread over three locations per vendor, where available. Raw data was collected every day, for 15 days. The results were then normalized to reflect a 720-hour, monthly pricing model. The final output were price-performance metrics graphs that were used to look at performance and price variance both between the CSPs and geographic regions.
Analysis of the final output showed a 622 percent variation of performance within a same instance type and a price/performance variance of 1000 percent. Performance of the exact same virtual machine instance can also vary by as much as 60 percent over time. The best performing instance also did not show the best price-performance. Availability and behavior of instances was also very dependent on location, even when the instance was provisioned by the same CSP. Dave Hansen, Vice President and General Manager of sales, marketing and services for Dell Software sums up the importance of these results saying:
Dave Hansen, VP and General Manager, Dell
“…[This] report is incredibly valuable. I’ve looked at this problem many times over the years and it is very difficult to make buying decisions on cloud services without this context.”
These results also show that today’s enterprise desperately needs to use active metering and monitoring when procuring cloud-based services. Changes in instance types, pricing, performance over time and availability of services by location highlights the inadequacy of traditional benchmarking philosophies and processes. Another hidden gem in this report is the use of “performance quota” by some service providers. When a customer meets this CSP management quota, the performance of the relevant instance will be reduced. In other words, exceeding this limit will drive up your usage bill. These findings also drive home the need for enterprises to ramp up their due diligence when selecting CSPs. They should also investigate the use of third party brokers and automated solution design tools when developing their cloud migration strategy.
As the use of cloud computing advances, consumers must take active steps toward being more sophisticated, automated and dynamic in their use of cloud service providers. At a minimum, these steps should include:
  • The use of computer aid design tools when conducting due diligence on cloud service providers;
  • Use of organic or independent third parties to meter, monitor and report on the performance of cloud-based resources;
  • Clear understanding of the use and associated limits of “performance quotas”; and
  • The identification of one or more alternative sources for the provisioning of all cloud-based resources.
This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell's thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



read more

Cloud Computing + Things = ‘Information Excellence,’ Not IoT By @Kevin_Jackson | @CloudExpo #IoT #Cloud

$
0
0
The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is also feared as the real- life instantiation of The Terminator’s Skynet, where sentient robot team with an omnipresent and all-knowing entity that uses technology to control, and ultimately destroy, all of humanity.

read more

The Cybersecurity Sprint: Are We Safe Yet? By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
Recent unauthorized access to a U.S. government database led to thecompromise of information on at least 21.5 million individuals. This massive background investigation data breach also compromised usernames, passwords, mental health records and financial information. Although a security update applied by the Office of Management and Budget (OPM) and the Homeland Security Department (DHS) in January ended the bulk of the data extraction, the U.S. government-wide remediation efforts were extended by launching a 30-day Cybersecurity Sprint.

read more

'Cloud First' Lessons Learned from ViON By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of the US Federal Government’s information technology modernization efforts: “Cloud computing has the potential to play a major part in addressing these inefficiencies and improving government service delivery. The cloud computing model can significantly help agencies grappling with the need to provide highly reliable, innovative services quickly despite resource constraints.”

read more

Cloud Hosting: Look Beyond Cost Savings By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud will almost guarantee failure. Some reasons that typically lead to cloud computing costing more include: Building and migrating to a private cloud, which will almost always cost more than staying in a traditional data center; Migrating legacy applications that weren’t designed to operate in a virtualized environment or are tied to very specific environments run on older operating systems or require out-of-date drivers;

read more


IEEE Cloud Computing: Legal Clouds

$
0
0

http://www.computer.org/web/computingnow/cloudcomputing



The new issue of IEEE Cloud Computing is now available!  

This special issue looks at how to balance
privacy with legitimate surveillance and lawful data access. Some of the specific areas covered are:
  •     Balancing Privacy and Surveillance in the Cloud;
  •     Data Flow Management and Compliance in Cloud Computing;
  •     Anonymous Credential-Based Access Control Scheme for Clouds; and
  •     End-to-End Privacy for Open Big Data Markets.
This issue also features articles on cloud forensics and the strategic value of cloud.

I am also very proud to present my debut article for IEEE; "IEEE GovCloud: Making a Difference for Global Governments":

On February 8, 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy[1]. In the executive summary he laid out the inefficient state of affairs that was the US Federal Government’s IT environment:
 

The Federal Government’s current Information Technology (IT) environment is characterized by low asset utilization, a fragmented demand for resources, duplicative systems, environments which are difficult to manage, and long procurement lead times. These inefficiencies negatively impact the Federal Government’s ability to serve the American public.

Cloud computing has the potential to play a major part in addressing these inefficiencies and improving government service delivery. The cloud computing model can significantly help agencies grappling with the need to provide highly reliable, innovative services quickly despite resource constraints.”

These words heralded the start of the US Federal Government’s Cloud First policy. It also turned out to be the start of a global trend towards the adoption of cloud computing services by governments around the world...."








This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.



Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



read more

Personal email:Pathway to Cybersecurity Breaches

$
0
0

As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them admitted checking personal emails at work. The workers questioned in the poll estimated they spend 6.3 hours a day checking emails, with 3.2 hours devoted to work emails and 3.1 hours to personal messages. Nearly half of the respondents also said that their use of emails for work will increase in coming years with 19 percent saying it will go up substantially.

Employers generally have the discretion to monitor and restrict employees’ personal computer usage as they see fit and, in most cases, email messages are not subject to any personal privacy laws. But even with these stipulations, Dell SonicWall channel partner Michael Crean, President and CEO of Solutions Granted, says that allowing personal email on corporate PCs is just not worth the risk. Solutions Granted, a small veteran-owned business, is certified as a SonicWALL Managed Security Service Provider. According to Crean, the threat of malicious attacks and subsequent remediation cost far outweighs any gain from allowing personal email access. “If your employees need to check their email in the car, they use their personal phone. So why can’t they do the same at work?”

Email phishing, the attempt to acquire sensitive information for malicious reasons by masquerading as a trustworthy entity, is a significant cybersecurity threat.

“In one incident investigated by Dell SecureWorks, attackers phished an employee at a manufacturing company to obtain the login credentials for the company’s Citrix platform. The attackers were able to use the credentials to connect to internal corporate resources, then move laterally through the network and harvest intellectual property using the company’s Altris platform, which remotely distributes new software and patches to all the endpoints.”

The most sophisticated attacks are grouped in two categories:
  • Indirect Phishing Attacks –attackers direct a series of emails, usually in combination with organizational information from other sources such as LinkedIn, that add up to a successful phishing campaign. An example would be an employee being tricked into giving away Yahoo credentials as part of an attack, which can give access to contact or calendar information. Another example would be an employee with a cloud-based company email (i.e. Office 365 or Gmail for Business accounts) could be successfully phished. This could give the attacker a platform for sending malicious emails that appear safe.
  • Direct Phishing Attacks – Cybercriminals seek login credentials for actual business systems. During Q2 2015 security analysts found multiple examples of phishing attempts on Outlook credentials. Aside from email access, these credentials are frequently used for domain logins, providing an attacker with access to other cloud-based services, such as Dropbox or Salesforce. This sort of breech could also provide an attacker with direct access to corporate proprietary information.

Phishing is often described as spam and, according to Secure List, generally followed the same template:
  • Very little text (the email generally contains a typical header consisting of several words which is exactly repeated in the body of the message)
  • One or more links which load a brightly decorated picture (sometimes in parts) with all the necessary advertising data (a more detailed advertising text plus contacts: website address, phone number, company name)
  • Another long link that leads to a resource that corresponds to the content of the email
  • Additional ‘white noise’ text to bulk out the email

The white noise text consists of random phrases or single words in any language which may not be the same as the language of the mass mailing. This text is generally invisible to the reader of as it is written in white or pale color on a standard white background.  Email is also often used to distribute malicious attachments in Microsoft Word or Excel.

Phishing is an equal opportunity threat with “Global Internet Portals”, which include email and search portals taking the brunt of the attacks. As a trusted advisor to their customers, Solutions Granted recommends the following:
  • Severely restrict or eliminate employee access to personal email via company-owned assets;
  • Don’t let preferences of your human resources team overrule the need for IT security; and
  • Use industry proven cybersecurity technologies and best practices.
This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



read more

Data-centric Security: The New Must Have By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere. Having your data and the data about you virtually everywhere is, in fact, key to the cloud computing business model. This means that traditional security concepts that focus in depth on infrastructure defense no longer apply. No one knows and understands this more than Dell's Brett Hansen, Executive Director, Dell Data Security Solutions.

read more

Cybersecurity Through Enterprise Risk Management By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in cybersecurity or a failure to properly invest in people, security training or technology. While breaches are very costly to the companies concerned, they also represent major consequences for individual privacy and a business's short-term and long-term viability. With this as a backdrop, I spoke with Curtis Hutcheson, VP and GM, Dell Security, at Dell Peak Performance. During the conversation, he shared his views and insight about enterprise risk management and how an integrated cybersecurity fabric could be used to better protect a company's information and reputation.

read more

Security requires long haul planning

$
0
0



On Tuesday, October 6th, the European Court of Justice (ECJ), invalidated the U.S./EU Safe Harbor Framework. This framework, in place since 2000, gave blanket permission to data transfers from the European Union to the United States. The ruling means that national data protection authorities can now review such data transfers on an individual basis. It also complicates many aspects of data security for any enterprises doing business across the Atlantic Ocean.

This recent ruling highlights the value of having a strong security partner shepherding your enterprise through these types of perturbations. Luckily during Dell Peak Performance in Las Vegas, I had the opportunity to discuss the importance of such a partnership with Bill Evans, senior director of product marketing for Dell’s Identity and Access Management businesses.

Photo courtesy of Bill Evans
Kevin: Bill, thank you joining use today. What is your role at Dell?

Bill: Thank you for the invitation, Kevin. I work in the product marketing group within Dell Security. Specifically I support the Identity and Access Management product portfolio.

Kevin: Identity and Access Management is a very important aspect of cloud security. What has changed in the IDAM (identity and access management) marketplace over the past 12 months? The proliferation of devices seems to be the Achilles heel to having secure IT.

Bill: Historically, when it came to IT, everything was centralized. The mainframe, the client-server model and desktop computers were all contained within a company’s network perimeter. That perimeter is now gone and organizations are now trying to deal with an IT world that has no boundaries. A recent analyst report actually stated that identity is now the new perimeter. Protecting the network from intrusion, malware and other threats is still as important as ever. Additionally though, companies need to work harder to control access to data and applications. The focus is not only on outside hackers trying to get in but on the malicious insider as well.

Kevin: With identity and access management as the new boundary for now and into the foreseeable future, how do your customers step up to this formidable challenge?

Bill: Above all, leaders and managers need to be intelligent about the investments they make in this area. This also means avoiding reflexive “knee-jerk” reactions. The first step of the process is conducting an inventory of their current infrastructure. It’s actually impossible to protect every piece of data and frankly, they don’t need to waste money and effort trying to do so. Companies do, however, need to categorize and strongly protect data that is important. Things like personally identifiable information (PII) or healthcare records need to be isolated and surrounded with strong access controls. We call this process prioritizing the need which means developing plans that protect the most sensitive data by using the strongest operationally practical protections. Organizations are then in a position to assess available tools for implementing the needed protections. Dell’s portfolio not only provides solutions for today’s problems, but it also delivers a platform that can address future needs and challenges. Security is not a one-time project so we partner with our customers over the long haul. Making intelligent business decisions across all available technologies is key.

Kevin: You’ve outlined an approach that includes infrastructure deployment decisions in combination with a sort of data triage process. I’ve also been impressed with the breadth and depth of Dell’s security portfolio. With that said, what issues are top of mind for you and the Dell security team. Which of these issues are you planning to address over the next twelve months?

Bill: That’s really a great question. The thing we’re looking at very closely right now is the impact that security has on user productivity. To be honest, on a scale from one to 10, a security and risk professional wants to turn the security dial up to 11. They want to secure everything with multiple credentials that all have very long passwords. Users don’t tend to like that approach, so if you go down that implementation path, people will generally avoid the issue by going around what they perceive as a “security hurdle”. This isn’t good for anybody, including the company.

So what we’re doing is applying some new technology that we refer to as the Dell Security Analytics Engine. Though the use of Dell’s uniquely broad security portfolio, the security analytics engine can enable context-aware security. This capability collects data in real-time from multiple security assets deployed across an enterprise. We can pull information from the Dell laptop as a managed or unmanaged device. We also extract data from the Sonicwall firewall on who is accessing what type of data from where. Data from Dell Secureworks also compares the scenario with blacklists and known threat signatures. All this information is then combined to deliver a context derived risk score to the Dell One Identity Cloud Access Manager. The access manager can then make a real-time decision on that connection.

Let me give you an example. If I log in on a Monday morning at 8:30 a.m. from the office with correct credentials, it’s a pretty safe bet that I am who I claim to be. On the other hand, this week I’m in Las Vegas at Peak Performance and will probably log in from my hotel room tonight at 9:00 p.m. The security analytic engine would flag that as being an unusual occurrence and Cloud Access Manager would interpret the higher risk score as a cue for stepping up authentication requirements. This, for instance, may mean using a one-time authentication token. If my credentials were subsequently used to login at on a Sunday at 2 a.m. from North Korea, the system would read that as a probable attack and block the transaction. The challenge is in finding that right balance between tight security and user productivity. Nine times out of 10, username and password is good enough. That tenth time, however, a little extra precaution is warranted. Users are generally willing to accept a security related inconvenience every once in a while so they won’t try to circumvent the controls. So in effect, the security team can adjust the security dials in real time.
Kevin: This seems to be a more balanced approach to security. At Dell Peak Performance we heard that enterprises have suffered over $600B in cybersecurity losses this year against just a $200B investment to protect against these losses. That doesn’t sound like a balance at all. What should senior decision makers and IT professionals learn from this statistic?

Bill: This really indicates how tough security decisions can be. While enterprises today are spending more money on security, they are also feeling worse about their security posture. Knee-jerk reactions contribute to this dichotomy. Executives, with the best of intentions but focused on addressing singular security issues, serially purchase disparate security products. These types of actions eventually lead to a patchwork of siloed security solutions. Between each of these perfectly effective solutions, however, you will find security gaps through which threats can invalidate a security strategy. As discussed earlier, we strongly recommend targeting a long-term goal with the understanding that the company cannot solve every security problem in one day. Success in this game requires partnering with a vendor that can not only address today’s issues, but also work with you to leverage a coordinated investments over time.

Kevin: With respect to identity and access management, are any specific industry verticals better positioned for this type of balanced approach? Are there any industry specific insights that you can share with us?
Bill: There is an interesting dynamic in play when it comes to user behavior and industry related expectations. While no one industry is easier or harder when it comes to data protection, they all have specific requirements related to their industry’s business model. While the requirements within industries like banking and finance are certainly different than those in healthcare, they all deal with the challenge of balancing security with the desired consumer community experience. In private, management will demand two-factor authentication throughout their respective user communities, but why hasn’t this proven control been broadly implemented? Multifactor authentication isn’t being widely used in the consumer space because of its intrusive impact on the consumer experience. A prospective customer’s decision to bank with Company A or Company B may ultimately be driven by how easy it is to get account information through a smartphone application. Daily decisions of this type forces a constant balancing between security and business needs. As consumers, we decide with our buying actions whether to accept the cost of improved security. Eventually, those same consumers will need to stand-up and state through their buying actions a willingness to pay for more robust security. We advise organizations to act smart by optionally offering enhanced security, now, because over time, all organizations will be moving in that direction.

Kevin: Do you have any final recommendations for the CEO dealing with this dilemma?

Bill: I would counsel all CEOs to start with research. You need to understand your infrastructure, thoroughly understand your threats and attack surfaces and plan for the long term. This will pay high dividends when selecting a security partner that can serve your needs as they morph and change over the long haul.

Kevin: Thank you, Bill, for your words of wisdom.

Bill: You’re welcome Kevin.

This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.

 



Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



read more

Cloud Computing: A Data-Centric Business Model By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management.” While this definition is broadly accepted and has, in fact, been my adopted standard for years, it only describes technical aspects of cloud computing. The amalgamation of technologies used to deliver cloud services is not even half the story. Above all else, the successful employment requires a tight linkage to the economic and business models of the enterprise.

read more

The future of data security: An interview with Dell Fellow Tim Brown

$
0
0
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished themselves through ingenuity, intellectual curiosity and inventiveness in the delivery of technology solutions. For these reasons and more, I couldn’t pass up the opportunity to speak with Timothy G. Brown, Executive Director Security and Dell Fellow. During our broad-ranging discussion, Tim shared with me his exciting view of security in the not too distant future.

read more


Teradata: Embrace the Power of PaaS

$
0
0
Platform-as-a-Service (PaaS) has always been the unappreciated sibling of the cloud computing service model trio. Existing in the dark shadow of the most widely adopted Software-as-a-Service (SaaS) and foundationally powerful Infrastructure-as-a-Service (IaaS), the third service model is often misunderstood and widely ignored.

read more

Hybrid IT Governance: Automation Is Key By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different traditional and cloud computing operational models. Often referred to as hybrid IT, supporting both models has left many executives trying to cope with a lack of hybrid IT operational experience. Challenges can also include security concerns, financial management changes and even dramatic cultural changes. This myriad of challenges translate into enterprise risk across multiple levels, namely:

read more

Why Cloud Changes Everything By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
How is cloud computing bringing society and its ideas closer together? This got me thinking. Last week the President of the United States started following me on Twitter. Now I realize that it's not really President Obama on the other side of that virtual table, but the event brought to mind the Six Degree of Separation concept. In case you don't remember, this theory states that everyone and everything is six or fewer steps away, by way of introduction, from any other person in the world. That random thought led me to wonder if all this social media has actually changed the theory so much that even I can be directly connected to the leader of the free world. A quick internet search revealed that the number of links between two random people have indeed reduced.

read more

Twenty Hybrid Cloud Insights from Top Industry Experts By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
One cloud does not fit all organizations. That's true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that fits your organizational needs. However, there are always questions with new solutions. We reached out to industry thought leaders to answer some of the marketplace's most pressing questions on hybrid cloud. In this eBook, you'll learn why thought leaders like Kevin Jackson, founder and CEO GovCloud Network, look at hybrid cloud from the viewpoint of hybrid IT. You'll also hear from Shelly Kramer, co-CEO, V3+Broadsuite, on what CIOs need to consider when adopting hybrid cloud.

read more

Endpoint Device Management By @Kevin_Jackson | @CloudExpo #Cloud

$
0
0
Mobility and cloud computing have combined to obliterate any so-called network security perimeter. Corporate data has now been let loose to roam in a world of cyber thieves, manipulators and untrusted infrastructure. What is a security professional to do? According to Bill Odell, the Dell Vice President of Marketing for Endpoint Device Management, you need to protect the enterprise front door. Since devices are the network's gateways, endpoint device management is now the key to protecting your enterprise data. That is why I was truly excited to speak with Bill at Dell Peak Performance in Las Vegas earlier this year.

read more

Viewing all 477 articles
Browse latest View live