Todas las entradas hechas por Latest News from Cloud Computing Journal

Case Study: Cloud Transitions Done Right By @VIIAD | @CloudExpo [#Cloud]

Every successful company hits growing pains at some point along the way. One of the most harrowing for IT is the transition from the “build it quick!” startup mindset to the more structured and stable mentality of a mid-stage business.
For VIIAD Systems, a healthcare technology company that is reinventing how healthcare information flows, our transition from startup to mid-stage was marked by a transition from a physical, bare metal solution to a private cloud.
We had been experiencing an almost overwhelming influx of business over the last two years, which was both a blessing and a challenge. Like many small businesses, we had pieced together our infrastructure over the years, which eventually resulted in an expensive and “clunky” solution. Upgrading our systems was a daunting task, and we were concerned that any downtime to critical systems would be crushing to the business.

read more

The Cyber Security Maturity Model | @CloudExpo [#IoT #Cloud]

We continue to see an increasing trend in cyber-attacks in line with the growth of new technologies, and enterprises have to protect themselves. It is critical for enterprises to devise their own measures to protect against cyber-attacks because any tolerance on this front is more than an IT issue but may affect the very existence and the business model of the enterprise. We have seen in a recent incident where a cyber-attack prevented a large enterprise from performing their basic business process.

read more

Scalable Cloud-Based Video Surveillance Solutions | @CloudExpo [#Cloud]

Kenichi (Kevin) Mori is the director of Sony Electronics’ Security Systems Division, based in Park Ridge, New Jersey. He oversees business development and partnerships for the security group, which is part of Sony Electronics’ Professional Solutions of America group. He started his Sony career doing business-to -business sales and product marketing in China before moving to the security marketing division in Japan and then coming to the U.S.
SecuritySolutionsWatch.com: Thank you for joining us today Kevin. Before discussing Sony’s security capabilities in greater detail, please tell us about your background.
Kevin Mori: I am the director of Sony Electronics’ Security Systems Division, based in Park Ridge, New Jersey. I oversee business development and partnerships for the security group, which is part of Sony Electronics’ Professional Solutions of America group. I started my Sony career doing business-to -business sales and product marketing in China before moving to the security marketing division in Japan and then coming to the U.S. I received my Master’s degree in Australia and my Bachelor’s in Japan. Between my schooling and my career, I’ve learned and worked nearly everywhere in the world.

read more

Locking Down the Cloud By @ActiveState | @DevOpsSummit [#DevOps]

CIOs are increasingly concerned about cloud security. And they should be: with the recent outbreak of visible breaches at high-profile organizations like Target, Anthem, and others, and the subsequent damage they cause, corporations are scrambling to make sure their cloud applications, whether on private, public, or hybrid clouds, are safe.
But cloud security is complex. With ephemeral applications and services springing up around multiple data centers, with dozens or hundreds of independent microservices each with their own access mechanisms, with the widespread adoption of virtualization and the recent rampant frenzy over containerization, keeping on top of cloud-specific security vulnerabilities is a huge effort in itself.

read more

Internet of Things and Sensor Data By @HSmalltree | @ThingsExpo [#IoT]

There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. Learn about IoT, Big Data and deployments processing massive data volumes from wearables, utilities and other machines.

read more

Six Ways to Turn Freemium into Premium By @AriaSystemsInc | @CloudExpo [#Cloud]

“Free” reigns supreme when it comes to online marketing. But “pay” is more profitable to your bottom line. In the popular Freemium world of digital offerings, where free and premium content or services are offered, it’s prudent to consider how you will transition free offerings into paid subscriptions before you actually take that leap.

The conversion rate is all over the boards when transforming free into premium services. Industry averages have been reported anywhere from 0.5% to 5%. When it comes to profit, that’s a huge range.

read more

Cloud Orchestrator V5 Released By @Flexiant | @CloudExpo [#Cloud]

Flexiant, today releases the new look of Flexiant Cloud Orchestrator in its latest version to deliver a simplified experience for service providers and their end users. Using the latest design concepts, Flexiant has reduced complex common work processes into a few simple, wizard driven clicks. The result is a differentiated and easier experience for service provider’s customers helping to increase profit, revenue and growth from cloud services.

read more

The Emerging Science of Digital Forensics | @CloudExpo [#Cloud]

Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adoption of cloud, mobile and social media by enterprise organizations is opening a new threat landscape and new threat vectors. Everyone is affected and everyone is talking about it, from senior executives to teenagers.

read more

Should You Avoid DIY Private Clouds? By @MadGreek65 | @DevOpsSummit [#DevOps]

Our guest on the podcast this week is Mark Thiele, EVP of Data Center Technology at Switch.

We discuss the idea that private clouds are often equated with do-it-yourself and why that should be changed.

Taking sure you are receiving the private environment you need at a cost that can support your business.

Listen in to learn the different ways to own and manage a private cloud.

read more

Four Steps for Securing Your Data in the Cloud | @CloudExpo [#Cloud]

Cloud has become part of the enterprise landscape with nearly 90 percent of businesses having adopted cloud-based apps and services. However, organizations need to make sure that these cloud solutions don’t compromise the hard-won security policies that govern the rest of the information enterprise and are supported through IT.
As organizations shift to embrace popular cloud-based applications like Office 365, Salesforce, and other services that support the business, identity access management (IAM) solutions become crucial for maintaining productivity and security. Additionally, a single sign-on (SSO) solution that is deployed in conjunction with a solid IAM strategy streamlines access to thousands of cloud applications and enforces necessary security policies. It allows users to easily access the applications and services they need with a single click.

read more