Google launches ‘private on-ramp’ to its cloud with Dedicated Interconnect

Google has launched Interconnect Dedicated, a new service which aims to help organisations establish a private network connection direct to its cloud.

The service differs from its previous interconnect operation – now called Carrier Peering – with the direct link, while it differs from Google Cloud VPN, which securely connects on-premises networks to the Google Cloud Platform (GCP) virtual private cloud (VPC) network, through having a minimum deployment per location of 10 Gbps in bandwidth.

Interconnect Dedicated offers up to 80 Gbps – eight times the 10 Gbps increments, or in other words, selecting one to eight circuits from Google’s Cloud Console – and is available in up to 17 locations across four continents.

In the documentation, Google describes four benefits of Interconnect Dedicated, including the scalability factor. The company adds the cost of egress traffic from the VPC network to the on-premises network will be reduced – a dedicated connection is ‘generally’ the least expensive method with a high volume of traffic to and from Google’s network – while internal IP addresses are directly accessible from the on-premises network and there are less points of failure where traffic might get disrupted.

As is usually the case, a customer gets wheeled out to note the benefits of the product; in this case, it is real-time analytics firm Metamarkets. “Accessing GCP with high bandwidth, low latency, and consistent network connectivity is critical for our business objectives,” said Nhan Phan, Metamarkets VP engineering in a statement. “Google’s Dedicated Interconnect allows us to successfully achieve higher reliability, higher throughput and lower latency while reducing the total cost of ownership by more than 60%, compared to solutions over the public internet.”

Google’s cloud announcements have been coming at pace of late. Two weeks ago, the company unveiled variable networking tiers, claimed at the time to be the first from a major public cloud provider. According to Google’s most recent financial results, the company tripled the number of its big cloud deals, rated at $500,000 or more.

You can read the full blog post explaining Interconnect Dedicated here.

Main picture credit: Google

What’s the Equifax Data Breach?

Breaches have become more common than we like, and it affects almost every one of us when it happens at a major credit bureau. Yes, Equifax, one of the three largest credit bureaus in the U.S was hacked.

It is estimated that more than 143 million people have been affected by this breach, and this is almost half the U.S population. Since Equifax stores ultra-sensitive information like your social security numbers and date of births, this loss can be significant for you and for the nation as a whole.

Besides the social security numbers of 143 million, it is believed that the credit card details of more than 209,000 consumers and the credit dispute documents of another 182,000 are also stolen. The company has refused to give the number of drivers licenses that was exposed during this hack.

This breach was believed to have started in May and has continued until late July, according to a press release from the company. Hackers had stolen the data of millions of people through a website application vulnerability that had been present in Equifax, but remained unnoticed for a long time.

Equifax has declined to comment on the type of data that was hacked and what it plans to do to curtail the damage.

Unfortunately, there’s nothing much that Equifax can do about the stolen data. Since this was happening over a period of two months, much of this data would have been sold in the dark web world for thousands or maybe even millions of dollars.

The dark web is a network of hackers and miscreants who want to get such sensitive data, so they can manipulate it and use it for their own benefit. Going by this understanding, the social security numbers are one of the most coveted information as they can be misused for maximum gain. There’s always a possibility for these numbers to have been misused by now, so the damage is going to be fairly extensive.

But what Equifax can do is limit the damage and ensure that no more data is stolen through this vulnerability or anything else that may exist in its system.

This is sure to bring up a personal question – will I be affected? Most likely yes, unless you’re one of the lucky few.

What can you do?

For starters, enroll in Equifax’s identity protection program. Though it isn’t the greatest option, it’s still good as you get access to almost every available resource to protect your identity.  If you’re the lucky person and you were not affected, still you get access to a free one-year subscription in this program.

Also, request for a credit report to see if there are any suspicious entries in it. The federal government ensures that every person gets a three free annual reports every year from one of the three credit bureaus. So, make use of it.

If you notice any suspicious activity, reach out to the concerned bank or credit card authority and report a case of fraud.

Even if your report is clean, be vigilant and take measures to protect your credit.

The post What’s the Equifax Data Breach? appeared first on Cloud News Daily.

Is a #BigData Conference Like Going to the Dentist? | @CloudExpo #BI #IoT #SmartCities

I recently visited my dentist and found the experience, well, less than satisfactory. I was subjected to 45 minutes of lecturing while strapped into the dentist chair:

“You don’t brush enough times a day. You don’t brush long enough. You don’t brush correctly. You aren’t using the right type of toothbrush. You aren’t replacing the brush head soon enough. You aren’t flossing enough. You aren’t flossing correctly. You aren’t using the right type of floss.”

Good lord! It’s any wonder that my teeth aren’t just falling out of my head!!
No one likes being lectured. It’s not constructive and after a while, you just turn it off. That’s probably similar to the feeling of going to these Big Data conferences – constantly being told what you aren’t doing right. And maybe I’m guilty of doing that as well. If I am, then I’m sorry because from an audience perspective, it sucks.

read more

Speed in #DigitalTransformation | @ThingsExpo #AI #DX #IoT #SmartCities

The concept of speed as an advantage is not new. Over the course of 700 years, the Romans built and maintained a system of roads extending over 55,000 miles to enable speedy communications and the quick movement of troops across the vast expanse of the empire.
What’s different today is that digital technologies have warped our perception of time. As an example, a person might say they live five minutes from town, but that can have widely different meanings based on whether they were referring to walking or driving a car. Digital technologies compress our perception of time and space while expanding our expectations of what can be accomplished in a given time. We expect to complete the equivalent of one hour of shopping in a supermarket in one minute online. These changes significantly impact the way businesses must operate in a digital era to compete and remain relevant.

read more

Chatbots and AI – the FinTech Trends to Watch | @CloudExpo #AI #ML #Cloud #FinTech

Fintech is a lucrative, yet quite saturated market. In order to stay competitive, businesses should keep track of the emerging trends and be able to capitalize on them before their competitors do.
Artificial Intelligence is currently among the most promising fintech trends. Leading financial brands such as Capital One, MasterCard, as well as hundreds of startups have set the pace for the adoption of virtual financial advisors. If you want to stay ahead of your competition or simply explore the opportunities for AI in fintech, this article is for you.

read more

Passwords: What If Everything You Know Is Wrong? | @CloudExpo #Cloud #Cybersecurity

Every time there’s a notable cybersecurity breach, someone (even me) writes a comprehensive primer on the proper way to create “secure” passwords. Lather, rinse, repeat. Until a few years ago, everyone (including me) based their password advice on a 2003 paper from the National Institute of Standards and Technology (NIST), with the catchy title “NIST Special Publication 800-63.” The paper recommended that passwords be cryptic, contain special characters, and be as close to nonsense as possible.

read more

Cloud Monitoring Lessons Learned from Outages | @CloudExpo #Cloud #APM #Monitoring

According to this year’s Internet Trends Report, the cloud is steadily expanding and companies are spending more on these services. Businesses are opting to use these third-party services rather than build their own internal tool because they are often easier and less expensive to deploy. There’s no need to assign IT resources and purchase necessary hardware to deploy a new software solution, so the business unit can sign a contract and start using a solution almost immediately.

read more

This interactive map from Automic helps make the continuous delivery landscape clearer

Confused about the extent of the DevOps landscape? Fear not – a new map issued by business automation software provider categorises more than 150 products to help organisations compose a ‘coherent continuous delivery (CD) toolchain’.

The interactive map, as becomes clear on first glance, takes its cue from various subway systems around the world, which makes for a clearer look than the classic marketing technology landscape supergraphic, the most recent of which came in at a mind-boggling 5,381 solutions.

From cloud infrastructure and platform as a service, to NoSQL database providers, to messaging and collaboration, 19 ‘lines’ are provided, with a link to their website and a short description of what they do.

If the product is one Automic supports, such as VMware’s vCloud Air, there is a link to the marketplace page – you didn’t think this was truly altruistic, did you? – but as the company explains, there is a need to simply what is an ever-expanding market.

“Making sense of the huge variety and number of tools available for the modern software development process can be confusing,” said Chris Boorman, CMO of Automic in a statement. “The Continuous Delivery Map clarifies the role each of these tools plays within a CD context, and demonstrates how orchestration, which is at the heart of this guide, is critical to a successful modern software delivery practice.”

Plenty of research has reached this publication around how the benefits of DevOps are alluring to organisations, but not being fully acted upon. ‘More of the same’ was the headline of a piece back in March, when automation software provider Quali trawled around AWS re:Invent, Cisco Live, VMWorld, and more to discuss strategy with delegates. More than half (54%) of those polled said they had no access to self-service infrastructure, with the most cited tools being Jenkins, on the continuous integration line, and Docker, on the ‘containerology’ line.

Automic was acquired by CA Technologies in December last year for €600 million, with the latter’s various products, from Flowdock, to TDM, to Agile Central, pervading the map.

You can explore and take a look at the map here.

What Is Java #DevOps? | @DevOpsSummit #CloudNative #Serverless #AI #DX

DevOps sees the coming together of practices, philosophies, and tools that allow you to create services and applications very quickly. This means that you can improve on your apps and evolve them at a much faster rate than those developers who are using traditional software development processes. We’ve talked about DevOps, in general, a great deal, but today, we’re going to dig a little deeper and take a look at Java DevOps specifically.

read more

Demystifying Machine Learning | @CloudExpo #AI #ML #Analytics

Are machines really intelligent? Learn the answer and how it can affect your business. It’s machine-learning 101 for curious business leaders out there.
Autonomous cars taking us on our favorite and most efficient routes, virtual assistants serving up the exact data a doctor needs to diagnose an illness or that an engineer needs to identify a faulty part, customer support bots that are always available to answer your questions and book your appointments accurately and quickly. All of these use-cases are either here or will be soon, and they all rely on Machine Learning to be successful. But how do the machines learn? There’s a lot of market confusion out there, and it’s important to take a step back and understand what we’re talking about and why.

Mark Troester

?utm_medium=feed&utm_source=feedpress.me&utm_campaign=Feed%3A+progress-blogs

read more