Quantcast
Channel: Latest News from The Cloud Computing Newswire
Viewing all 477 articles
Browse latest View live

Blockchain Business Innovation

$
0
0

Is there more than bitcoin to blockchain?

Absolutely, because today’s blockchain is opening up a pathtowards the delivery of trusted online services.


To understand this statement, you need to see blockchain as more that it’s more famous bitcoin use case. As a fundamental digital tool, blockchain is a shared, immutable ledger for recording the history of transactions. If used in this fashion, it can enable transactional applications that can have embedded trust, accountability and transparency attributes. Instead of having a Bitcoin blockchain that is reliant on the exchange of cryptocurrencies with anonymous users on a public network, a Business blockchain can provide a permissioned network with known and verified identities. With this kind of transactional visibility, all activities within that network are observable and auditable by every network user. This end-to-end visibility, also known as shared ledgering, can also be linked to business rules and business logic that can drive and enforce trust, openness and integrity across that business network.  Application built, managed and supported through such an environment can now hold a verifiable pedigree with security built right in that can:
  • Prevent anyone - even root users and administrators - from taking control of a system;
  • Deny illicit attempts to change data or applications within the network; and
  • Block unauthorized data access by ensuring encryption keys can never be misappropriated.

From an industry vertical point of view, this approach can:
  • Give financial institutions an ability to settle securities in minutes instead of days;
  • Reduce manufacturer product recalls by sharing production logs with original equipment manufacturers (OEMs) and regulators; and
  • Help businesses of all types more closely manage the flow of goods and related payments with greater speed and less risk.
Innovators within just about any industry can build, run and manage their own business blockchain network. And even if the organization isn’t quite ready to do the heavy lifting, it can consume a blockchain service from companies like IBM.

Ready-made frameworks as also available from the Hyperledger Project, an open source collaborative effort created to advance cross-industry blockchain technologies. Available hyperledger business frameworks include:
  • Sawtooth - a modular platform for building, deploying, and running distributed ledgers that includes a consensus algorithm which targets large distributed validator populations with minimal resource consumption.
  • Iroha - a business blockchain framework designed to be for incorporation into infrastructural projects that require distributed ledger technology.
  • Fabric - a foundation for developing applications or solutions with a modular architecture that allows components, such as consensus and membership services, to be plug-and-play.
  • Burrow - a permissionable smart contract machine that provides a modular blockchain client with a permissioned smart contract interpreter built in part to the specification of the Ethereum Virtual Machine (EVM).

If you’re team is looking to innovate and take a leadership position within your industry, business blockchainsmay be the perfect enhancement for your business focused application.



This post was brought to you by IBM Global Technology Services. For more content like this, visit ITBizAdvisor.




Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2017)



read more


Crisis Response Using Cloud Computing

$
0
0


Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis communication service to receive a Federal Risk and Authorization Management Program (FedRAMP) authorization from the United States Government for its AtHoc Alert and AtHoc Connect services. If you’re not familiar with FedRAMP, it is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The Blackberry certification was sponsored by the US Federal Aviation Administration.

While you may not need a US Government certified solution in an emergency, your organization may really want to consider the benefits of cloud computing for crisis response. From a communications point of view, companies can use cloud based services to quickly and reliably send secure messages to all members of staff, individual employees or specific target groups of people. Smartphone location-mapping functions can also be easily installed and used. One advantage of using application-based software installed on an employee’s smartphone is that it can be switched off when an employee is in a safe-zone, providing a balance between staff privacy and protection. Location data can be invaluable and result in better coordination, a more effective response and faster deployment of resources to those employees deemed to be at risk. 


Using the cloud for secure two-way messaging enables simultaneous access to multiple contact paths which include SMS messaging, emails, VOIP calls, voice-to-text alerts and app notifications. Cloud-based platforms have an advantage over other forms of crisis communication tools because emergency notifications are not only sent out across all available channels and contact paths, but continue to be sent out until an acknowledgement is received from the recipient. Being able to send out notifications and receive responses, all within a few minutes, means businesses can rapidly gain visibility of an incident and react more efficiently to an unfolding situation. Wi-Fi Enabled devices can also be used to keep the communications lines open when more traditional routes are unusable.  


While you’re thinking about your corporation’s crisis response plans, don’t forget about the data. Accessing data through cloud-based services can prevent a rescue effort from turning into a recovery operation. Sources for this life-saving resource include:
  • Data exhaust - information that is passively collected along with the use of digital technology
  • Online activity - encompasses all types of social activity on the Internet such as email, social media and internet search activity
  • Sensing technologies – used mostly to gather information about social behavior and environmental conditions
  •  “Small Data” - data that is 'small' enough for human comprehension and is presented in a volume and format that makes it accessible, informative and actionable
  • Public-related data - census data, birth and death certificates, and other types of personal and socio-economic data
  • Crowdsourced data - applications that actively involve a wide user base in order to solicit their knowledge about particular topics or events

Can the cloud be of assistance when you’re in a crisis? Cloud-enabled crisis/incident management service from IBM may be just what you need to protect your business. IBM Resiliency Communications as a Service is a high availability, cloud-enabled crisis/incident management service that protects your business by engaging the right people at the right time when an event occurs, through automated mission-critical communications. The service also integrates weather alerts powered by The Weather Company into incident management processes to provide the most accurate early warning of developing weather events and enable proactive response



This post was brought to you by IBM Global Technology Services. For more content like this, visit ITBizAdvisor.



Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2017)



read more

Cloudy Thinking and Digital Transformation | @CloudExpo #DX #Cloud #Analytics

$
0
0
There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive. Cloud computing as a mission transformation activity, not a technological one. As an organization moves from local information hosting to the cloud, one of the most important challenges is addressing cloud computing as a mission transformation activity, not a technological one. Cloud computing isn't a new technology. It's a new way of consuming and provisioning information technology services. Adopting cloud computing means paralleling your mission processes, rethinking the economic models and abstracting your applications from the technology stack silos, which are currently the norm.

read more

Managing Your Hybrid Cloud | @CloudExpo #AI #ML #Cloud #Cognitive Computing

$
0
0
Runaway cloud computing cost may be causing an information technology industry crisis. Expanding requirements, extended transition schedules and misleading marketplace hype have made “Transformation” a dirty word. Questions about how to manage cost variances and deviations with assets and cost across different suppliers abound. A recent Cloud Tech article explained that while public cloud offers considerable cost savings in comparison to private or on-premises based alternatives, there may also be significant hidden costs. Operational features like auto-scaling can cause costs to soar in line with demand for resources, making predicting costs difficult and budgeting even harder. There is also an acute need for a holistic and heterogeneous system that can track the costs of cloud services from the point of consumption (e.g., an application or business unit) down to the resources involved (e.g., storage or compute service).

read more

American Airlines Adopts Public Cloud Computing | @CloudExpo #AI #Cloud #Analytics

$
0
0
Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the 1960’s it was designed to process a large numbers of transactions quickly. Although IBM is still updating the code, the last major rewrite was about ten years ago. With all the major technologies changes since then, it’s clear that IBM has already accomplished a herculean task by keeping an application viable for over 50 years!

read more

ATMs Are IT Too | @CloudExpo #ITaaS #Cloud #FinTech

$
0
0
That world of homogenous IT technology managed entirely by the internal IT organization has long disappeared. Operations today require efficient and global management of technologically heterogeneous environments. The challenges and mistakes organizations make when tackling this important task include: operational disconnects caused by ineffective internal communications; resource contention when multiple, independently developed project plans compete; incompatible technical documentation; and inconsistent communications with vendors.

read more

Digital Transformation Asset Management | @CloudExpo #DX #Cloud #Analytics

$
0
0
Today’s businesses run in the virtual world. From virtual machines to chatbots to Bitcoin, physical has become last century’s modus operandi. Dealing with this type of change in business even has its own buzzword – Digital Transformation. From an information technology operations point of view, this has been manifested by organizations increasingly placing applications, virtual servers, storage platforms, networks, managed services and other assets in multiple cloud environments. Managing these virtual assets can be much more challenging than it was with traditional physical assets in your data center. Cost management and control are also vastly different than the physical asset equivalent. Challenges abound around tracking and evaluating cloud investments, managing their costs and increasing their efficiency. Managers need to track cloud spending and usage, compare costs with budgets and obtain actionable insights that help set appropriate governance policies.

read more

The Endpoint Imperative: IT Spending: Setting Priorities in a Volatile World

$
0
0



Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user computers with Microsoft Windows 10. In “The Endpoint Imperative,” a podcast series from Intel, learn from the experts how hardware and software together make for optimized security.

In Episode 1,"IT Spending: Setting Priorities in a Volatile World," Intel’s Kaitlin Murphy talks PC refresh, security, and productivity. Here she also addresses the key trends that drive IT spending decisions. As Director of Marketing for business clients with Intel, Kaitlin leads the business client marketing organization responsible for mobile and desktop platforms, vPro, Intel Unite, and other products.]

Kevin L. Jackson: Let’s get started. Kaitlin, IT spending is up and this is being driven by cloud computing digital transformation. What could this mean to Intel?

Kaitlin Murphy:Digital transformation is really the changes associated with applying digital technology to people. In the case of my group, it's about businesses and employees, the end user, IT, facilities, and even other groups. Digital transformation touches all of the aspects of a business like, smart office or smart workspaces. How do you make your environment aware and then have it take action on your behalf?

Kevin L. Jackson: Can you give us some examples of this?

Kaitlin Murphy: Sure. This could be something as simple as air conditioning. When the room's unoccupied, the air conditioning is off, but when it sees somebody come in, it knows to adjust the temperature to their preference. It could even be something more complex like, the room knows who you are and it can contextually retrieve information based on your conversation in real time, knowing that you're allowed to access that information.

 (When viewed on a mobile device, please press select "Listen in browser")


Kevin L. Jackson: That's amazing. One of the real key driving components of this spending has been the personal computer or PC sales. This is also driving the PC refresh cycle. Can you talk about those drivers and their impact on organizations?

Kaitlin Murphy: Absolutely, totally agree. PC refresh or PCs, in general, are a huge piece of digital transformation. Today, it's heavily influenced by a variety of things, one of which is security manageability. In general, a newer PC with a newer operating system is more secure and more manageable. That means less burden on IT resources, lower lifetime costs, and higher employee productivity and satisfaction. Having performane, secure, managed up to date devices is critical for a business of any size. Not only does it help with the items we talked about above but more and more that we're seeing in a company that has a digital transformation strategy is better able to attract and retain the target talent that they want. It literally affects every single aspect of a business.

Kevin L. Jackson: Let’s zoom in on security. How do you see that factoring in on the spending decisions?

Kaitlin Murphy: The corporations are a major target for bad actors. Literally, in one place you've got the crown jewels. You've got IP. You've got customer information. You've got employee information and more. Because of this, companies have to have a comprehensive security strategy in place and then the products to execute that. Part of the executing their strategy means having secure PCs. Like we mentioned before, newer PCs are typically more secure and that's for a variety of reasons. First, you've got the latest and greatest technologies and solutions and the PC ecosystem behind it. Second, with an older PC bad actor have simply had more time to find the holes and to exploit them.

Kevin L. Jackson: It really seems like you’re focusing on the PC instead of the data center. Why is that?

Kaitlin Murphy: You need to focus on both. You're right, the PC is a critical piece. One thing that not everyone knows, is that when an attack is launched on an enterprise the most common route into that company is through the endpoint. What happens is a bad actor captures the credentials of an employee and they can access their PC. When they can access the PC, they can access all the data on that PC. Typically, any place that PC is authorized to access as well. Newer PCs have solutions to help minimize this risk.

You can protect your credentials and hardware, for example, so they're harder to be spoofed or otherwise exploited. When we look at IP support desk calls, the one type of call that's grown the most in the past years' security-related incidents, like viruses or malware. These incidents place a resource burden on the company, not to mention the security risk. IT now has to make a decision. Is the cost of that older PC protecting it, securing it plus the safety risk worth more or less than just buying a new PC that has new security?



Kevin L. Jackson: Now, let’s zoom out to 18 or 24 months from now. What considerations do you see impacting IT budgets, especially, the spending on PCs and other endpoint devices?

Kaitlin Murphy: Well, while technology moves quickly, sometimes, it often moves a little bit slowly as well. I think the trends we talked about today are very firmly entrenched and the ones that we're going to continue to see in the next 18 to 24 months, security, manageability, even the value of local compute performance will all be relevant.

Kevin L. Jackson: [chuckles] Wait a minute. Why do you have to worry about local compute? Everyone's going to the cloud.

Kaitlin Murphy: Local compute's going to continue to be important. There are some things you just don't want in the cloud and some things you can do better locally, not to mention that when you have performance on the endpoint you can run some of these security solutions we've talked about today. I also think there's a trend around security innovation and that's definitely not going anywhere. Look at Off Network Solutions and Loan. The average US company has to use six different endpoint solutions just to secure a single device.

There's also a lot of trends around unified endpoint management. How can an IT organization manage its entire fleet, but usually at this point is more than one PC per person with a single set of tools? This coupled with more ambient compute devices, think of workplace transformation, devices that don't necessarily have a dedicated user, are going to increase the need for a single out of band management solution. The reason why I say out of band management is because you need to be able to manage your device regardless of OS State.

Especially as organizations become more geographically dispersed, it is increasingly important. Collectively, it seems like there's going to be a continued strain of IT resources. Budgets might be up but they aren't necessarily keeping pace with the number of new trends that IT have to track, make decisions on and execute against. This is going to pose an important question and decision for IT, on how to best allocate the resources to serve both as strategic and operational initiatives in the organization.

Kevin L. Jackson: Unfortunately, we are at the end of our time for this episode but thanks to Kaitlin Murphy with Intel, for her insights and expertise.


( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2016)



read more


The Endpoint Imperative: Global Security Compliance. Are you ready?

$
0
0


China has its Cybersecurity Law. Next May, the General Data Protection Regulation– or GDPR –goes into effect for the European Union. Research shows most organizations just aren’t ready for these and other measures.

Tune into this episode of “The End Point Imperative: A Podcast Series from Intel,” to hear from Intel’s Yasser Rasheed, Director of Business Client Security on how a combination of protection at the hardware and software level can help organizations gain compliance and avoid breaches, fines, and financial impact.

Kevin L. Jackson: Hi everyone and welcome to this episode of the Endpoint Imperative. A podcast series from Intel. My name is Kevin L. Jackson and I'll be your host for this series. The topic for this episode is "Global Security Compliance. Are you ready?" With me is YasserRasheed, director of Business Client Security with Intel. Yasser, welcome.

Yasser Rasheed: Thank you for hosting me today. I'm very excited for this talk.

Kevin L. Jackson: It's really our pleasure. Let's get started on this. The security world is really abuzz. We talk about GDPR or the General Data ProtectionRegulation. This is Europe's looming security regulation. Can you tell us a little more about it?

Yasser Rasheed:Absolutely. You know Kevin, the industry is shifting and evolving very quickly in this space. We're excited about the positive changes taking place in the industry. The GDPR or General Data Protection Regulation coming out of Europe is really a replacement for the European directive that they had in the past. It covers a whole slew of data protection and security regulations that allows - but really caters to protecting the end user and the end user data.

Kevin L. Jackson: I understand it's really the hefty fines that have the information security officers worried. I'm told that they can be the greater of either 20 million Euro or 4% of global annual revenues. Why is this putting the spotlight on security and compliance in North America? I thought this is a European thing, right?

Yasser Rasheed:It is not a European thing only. It affects anyone that deals with the European citizens or in business in Europe so global companies are really impacted by this regulation and they need to pay attention to it.



Kevin L. Jackson: This is really important to you. From your point of view, at the IT and operations level, what should these companies be really focused on?

Yasser Rasheed:The companies need to first get educated on the new regulations. It is going to be applicable in May or enforced starting May 2018. It is really coming very soon. The GDPR regulation is really a legal framework that comprehends a number of data security and privacy guidelines for organizations. For example, they need to make sure that they look at how the data is processed, how the data is protected. Who gets access to the data at what point in time and under what tools? Is everything audited and logged in the right way so that they can have the right traceability. There are a number of things that the organizations and especially IT and chief information security officer teams need to pay attention to in this case.

Kevin L. Jackson: With all that in mind, what should these enterprises be thinking about when it comes to data protection at the hardware and the software level?

Yasser Rasheed:That's a great question. First, let's head back and look at what's happening in the industry nowadays. The whole space of cybersecurity is full with hackers and really malicious users trying to get access to information and this is impacting everyone. We see breaches every day. Solutions today are available in software, however, we believe that the software alone cannot protect and cannot enforce the level of readiness for GDPR and the likes. What we really look for is the role of the hardware to augment and compliment the role of the software in the space. More specifically in the security space, there are many hardware products that companies like Intel is offering in this space to protect the identity of the user, to protect the data of the user. These are tools that our key organizations can take advantage of to be ready for GDPR compliance and in general, to have a more healthy and stronger security posture in the environment.

Kevin L. Jackson: Thank you very much for sharing that important point. Unfortunately, though, we're at the end of our count for this episode. Many thanks to Yasser Rasheed with Intel for his insights and expertise.

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2017)



read more

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

$
0
0
Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.

This episode of the “The Endpoint Imperative” podcast series from Intel, Kevin L. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users.

Kevin: The topic for this episode is,"The Perimeter is Dead, Long Live the Perimeter". With me is Yasser Rasheed Director of Business Client Security with Intel. Yasser welcome back.

Yasser: Hi Kevin, happy to be back.

Kevin: This time, however, I'd like to really talk to you about this security perimeter thing. Cloud mobility and the internet things have really obliterated what I've always referred to as the wall and moat security paradigm, where working inside the enterprise was safe but working outside of the company's walls wasn't. What's pending impact of this evolution?

Yasser: You know Kevin nowadays with the cloud and mobility trends, we as end users we take our devices and work anywhere and everywhere at anytime. We take our laptops and work from home or from a coffee shop or on the go during the trip. The new shift here is really making us re-think how we protect the information that we have access to. The concept or the traditional concept of protecting at the perimeter with the traditional firewalls and gateways is really non-existent anymore. When I'm using my laptop at a coffee shop, I am no longer going through a firewall to access a cloud service. It's imperative for the industry to re-think the concept of listening at the perimeter level from a security perspective.

Kevin: Did the IT team miss the boat with getting a grip on the management of security within this new business ecosystem of today?

Yasser: From my perspective, it's not about missing the boat as much as the industry is moving and evolving very fast and IT organizations, more specifically information security organizations, need to cope with this evolution, and in certain cases may need to be ahead of it. At the same time, by the same token, that evolution is giving an advantage to the hacker community, to the bad guys really, to take advantage of the shift and attack the endpoints. Attack the end users, grab the data, steal the data or lock it in and ask for ransom.

Kevin: These new approaches to information technology have really changed the traditional workplace. Yasser how are IT leaders balancing the benefits of cloud and mobility, things like productivity and accessibility, with the obvious security challenges?


Yasser: Great question Kevin. We know that end users especially the new generations of end users focus tremendously on the ease of use and the productivity, and don't want to be burdened with additional security processes that they don't really comprehend. It's imperative for the IT leaders and information security leaders to balance end-user productivity, the simplicity of integration for IT and the productivity end-user experience for end users. The only way for the industry to evolve and achieve the right level of protection is with the right balance. This is not an easy job to do, however, it's the only way for the industry to keep moving in this direction.

Kevin: Do you have any advice on how to make security everybody's job in this new normal?

Yasser: Great question. The first thing I advise everyone is for the leaders in the IT and information security industry to educate their teams and their end users. Education is king. We need to first educate them and get them to the level of comfort with the simple attacks like phishing and how scams happen. More importantly, IT organizations and information security organizations need to focus on four priorities. The top one is identity protection. That is really protecting against identity breaches which today constitute 80% or more of the total number of breaches. The second priority is to protect the data. Data protection is really an imperative because the data is the asset that the attackers are going after. The third priority is about detecting and preventing threats, especially the new and advanced threats that we see nowadays where signature-based detection of viruses is no longer sufficient, it's necessary but insufficient. The fourth and last priority is the ability to recover quickly from an event of a breach. The breach is a matter of when it happens, not if it happens, and organizations need to be ready recover quickly to a good level of productivity. These are the four priorities that I recommend the industry to focus on, and more importantly, apply the new techniques based on hardware-based security as opposed to traditional software-based security that is no longer sufficient in this space.

Kevin: With that sound advice we've come to the end of our time for this episode. We really want to thank Yasser Rasheed with Intel for his insights and expertise.

Yasser: Thank you, Kevin, it was a pleasure to be here.

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2017)



read more

Top 1000 Tech Bloggers

$
0
0
The Rise "Top 1000 Tech Bloggers" leaderboard recognizes the most inspiring Tech journalists and bloggers active on social media. They use Klout scores (50%) and the blogger's twitter conversations on "tech" (50%) to rank these leaders on their social media influence. The first 100+ tech writers and bloggers on this board were picked from a Twitter search.  The board curator's goal is to grow this to 1000+ names and make it the definitive go-to list for people to find who they can follow to get all tech news and analysis.

This Week's Top 5!




If you are a tech blogger creating fresh content regularly but not on the list already, visit the site and join the list. If you would rather nominate nominate someone, please send an email to support@rise.global with your nomination's Twitter handle.

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2016)



read more

IBM - The Power of Cloud Brokerage

$
0
0
Hybrid cloud adoption is now mainstream and you are making decisions every day about how to transform application and infrastructure architectures, service delivery, DevOps, production operations and governance. With Cloud and Systems Services you rethink how technology can be used to give you more power than ever before.

Cloud and Systems Services, part of IBM Services Platform with Watson, are infused with automation and cognition so you stay ahead of the needs of your every-changing business.







To lean more or to schedule 30 mins to discuss your Enterprise IT issues, click here: https://ibm.co/2g7lHR3



This post was brought to you by IBM Global Technology Services. For more content like this, visit Point B and Beyond.







Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2016)







read more

More SMB Love Needed | @CloudExpo #API #Cloud #BigData #Analytics

$
0
0
In a recent post, titled “10 Surprising Facts About Cloud Computing and What It Really Is”, Zac Johnson highlighted some interesting facts about cloud computing in the SMB marketplace: Cloud Computing is up to 40 times more cost-effective for an SMB, compared to running its own IT system. 94% of SMBs have experienced security benefits in the cloud that they didn’t have with their on-premises service

read more

Cloud Collaboration Reaches New Heights for Fujitsu and Citrix | @CloudExpo #VDI #Cloud #Virtualization

$
0
0
Long-term partners Fujitsu Limited and Citrix Systems Japan have announced a new virtual desktop service based in the cloud. Designed to take some of the pain out of digital transformation, the new offering makes it easier to create digital workspaces in a secure manner that’s scalable. The Fujitsu Managed Infrastructure Service Virtual Desktop Service VCC (Virtual Client on Cloud) employs the Citrix suite of virtual desktop infrastructure products, including Citrix XenApp, Citrix XenDesktop, and Citrix ShareFile. The two companies have been working together in the VDI space for decades, but this new agreement enables Fujitsu to sell the new service.

read more

The Data Storage Explosion | @CloudExpo #Cloud #BigData #Storage

$
0
0
Cloud computing innovation will power enterprise transformation in 2018. Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity. The business reason behind this marketplace reality is the proliferation of real-time data from the web, mobile devices, social media, sensors, log files, and transactional applications. Big Data has also found a home on the operational side of many market verticals in applications ranging from fraud detection to the processing of video evidence.

read more


Digital Transformation Drives Mainframe’s Future | @ExpoDX #DX #FinTech #Blockchain

$
0
0
Digital Transformation is amplifying mainframe as mission critical to business growth more than ever before. With 70% of the world's corporate data and over half of the world's enterprise applications running on mainframe computers, they are at the core of just about every transaction. A single transaction can, in fact, drive up to 100 system interactions. The continued increase in mainframe transaction volumes, growing on average 7-8% a year for 78% of customers, has even led to a new buzzword: The Connected Mainframe.

read more

Industry Verticals Tackle Unstructured Data | @CloudExpo #Cloud #BigData #Storage

$
0
0
Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email, images, and videos. Storage of this form of data is typically in an object format which differs significantly from the database norm. Databases housed data grows very slowly because most of it is structured. Object storage formats are now being used to optimize access to large amounts of non-transactional files across a growing number of vertical markets.

read more

Top "Cloud Musings" Posts For 2017

$
0
0











( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2017)



read more

The Endpoint Imperative: ID’ing and Overcoming the Stumbling Blocks to Digital Transformation

$
0
0
Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices. Intel’s Kaitlin Murphy has some pointers to assure that your PC fleet and mobile devices are not your Digital Transformation Stumbling Blocks.

Kevin: Hello everyone and welcome to this episode of "The Endpoint Imperative" podcast series from Intel. My name is Kevin L. Jackson and I'm your host for this series. This episode's topic is identifying and overcoming digital transformation stumbling blocks. With me is Kaitlin Murphy, director of marketing for business clients at Intel. Kaitlin it's great to have you back.

Kaitlin: Thanks, I'm glad to be back.

Kevin: In my last episode I was talking with Yasser Rasheed, and he told us about how the IT security model is changing. Earlier you had talked about even more than that is changing, and that the PC is at the center of what's being called digital transformation. Can you tell us more about that?

Kaitlin: Sure. One of the core tenets of digital transformation is building in digital environment, where employees can work wherever they want, whenever they want, and however they want. To some degree that means using the technology they want, which includes the PC. The PC is a very personal device and it's heavily relied upon on a daily basis. In fact, there was a recent global survey that said 95% of respondents chose the PC if they could only have one device to use during the workday. So, for lots of employees the PC is the thing that they need to be productive. It's literally the gateway to access everything. The tools, the apps, and data and then to be able to do things with it, not to mention communicate with others.

It isn't just a consumption device, it's a creation device too. And with each generation of new platform, new features, new enhancements are introduced, and they help employees to be able to perform the way they want. Delivering performance improvements and security improvements too. It also benefits IT and they've realized the importance of prioritizing the new devices in the transformation, so that they can take advantage of those capabilities.


Kevin: Can we zoom in on this migration to Windows 10. What does that mean to the organizations in their digital transformation?

Caitlin: The moving to Windows 10 a new hardware is one of the quickest and easiest ways to take advantage of the best of both worlds. New hardware in conjunction with the new software delivers the best performance, the best security, and ultimately the best experience, both for end users and for IT organizations. And Intel powered devices are a great way to unlock that premium performance, for things like mobility, touch and workloads. Think about battery life, you can literally have a battery that lasts you all day. You're not tethered to your desk or to a power cord. Then there's multitasking. We all multitask, and the performance today allows people to be running multiple things at the same time and not be slowed down.

Not to mention there's huge enhancements with the introduction of Windows 10. Just think of the optimization in 365 and all the touch capabilities. Especially with the tight development relationship between Intel, Microsoft and OEMs you just can't find a bunch of well integrated devices to meet their needs and how they want to work. Like the two in one options, they have dials and touch and they can use a bunch of different modality based upon what the person is trying to do and how they feel most comfortable doing it.

Kevin: It sounds like a lot of new capabilities for the end users, but what is the biggest challenge you see facing organizations as they ramp up for this transformation?

Kaitlin: For any large-scale transformation is difficult, right? It's complex and it takes time. Not just time to execute but time for the people to adjust as well, and the culture. One big issue we hear about is the proliferation of more devices. How do you secure and manage all of them? So, think about it. Digital transformation is anchored in PC's but it's actually a lot larger than that. It's about building that digital environment. In doing so also involve deploying ambient compute, things like sensors from lighting temperature control, or intelligence in the conference room so that meetings it can start faster and deliver improved collaboration capabilities. Each of these pieces of compute has to be maintained right, both security managed, and that presents a challenge.

Kevin: Wow, sounds like the digital transformation can be really hard for the organization. But now we're out of time for this episode. I'd like to really thank Kaitlin Murphy with Intel, for providing us her insights and expertise. Thanks.

Kaitlin: Thank you.


( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)


Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2017)



read more

Cloud Storage 2.0 Set to Dominate Market | @CloudExpo #GDPR #Cloud #Storage

$
0
0
The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important. Before 2007 and the birth of the cloud computing market we are witnessing today, the on-premise model hosted in large local data centers dominated enterprise storage. Key marketplace players were EMC (before the Dell acquisition), NetApp, IBM, HP (before they became HPE) and Hitachi. Company employees managed information technology resources (compute, storage, network) and companies tightly controlled their data in facilities they managed. Data security, legal and regulatory concerns, for the most part, were very localized. The data itself was highly structured (i.e., Relational Databases and SQL) in support of serially executed mostly static business processes. This structured approach worked because consumer segments in most industries were homogeneous, segregated and relatively static. Companies also felt relatively safe in their industry vertical due to the high financial and operational barriers prospective new competitive entrants would face.

read more

Viewing all 477 articles
Browse latest View live