December 22, 2012 Off

Demystifying the cloud security hype

By David

Grazed from CloudTech.  Author: Wieland Alge.

You may already be familiar with the term ‘Real Time Protection’, which could just as easily be labeled ‘Cloud Protection’. Simply put, when a vendor’s research team identifies a new email threat, the characteristics of the message are sent to all affected hardware appliances straightaway, so that the malicious content is immediately blocked. This all happens far ahead of the regular update by on-premise virus signatures.

Because they are outsourced, Cloud technologies can be implemented far more flexibly; it could also be referred to as an "elastic protection". Conventional security technologies demand computing power from both onsite hardware and software. But when new threats emerge it means that much more computing power is necessary to take successful action against the threats from one moment to the next. This performance can be provided in the Cloud without having to replace or upgrade the customer’s equipment…

December 22, 2012 Off

The Future of Mobile Cloud Computing

By David

Grazed from CloudTimes.  Author: Sue Poremba.

Use of cloud services at home, in the workplace and in large enterprises has steadily and significantly increased. Now we are seeing a similar trend with mobile devices and cloud technology. Mobile devices are already accessing a number of cloud services, such as Dropbox, and more third-party applications utilize cloud computing technology. It is only a matter of time until the technology becomes the central force to mobile applications. Where will the future of the mobile cloud lie?

“Mobile platforms are already accessing the cloud for a lot of consumer-based services such as email, social media, online file storage and corporate communications tools. But so far, there are essentially only two players here ñ the individual or consumer, and the consumer cloud service,” said Dan Matthews, chief technology officer with IFS North America. “One of the biggest changes I think we will see in the next year or two is the entry of a third player ñ the corporate back-end system (e.g., corporate ERP, Financials, SCM and other mission-critical systems).”

December 22, 2012 Off

Cloud disaster recovery: 5 key steps to secure your data

By David
Grazed from CloudTech.  Author: Editorial Staff.

Hosting applications on the cloud is tempting many IT organisations for sundry reasons like availing benefits from outsized datacentres, backup power sources and other capabilities that till lately only established IT organisations could afford.   Pay-as-you-go culture or guaranteed availability makes cloud adoption an easy and unperturbed choice for many SMBs and large scale organisations.

Many hosting providers maintain compound data centres, so decision makers often assume disaster recovery to be the inherent feature in the cloud culture that is offered to them. But little do they realise that this is a vital issue that warrants concern. Disaster Recovery (DR) is not a default configuration for many providers that offer cloud space in the IT market….

December 22, 2012 Off

Red Hat CEO Whitehurst talks about future of cloud computing

By David

Grazed from BizJournals.  Author: Lauren K. Ohnesorge.

Five years ago, Jim Whitehurst was introduced to investors as CEO of Raleigh-based Red Hat (NYSE: RHT).  Last night, following the release of Street-beating earnings, we chatted about his tenure as CEO (“I picked a great company to work for,” he laughs) and, most importantly, about what Red Hat sees for the cloud.

“I think cloud, ultimately, is about having this single fabric,” he says, adding that it should be like a highway transportation system. “It’s there. Any car can use it. Any car can drive on it. You don’t make cars too big to fit in a lane. It’s a common system.”…

December 22, 2012 Off

2012 will go down as the year of cloud computing

By David

Grazed from RGC.  Author: Steve Cerocke.

2012 has been a challenge and a year of recovery and change for Northern Nevada. If you are reading this, then you have survived the end-of-time hype of the Mayan calendar prophecies and probably are resigned to continue your march toward the new year. As you contemplate the beginning of a new calendar, it is a good time to review 2012 and see where past developments portend new opportunities.

One of the biggest local announcements was Apple’s decision to build a data center and office space in the region. While this is great news for our local economy, the real benefits will come from the name recognition and the diversification that this type of industry can bring. Technology-focused businesses like Apple, Intuit and Microsoft attract and develop a new type of workforce that will positively influence the economy, education and our community for years to come…

December 22, 2012 Off

Cloud Jobs: 7 Million In 3 Years, IDC Says

By David
Grazed from InformationWeek.  Author: Paul McDougall.

Cloud computing, and related areas like virtualization and data management, will create 7 million jobs over the next three years, according to a new study published by Microsoft and IDC. The study also claimed that currently there are 1.7 million open cloud jobs worldwide that organizations are having a tough time filling.

"Despite modest growth in the IT sector overall in the U.S., cloud-ready jobs are increasing as we head into 2013," said Cushing Anderson, a program VP at IDC, in a statement. "With this increase comes the harsh reality that workforces around the world are steps behind when it comes to attaining the skills necessary to thrive in the cloud computing industry."…

December 22, 2012 Off

Cloud Computing: ARM Launches Security Joint Venture

By David
Grazed from Sys Con Media.  Author: Maureen O’Gara.

ARM has just given Intel another reason to chew its lip.  The British mobile chip designer has launched a promised joint venture in mobile security called Trustonic that’s gotten the backing of companies like MasterCard, Sprint, Cisco, Samsung, Nvidia and 20th Century Fox Home Entertainment.   ARM owns 40% of the new company and its two partners, Gemalto, a security ISV in Amsterdam, and Giesecke & Devrient, a payments house in Munich, each have 30%.

Former ARM VP Ben Cade has been named Trustonic’s CEO. The venture will be headquartered in Cambridge, England, where ARM lives and will have offices around the world…

December 22, 2012 Off

Voltage, PerspecSys Partner for Cloud Data Encryption Solutions

By David

Grazed from TalkinCloud.  Author: Chris Talbot.

Cloud applications encryption is coming up again, and this time it’s two companies working together in the hopes of improving the security of cloud apps and the data contained therein. Voltage Security, which is known for its data-centric encryption and key management solutions, and PerspectSys, an enterprise cloud data protection solutions vendor, have combined efforts to create a solution the vendors promise will increase the level of security and application usability when it comes to cloud data protection.

The solution includes Voltage’s Format-Preserving Encryption (FPE) technology, which has been integrated with PerspecSys’ Cloud Data Protection Gateway product. The end solution uses Voltage’s end-to-end encryption and stateless key management technologies and PerspecSys’ cloud data protection platform. The goal is to give enterprises more control over their sensitive data—and protect it before it even leaves the corporation’s environment for processing and storage in the cloud…

December 22, 2012 Off

How cloud computing, tablets will reshape the desktop

By David
Grazed from TechTarget.  Author: Dan Sullivan.

IT departments are embracing both cloud computing and mobile devices for their multiple benefits. At first, these two technologies may seem to be fairly independent; mobile technology focuses on driving efficiencies in data centers, while the cloud brings new levels of flexibility and usability to end users. Both technologies are valuable on their own, but enterprise potential is amplified when mobile and cloud are used together.

Some functionalities that tablets lack can be found in cloud computing resources. For starters, most mobile device applications are designed for non-desktop platforms, like Android and iOS, and they tend to have a narrower range of functionality than desktop applications. Though tablets offer more mobility than even ultra-light laptops, they lack the substantial storage and are not designed to compete head to head with workstations or laptops when it comes to compute-intensive operations. There are a number of ways to meld tablets and cloud computing to deliver desktop-like functionality, and offer alternatives to traditional desktop experiences…

December 22, 2012 Off

Amazon Web Services to accommodate big data storage

By David
Grazed from InfoWorld.  Author: Joab Jackson.

Eyeing the growing market for big data analysis, AWS (Amazon Web Services) has introduced a storage package, called High Storage, that can offer fast access to large amounts of data.  High Storage, an Amazon EC2 (Elastic Compute Cloud) package, is designed to run data intensive analysis jobs, such as seismic analysis, log processing and data warehousing, according to the company. It is built on a parallel file system architecture that allows data to be moved on and off multiple disks at once, speeding throughput times.

"Instances of this family provide proportionally higher storage density per instance, and are ideally suited for applications that benefit from high sequential I/O performance across very large data sets," AWS states in the online marketing literature for this service. The company is pitching the service as a complement to its Elastic MapReduce service, which provides a platform for Hadoop big data analysis. AWS itself is using the High Storage instances to power its Redshift data warehouse service…