October 13, 2014

GE: We’re going all-in with the public cloud
I’m not a big fan of using the word “internal” cloud, because internal is really, in my opinion, well-orchestrated virtualization that people are calling cloud for marketing purposes. But as an operating model, yes. We have internal platforms that drive those same cloudlike behaviors. We have what EMC or one of those guys would call a private cloud when they're selling you one. But our vision is: We think that that’s a stopgap. We think it’s a temporary solution. Frankly, we think even the hybrid cloud is really a temporary solution. I think there could be some good debates over how long you mean when you say "temporary."


Kaiser Permanente: The Rise of the 21st Century Health System
Technology helps us form those tight bonds with our members that are essential to promoting good health. Several years ago we set up an online service, My Health Manager, to enable members to connect with their healthcare providers and health information. More than 4.4 million members are registered. Last year, members used My Health Manager to view more than 26 million test results, send more than 11 million emails to care providers, refill more than 10.8 million subscriptions and schedule more than 2.8 million appointments. Members can access the system via our KP App on mobile devices. We call it “care anywhere.”


Connected Cars Vs. Cybercrime: Tough Fight
As the NHTSA notes in its report, cars built after 2009 have more than 60 independent electronic control units (ECUs) in them for controlling everything from heating and entertainment systems to steering, braking, and engine-monitoring functions. Each of these ECUs is accessible either through wired interfaces such as USBs and SD cards or wireless interfaces including Bluetooth, WiFi or near-field communications. Autonomous vehicles like Google's futuristic concept cars are likely to pack a lot more of such components.


Cybercrime fighters to target kingpins, says top EU cyber cop
Specialists in the virtual underground economy are developing products and services for use by other cyber criminals, the Internet Organised Crime Threat Assessment (IOCTA) report said. The report’s authors believe this crime-as-a-service business model drives innovation and sophistication, and provides access to a wide range of services that facilitate almost any type of cyber crime. As a result, the barriers to entry for cyber crime are being lowered to allow those lacking technical expertise - including traditional organised crime groups - to conduct cyber crime.


Buying enterprise mobility management: How important is independence?
Independence is one of the big themes for EMM players like MobileIron and Good Technology. These companies are focused on mobile management and that's all they do. In the EMM space, independence and focus are hard to find. Among big players EMM is either part of a bundle — VMware's AirWatch and Citrix Xen Mobile are likely to have an attempt at desktop virtualization cross selling — or neutrality with suites have to be proven over time. Will Microsoft really want to manage iOS and Android as well as it does Windows? BlackBerry manages iOS and Android devices too. But since both of those vendors have their own platforms the burden of proof is on them to show they're neutral.


IT industry group slams burdens imposed by proposed EU privacy policy
"There remain a number of weaknesses in the text that will result in unnecessary burdens on data controllers and processors, without any improvement in privacy protection," the group said. The amendment approved by the justice ministers also requires that businesses carry out an impact assessment of the risks associated with holding data, a process DigitalEurope criticized as complex. DigitalEurope also said the rules on sub-contracting data processing work were overly restrictive. Rules for employing data protection officers who are responsible for ensuring compliance with the law are "unwieldy and inflexible," the group said.


Network as a service: The core of cloud connectivity
NaaS, for a cloud network builder, is an abstract model of a network service that can be at either Layer 2 (Ethernet, VLAN) or Layer 3 (IP, VPN) in the OSI model. A cloud user defines the kind of NaaS that their cloud connectivity requires, and then uses public or private tools to build that NaaS. NaaS can define how users access cloud components, and also how the components themselves are connected in a private or hybrid cloud. The best-known example of NaaS in the public cloud space is Amazon's Elastic IP address service. This service lets any cloud host in EC2, wherever it is located, be represented by a constant IP address. The Elastic IP NaaS makes the cloud look like a single host. This is an example of an access-oriented NaaS application.


Database revolutions, reloaded
HP has pointed to three major innovation waves in database history. Starting out with mainframes, we know that these formed the bedrock of the first age of databases — and these were populated and popularised (and so of course refined) by government, the financial services industry, telecommunications — and here’s the interesting thing, these were the industries that used huge swathes of data back in the day. Today it’s all — high volume business transactions ... The second age of data was driven by OLTP. Online Transactional Processing (OLTP) Databases proliferated upwards at the same time the first glory days of client/server computing.


Extreme Networks acquisition breathes new life into company
Overnight, the merger resulted in the network solutions provider doubling in size, both in terms of revenue and portfolio. Extreme, which had struggled to retain a 1% share of the Ethernet switching market, suddenly leapfrogged many of its competitors. The consequences of this were significant; as a $300m company operating in the switching space, Extreme simply did not have the scale to effectively market its products. However, as a $600m company, Extreme ranks fourth in the worldwide market, according to Dell’Oro Group, and now has the necessary clout to start bidding for previously unattainable business.


Researcher makes the case for DDOS attacks
Sauter goes on in some detail with the penalties under Federal law for violating this act and, no argument here, they are extreme and excessive. You can easily end up with many years in prison. This is, in fact, a problem generally true of Federal law, the number of crimes under which has grown insanely in the last 30 or so years, with the penalties growing proportionately. For an informed and intelligent rant on the problem I recommend Three Felonies a Day by Harvey Silverglate. Back to hacktivist DDOS attacks.



Quote for the day:

"Learn to pause... or nothing worthwhile will catch up to you. Prepare your mind to receive the best that life has to offer." -- Anonymous