Tracking the Megatrend of Cloud Computing
There are seven key MegaTrends driving the future of enterprise IT. You can
remember them all with the helpful mnemonic acronym CAMBRIC, which stands
for Cloud Computing, Artificial Intelligence, Mobility, Big
Data, Robotics, Internet of Things, CyberSecurity.
In this post we dive deeper into the first of these trends, Cloud Computing.
We succinctly describe Cloud Computing as the scalable delivery of
computational resources. Models of cloud compute include public clouds,
private clouds and blends in between. Architectures are in place now that
leverage tiers of clouds that can exist in multiple sizes and locations,
including homes, businesses and datacenters.
A snapshot of the trend right now indicates:
Efficiencies of this architecture are driving compute costs down. Commercial
Cloud Computing providers are know widely know... (more)
#AppleVsFBI – #FBIVsApple – The Basics, Explained, with Links to Original
This post provides an update on the ongoing battle between Apple and the
U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police
after the horrific massacre in San Bernadino on December 2, 2015.
It is just days before the March 22, 2016, hearing in this long-running,
highly publicized dispute between the FBI and Apple, with the FBI’s demands
of Apple being variously termed “jailbreak,” put a backdoor into, brute
force access, compromise security of, or any number of other descr... (more)
Editor’s note: This post by Sean Lawson provides context on cyber
conflict, an area of interest at the nexus of national security and
technology. – bg
Recently, Dr. Thomas Rid of the War Studies department of King’s
College in London published an article in the Journal of Strategic Studies
titled, “Cyber War Will Not Take Place.” Rid’s essay relies upon a
definition of war taken from the work of Carl von Clausewitz to assess
whether cyber attacks can be accurately described as “stand-alone” acts
of war. His conclusion is that we have yet to see any cyber attacks that, on
The 2016 Big Data Prediction: Which of These Two Types of Organization Will
You Be In?
By Katie Kennedy
Today, there is countless data collected and analyzed by companies. Just a
few years ago, that data was useless, now data is collected and used to
provide answers and solve problems.
As Big Data use cases continue to evolve, there will be an increasing number
of business missions that will be served by new approaches to data. With the
adoption of an enterprise data hub, developers are finding new agility to
create services and applications, as well as decision-making that leads... (more)
Thanks to the professional, virtuous work of security researchers Chris
Valasek and Charlie Miller and some fantastic reporting on this research by
Andy Greenberg of Wired Magazine, we have long known that theoretical hacks
against cars are no longer theoretical. They are real. Many connected cars
can be hacked and they can be hacked from long distance. And the threats
include threats to safety.
The publicity brought to these issues was incredibly important and helpful.
Zero action would have occurred without it.
Now, almost a year after the research was initially published, the... (more)