We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) irreversibly encoded.
In his session at @ThingsExpo, Peter Dunkley, Technical Director at Acision, looked at how this identity problem can be solved and discussed ways to use existing web identities for real-time communication.
“Matrix is an ambitious open standard and implementation that’s set up to break down the fragmentation problems that exist in IP messaging and VoIP communication,” explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it’s high time we start thinking the way these thieves think. If we don’t, malware, rootkits, AETs and other nefarious threats will continue to undermine our sense of security.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of disruption that could fundamentally reshape the function of IT forever.
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the industry’s first all flash version of HyperConverged Appliances that include both compute and storage in a single system, and Storage Nodes that provide external storage and work with any Windows servers and the HyperConverged Appliance, all driven by Gridstore’s patented software. Gridstore software architecture delivers native Windows integration, per-VM I/O control, and elastic and independent scaling of resources. Benefits include easy deployment, predictable and controllable high performance, scaling that fits your needs, and up to 50% lower TCO. Headquartered in Mountain View, CA. its products and services are available through a global network of value-added resellers.
I just published a series of 2015 cloud predictions, as have many fellow bloggers. So to complement these predictions let me offer my 2013 and 2014 predictions, along with 2015. I’ll let you decide which ones I got right and which ones I missed as we look to 2015: Dec 2012: Top Five Cloud Predictions for 2013 Hybrid […]
Increased Security: Perhaps the most controversial benefit of SDS is that it offers increased security. Hardware enthusiasts will argue that there is nothing stronger than the sticks and bricks of the physical data center and the metal of the hardware devices. But this is not necessarily so. Mathematics, and especially when mathematical proof is available, is more resilient than hardware. And some companies, with limited resources, cannot create the kind of physical security that SDS offers.
With the holidays last week, chances are you weren’t able to stay up-to-speed on all of the industry news. Here’s a quick tech news recap of articles you may have missed from the week of 12/22/2014.
Tech News Recap
North Korea’s internet went down for 9 hours before being restored. Salesforce introduced its file sharing service. Microsoft and Google joined in the opposition against hotels attempting to block wi-fi. Disney world now accepts Apple Pay and Google Wallet. Security breaches continue to impact retail stores in the US.
Looking for more resources? Download this checklist with tips for datacenter moves or this guide about visibility and control in a virtual infrastructure.
By Ben Stephenson, Emerging Media Specialist
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. With the concept of Fog Computing, where by the network locally analyze the IoT data and take a decision on what data to be passed on to cloud. It’s a concept called fog computing. And Cisco makes it possible today with the Cisco IOx platform. Cisco IOx takes the best of Cisco IOS Software capabilities, combines them with compute, storage, and memory at the network edge.
I’ll explain the difference between two major categories in in-memory computing: In-Memory Database and In-Memory Data Grid.
A few months ago, I spoke at the conference where I explained the difference between caching and an in-memory data grid. Today, having realized that many people are also looking to better understand the difference between two major categories in in-memory computing: In-Memory Database and In-Memory Data Grid, I am sharing the succinct version of my thinking on this topic – thanks to a recent analyst call that helped to put everything in place