August 27, 2015

The Challenges of IT Maintenance

ISOs provide a simple and elegant solution: a single point of contact for all of a 21st century company’s IT infrastructure requirements. These organizations operate globally, which means that companies that partner with ISOs will experience a consistent quality of service no matter where they are operating, or what kind of technology they are employing. In fact, by consolidating service contracts and streamlining IT maintenance processes, ISOs not only provide companies with reliable IT infrastructure sustainment, but also help their partners to enhance their own efficiency. Any global organization that requires hardware maintenance across a broad range of equipment makes and models will benefit from working with an ISO.


IoT For Automotive Deconstructed

The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a number of new IoT technologies over the next several years. One of the largest and most critical investment strategies will be in IoT security ... For anyone looking for more information on the innovative uses on how the Cloud, Big data, IoT can scale and connect can get a better idea of the potential below. IBM has produced an excellent infographic centered around the opportunities.


Navigating the big data maze

Understanding the potential value of data consumes a lot of analysts’ time. For instance, an analyst for an auto manufacturer seeking to streamline its manufacturing processes would likely endure many false starts when exploring the mass of information related to the engine building process, from poorly scheduled lunch breaks to disconnect between suppliers. Utilizing big data discovery solutions can sort information potential, with the most interesting attributes appearing first. In addition, analysts can easily experiment with different combinations of data to understand correlations, so they can rapidly determine whether the data set is worthy of more attention.


How to Build Your Own Hybrid Cloud

A big part of a hybrid cloud is the ability to replicate and distribute data. First of all, it’s important to understand what you’re replicating and to where. Many organizations deploy hybrid cloud platforms to help get applications and data closer to their user. Others use a hybrid cloud to control bursts and branch locations. Regardless, it’s important to know how data is being moved, backed up, and how it’s being optimized. Data replication can be a tedious process if not done properly. That said, it’s important to take security into consideration as well. Your data is a critical asset and it must be secured at the source, through the route, and at the destination. Fortunately, virtual security appliances and services can help make this process a bit easier.


The growing need for more women cybersleuths

"If you want to create a workforce ... you want to create a talent pipeline, you cannot simply ignore half the population," said Memon. Beyond the U.S., other countries are leaving fewer women behind when it comes to computer science and engineering. In both Malaysia and Indonesia, women earn roughly half of the computer science and engineering degrees, while only one-fifth of those same degrees are earned by women in the U.S. Not only can women fill the estimated nearly 210,000 vacant cybersecurity positions in the United States, they can also bring new perspectives.  "When you have a balanced team of both men and women, the teams are able to look at things a little bit differently and make sure that you're really looking at all causes, all effects and really get to the heart of the problem," said IBM Security's Westman.


4 smart ways to maximize data science interns' capabilities

If you're anything like me, you have mixed feelings whenever interns enter the equation. Who couldn't use more people to get things done, right? That said, how much disruption comes along with this brilliant idea? Well, that depends, but it's definitely not zero. Up until recently, data science teams have been reserved for the veterans — the brave, seasoned programmer/mathematicians who valiantly volunteered for the perilous role. However, the universities have quickly caught on, and they're rapidly minting fresh new data scientists who are eager to explore their new profession. That's where you come in to show them the ropes. Your boss thinks it's a good idea, and she's the only one that matters. It's up to you to make the most of the experience. Here are four key strategies for getting the most from your data science interns.


Paul Fremantle on Security in Internet of Things

This idea of security through obscurity is worse in the hardware world and we’ve seen this with the Xbox for instance. So, the Xbox got hacked, the security keys on it got hacked and then everybody had open access to the Xbox. So I don’t believe that a security by obscurity will work in this case, but at the same time I am not yet convinced that the community is mature enough to act as a community. So in the software world we’ve had open source for 15 years, we have a lot of people who contribute best practice to open source. In hardware opens source is a pretty new concept and I think a lot of the people who are manufacturing devices and building IoT systems are not there yet in terms of sharing their best practice and working as a community in the same way the software world is.


Ernst & Young, U.S. Government Introduce Anti-Hacking Tools

The first technology that will be transfered by EY is called PathScan, which detects abnormal activity on networks that indicates the presence of hackers. Uncovering hackers on networks has been a struggle for many companies. On average, attackers operate inside a victim’s network for more than 200 days before being detected, according to FireEye Inc., a network security company. PathScan is being tested at five companies and already proving valuable, according to EY. The firm believes the relationship with the lab will be successful because technology being transferred has market value and will be combined with its other services and expertise, MacDermott said.


IT ops seek the mythical 'single pane of glass' tool

Most systems administrators tell Donnie Berkholz, a development, DevOps and IT operations analyst at 451 Research, that there is no such thing as a single pane of glass that works for everyone. "The idea should be to provide a single pane for a specific [person] in a specific situation," he said. For example, there is one view that IT pros may want during normal operations versus a project to troubleshoot and look for a root cause. "There is absolutely a desire to have a unified view integrating multiple data sources, given those constraints," he said. It's a different view of the single pane of glass that takes the uses into account.


Create Modern Android Apps with the Design Support Library

With the release of Android 5.0, also known as Lollipop, Google introduced its new material design style. Material Design is a huge step forward for Android apps, bringing with it a total overhaul of theming, as well as a bunch of new UI components you can use in your apps. To make things even better, Google also released the Android Design Support Library, which allows you to take advantage of material design in versions of Android going all the way back to Android 2.1. ... Android has had the DrawerLayout component for some time now, which allows you to easily create "hamburger"-style menus in your apps. Hamburger-style menus have become ubiquitous in both Android and iOS in recent years.


Many firms not getting to grips with third-party data security risk

“A lot of effort is put into setting up the initial relationship, but organisations typically select a supplier that is low-risk to begin with and there is no provision for monitoring how or if that changes,” he said. Wilkinson said organisations need to recognise a lot can change after a supplier is first selected, which means low-risk suppliers can become high-risk over time. “This is not a back-office operation that can be set once and work well for the next five years – you have to continually re-evaluate and re-assess as things change,” he said. According to a Booz Allen Hamilton report, the majority of third-party risk incidents at an organisation are likely to occur in an existing relationship.



Quote for the day:

"Daring ideas are like chessmen moved forward; they may be beaten, but they may start a winning game." -- Goethe