R Gains Momentum

In case you missed them, here are some articles from June of particular interest to R users. The FDA goes on the record that it’s OK to use R for drug trials. A review of talks at the useR! 2012 conference. Using the negative binomial distribution to convert monthly fecundity into the chances of having a baby in a given time period. Some benchmarks and a video demonstration of big-data Tweedie models with Revolution R Enterprise. Why Orbitz’s R-based models present more expensive hotels to Mac users. How to convert a rugby score to an equivalent soccer score, with GAMs….

David Smith

read more

HP Spins webOS Team Off into New Company

Secrets never stay secret very long at HP, but this sounds more like a secret they want known.

HP is moving its webOS gang into a new semi-autonomous company called GRAM.

webOS Nation broke the story after it got its hands on a flyer and an internal e-mail penned late last week after an all-hands meeting by HP chief of staff
Martin Risau, who’s been responsible for the webOS Global Business Unit.

read more

EMC Reportedly Looking for Security (Acquisitions)

EMC has $5.65 billion in cash in the bank and Bloomberg says it wants to buy security software houses with it to fuel growth.

COO Joe Goulden told the wire service last month that security is the biggest area for potential acquisitions since the company already had “all the key parts we were looking to put together” in data storage.

He also said that security had to be “reinvented” for the cloud and that a bunch of start-ups are doing that very thing.

read more

Cloud Corner Series -The Networking & Storage Challenges Around Clustered Datacenters



www.youtube.com/watch?v=fRl-KDveZQg

In this new episode of Cloud Corner, Director of Solutions Architecture Randy Weis and Solutions Architect Nick Phelps sit down to talk about clustered datacenters from both a networking and storage perspective. They discuss the challenges, provide some expert advice, and talk about what they think will be in store for the future. Check it out and enjoy!

Cloud Corner Series -The Networking & Storage Challenges Around Clustered Datacenters



www.youtube.com/watch?v=fRl-KDveZQg

In this new episode of Cloud Corner, Director of Solutions Architecture Randy Weis and Solutions Architect Nick Phelps sit down to talk about clustered datacenters from both a networking and storage perspective. They discuss the challenges, provide some expert advice, and talk about what they think will be in store for the future. Check it out and enjoy!

Four Things You Need to Know About PCI Compliance in the Cloud

By Andrew Hay, Chief Evangelist, CloudPassage

Andrew HayAndrew Hay is the Chief Evangelist at CloudPassage, Inc. where he is lead advocate for its SaaS server security product portfolio. Prior to joining CloudPassage, Andrew was a a Senior Security Analyst for 451 Research, where he provided technology vendors, private equity firms, venture capitalists and end users with strategic advisory services.

Anyone who’s done it will tell you that implementing controls that will pass a PCI audit is challenging enough in a traditional data center where everything is under your complete control. Cloud-based application and server hosting makes this even more complex. Cloud teams often hit a wall when it’s time to select and deploy PCI security controls for cloud server environments. Quite simply, the approaches we’ve come to rely on just don’t work in highly dynamic, less-controlled cloud environments. Things were much easier when all computing resources were behind the firewall with layers of network-deployed security controls between critical internal resources and the bad guys on the outside.

Addressing the challenges of PCI DSS in cloud environments isn’t an insurmountable challenge. Luckily, there are ways to address some of these key challenges when operating a PCI-DSS in-scope server in a cloud environment. The first step towards embracing cloud computing, however, is admitting (or in some cases learning) that your existing tools might be not capable of getting the job done.

Traditional security strategies were created at a time when cloud infrastructures did not exist and the use of public, multi-tenant infrastructure was data communications via the Internet. Multi-tenant (and even some single-tenant) cloud hosting environments introduce many nuances, such as dynamic IP addressing of servers, cloud bursting, rapid deployment and equally rapid server decommissioning, that the vast majority of security tools cannot handle.

First Takeaway: The tools that you have relied upon for addressing PCI related concerns might not be built to handle the nuances of cloud environments.

The technical nature of cloud-hosting environments makes them more difficult to secure. A technique sometimes called “cloud-bursting” can be used to increase available compute power extremely rapidly by cloning virtual servers, typically within seconds to minutes. That’s certainly not enough time for manual security configuration or review.

Second Takeaway: Ensure that your chosen tools can be built into your cloud instance images to ensure security is part of the provisioning process.

While highly beneficial, high-speed scalability also means high-speed growth of vulnerabilities and attackable surface area. Using poorly secured images for cloud-bursting or failing to automate security in the stack means a growing threat of server compromise and nasty compliance problems during audits.

Third Takeaway: Vulnerabilities should be addressed prior to bursting or cloning your cloud servers and changes should be closely monitored to limit the expansion of your attackable surface area.

Traditional firewall technologies present another challenge in cloud environments. Network address assignment is far more dynamic in clouds, especially in public clouds. There is rarely a guarantee that your server will spin up with the same IP address every time. Current host-based firewalls can usually handle changes of this nature but what about firewall policies defined with specific source and destination IP addresses? How will you accurately keep track of cloud server assets or administer network access controls when IP addresses can change to an arbitrary address within a massive IP address space?

Fourth Takeaway: Ensure that your chosen tools can handle the dynamic nature of cloud environments without disrupting operations or administrative access.

The auditing and assessment of deployed servers is an addressable challenge presented by cloud architectures. Deploying tools purpose-built for dynamic public, private and hybrid cloud environments will also ensure that your security scales alongside your cloud server deployments. Also, if you think of cloud servers as semi-static entities deployed on a dynamic architecture, you will be better prepared to help educate internal stakeholders, partners and assessors on the aforementioned cloud nuances – and how your organization has implemented safeguards to ensure adherence to PCI-DSS.

 


The Online Data Backup Revolution

There is no doubt that in conjunction with online management and collaboration, online data backup and storage into the cloud has revolutionised the way organisations do business and in turn, these are reshaping the marketplace of business itself. This is part of the revolutionary change that cloud computing represents and is building a truly global market place where even small companies can trade throughout the world. A major benefit of this is that companies are no longer required to be confined to one physical office or location meaning employees can now be found scattered all over the world. In turn, this new “cloud marketplace” is brings increased opportunities for sales, as the global network enables connections with more and more companies and by extension, they are able to reach significantly more end users.

Until now all businesses have husbanded their data and controlled it as far as they can by keeping it exclusively on their own premises. The main change with the cloud is one of mentality; it’s now OK to have your data held and managed by someone else and the supporting economic justifications for doing so are now compelling.

To properly analyse this revolution and the drivers behind it we need to set this in the context of the way data has been backed up until now. Essentially backups are not a glamorous, high-profile task in any business and particularly in a small or medium-sized business, there is always something more pressing to do than to work on them. Consequently many businesses operate backup with processes that that are incomplete or in some other respect inadequate:

  • Critical data is not backed up or is backed up infrequently, putting recovery at risk.
  • Backup is a manual process based on tapes which are frequently over-written and seldom checked so consequently they may be impossible to read rendering the process pointless as restore is hopeless.
  • Backup processes rely on the expertise of one individual who may not be available if a recovery is needed.
  • Backups may be stored only locally, close to primary servers, putting the business at serious risk if that local site is compromised.
  • Backups may be taken off site but again this is a manual process reliant on human intervention.
  • Backups do not meet regulatory requirements or industry standards for data protection and retention

Most small and medium-sized business use some form of backup solution, however these solutions are typically time-consuming to operate, used inconsistently, or offer inadequate protection from disasters such as fires and floods. Lack of time, staff and expertise means many businesses have used a backup solution for years that is costly and/or out of date.

Here is where we see the true value of the online data backup revolution in delivering a quick and easy method of doing state of the art backup. Online backup aka “remote backup” delivers enterprise-class data protection to small and mid-sized businesses without the associated complexity and cost of management. Online backup runs as a service by sending backup data securely over the Internet to a highly available data center where it is held on highly available storage arrays which in turn are managed by data protection experts. High availability is a key element here; it specifically refers to redundancy built into the hardware and the data center such that any single part of the system can fail without losing either data or access to the data. So, every system will always have at least 2 power supplies, hard drives are held in arrays configured to allow for failure of individual hard drives and yet still deliver the data held on the array, data centers have redundant air conditioning systems, power feeds etc. In this way should your business suffer a disaster your data should be accessible at any time from any point in the world with internet access.

Like any cloud backup service, it should be self-provisioning with an administration console accessed on-demand through a Web browser. In this way the organisation eliminates the need to purchase hardware, manage complex installation, or manage software upgrades. The system adds new features seamlessly which are delivered automatically to all customers simultaneously. These services use a pay-as-you-go model based on storage usage with some optional cost features and the monthly or annual subscription fee includes 24×7 support. Most providers deliver an elastic service meaning customers may adjust usage up or down without penalty and costs are predictable.

The automated nature of online backup services delivers “always-on” protection with backups either triggered by file changes or run to a schedule, which means they eliminate the requirement for staff to perform manual backups or manage storage media. Once the initial backup has been performed, only block-level changes are sent over the Internet, which means bandwidth is used efficiently.

Online Backups run on all computers in your company – not just the file servers and even laptops not connected to the office network full-time can be backed up. Online backup software backs up all the proper files without needing to run several types of backup software to back up various file types. Online backups are properly versioned for point-in-time restores with multiple copies kept and automatically verified.

Using online backup services means files are encrypted prior to transmission, and are stored in encrypted form on the backup servers. In this way they are compliant with privacy and data security regulations. Backed up data are encrypted with a password known only to you which means nobody except you – not even the Backup Service Provider has access to your information which means nobody can steal your data. Reports are emailed after every backup and these can be used to audit business practices and to keep track of your backups. Should your backups encounter any kind of problems, you will receive an email describing the problem.

Restores can be achieved in minutes by the end user by choosing files from a list, or running a wizard. Restores can done from anywhere on the Internet using a web browser and operate 24/7/365 without the need for outside expertise or end user intervention. Restores can be done any time – weekends, holidays, and nights and so are quick and easy to test. Worries about running out of drive space, or replacing old drives disappear as the provider handles all that.


Porticor Wins Stevie Award

Porticor Earns Bronze Stevie® Award in the Most Innovative Company of the Year in Canada and USA Award Category in World’s Premier Business Awards Program TEL AVIV, Israel – Aug. 16, 2012 – Porticor®, a leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud and keeps […]

The post Porticor Wins Most Innovative Company Of The Year Honors In 2012 Stevie International Business Awards Program appeared first on Porticor Cloud Security.

read more

Cloud services are an organizational innovation, not a technology "silver bullet"

By Dr Steve Hodgkinson, Research Director, IT, Asia-Pacific, Ovum

Many executives regard technology evangelists as “drive-by shooters” – people who cruise by their offices firing so-called “silver bullet” solutions. Are cloud evangelists in this category? Perhaps. If they are selling cloud computing as a technology innovation, then the “drive-by shooter” label can fit quite well.

Most ICT executives know how to manage technology evangelists: they do not let them into the office. Cloud services evangelists, however, are a much bigger problem because they proffer pervasive organizational disruptors – pre-assembled bundles of people, processes and technology – not technology point solutions.

The challenge for the ICT department is fending off the army of cloud services evangelists that is out there selling piecemeal organizational disruption to executives throughout the enterprise. The ICT department must get ready. It is in danger of losing its monopoly over the provision of ICT services, and a big test of …

The cloud news categorized.