The Innovative CIO!
The Innovative CIO: How IT Leaders Can Drive Business Transformation – the
new book from Andi Mann and George Watt
The contributors to the Forrester Cloud Playbook have put together a list of
the top 10 cloud predictions for 2013, according to this Forbes article. The
analysts predict that we’ll see some of the following trends next year:
Cloud and mobile will become one, we’ll stop equating cloud with AWS, and
we’ll finally stop saying – “everything is going cloud.”
VMware and EMC announced their plans to create a new business unit, the
Pivotal Initiative, according to this InformationWeek article. The business
unit will merge VMware and EMC’s cloud computing and big data products.
A new report by Nasuni reveals that 1 out of 5 employees use Dropbox to share
and store work files even though their organization’s IT department
prohibits ... (more)
Cloud Computing Expo on Ulitzer
The talk at the 4th Cloud Expo this week in Santa Clara was all about
enterprise cloud adoption. Is it real? Is it already happening? If so,
who’s doing it, which applications are they running and which clouds are
To a large extent, cloud computing is a victim of its own somewhat
out-of-control hype cycle. Since so much has been written and discussed about
the cloud in 2009, there is now a growing impatience for actual results. The
fact that 2000 people showed up at the Cloud Expo in Santa Clara this week
(double the number from last year’s show) suggests that at the very least,
interest in enterprise cloud computing remains very real, and the need for
practical solutions and use cases is growing more urgent.
There was a growing concensus about a number of issues:
1. The hybrid model of on-prem data centers combined wit... (more)
Hurricane Labs and Information Security Summit are pleased to announce the
Grand Opening of their new Corporate Training Center located at 4401 Rockside
Road in Independence, Ohio. Featuring state of the art classroom technology,
a large classroom for up to 30 students, 2 breakout rooms and a recording
studio ideal for podcasting, the training center will be used by several
hundred professionals from around the country.
We offer a diverse array of training programs for Chief Security Officers,
Security Managers, Network and Security Architects and Engineers, and other
IT Professionals. We also provide ongoing learning experiences for a full
range of employees within your organization to enforce security on all levels
of the spectrum. Whether you are looking into firewall management or social
media policies, we’ve got you covered.
Our Training Center can accommodate ... (more)
The computers on your network are protected from malware right? If you are
operating an environment based largely on Windows based PCs you likely have
some kind of anti-virus installed and centrally managed. If you have
purchased a more complete desktop protection suite, you probably even have a
Host Based IDS/IPS protecting your machine from incoming malicious TCP scans,
or possible outbound connections to known malicious sites (like google.com
occasionally). Operating system firewall activated? Yep! AV signatures
current? Check! Global Threat Intelligence updated? Uh, yeah....sure. Then
you should be covered against threats targeting your organization, right?
Most likely not, and at times these tools actually mask intrusions as they
provide a false sense of security and protection.
The Trouble with Reactionary Behavior
The problem with these tools, all of them, is ... (more)
By Prayson Pate
The hot topics of Software-Defined Networking (SDN) and Network Functions
Virtualization (NFV) have spurred several articles comparing and contrasting
them. This blog provides a brief survey of these articles in chronological
order, including a synopsis of each. I also included a rating of each, based
on relevance and readability.
Uniting SDN and NFV- 4 stars
Tom Nolle of CIMI writing at CIMI’s public blog – November 13, 2013 –
This blog is one of the earliest to tackle the intersection of SDN and NFV.
It focuses on the announcement of the 6WINDGate product from 6WIND. Tom
describes how this type of product and approach could unite the two concepts:
This capability is useful in three ways; first, you can use it to improve how
servers manage things like virtual networks, and second you can use it to
host network-related applications like fir... (more)
Purging a pc of old, unwanted files is an essential but nerve-wracking part
of computer maintenance. When cleaning a computer system some files are hard
to identify. A miscellaneous-looking file that appears superfluous may
actually be supporting necessary operations. Comodo's new system cleaner
enables computer users to store a back-up copy of their computer system just
in case they make a mistake.
Comodo System-Cleaner is the world's first file and registry cleaner to
harness the power of 100% safe cleaning. It utilizes the revolutionary
innovation of SafeDelete™, a feature that allows users to safely recover
any files deleted in error. This advancement eliminates risk from the process
of PC cleaning. Because the system cleaner is entirely risk-free, it can
clean deeper, more thoroughly, and more completely than any other cleaner
"PC users are afraid ... (more)
Altor Networks, creator of the purpose-built virtual firewall, has announced
that Altor VF 2.0 virtual firewall will debut VMworld Europe in Cannes this
week; it will be showcased in the VMsafe section of the Hands-on Lab.
VMworld Europe attendees are invited to preview the Altor VF 2.0 at the
Hands-on Lab and participate in one of 16 simultaneous live demos of the
virtual firewall. This is an opportunity to "sit in the driver's seat and
test drive" Altor VF 2.0 and install, configure and deploy security policies
in a virtual network.
"We are excited to see VMware's partners bring to market new security
solutions built using VMsafe technology," said Shekar Ayyar, Vice President,
Infrastructure Alliances, VMware. "Altor VF is an excellent showcase for
harnessing the potential of VMsafeTM to deliver a virtual firewall uniquely
designed by leveraging the VMware platfor... (more)
The NY Times broke IBM’s embargo this morning by publishing their story on
IBM’s new cloud computing initiatives. I’ve posted the full release
here on CloudBzz.
The diagram below gives a bit of insight into where IBM is today and where
they are heading.
IBM is also updating their collateral with a bit more detail. Here is a
fact sheet for their Smart Business initiative:
Fact sheet: IBM Smart Business
Smart Business is IBM’s commonly branded set of cloud computing offerings
for business. This set of offerings gives clients three choices to deliver
and consume cloud services to drive efficiency, productivity and control.
Smart Business Services – cloud services delivered:
1: Private cloud services, behind your firewall, built by IBM.
2: Standardized services on the IBM cloud
Smart Business Systems – purpose-built infrastructure
3. IBM CloudBurst: Pre-integrated har... (more)
If I had to classify the questions I get on a routine basis, among the first
in the list would be “Why should I buy software for reason X when Microsoft
has built it in free. X could be anything from firewall software for desktops
through availability tools for SQL Server. It’s absolutely true that
Microsoft builds a ton of great tools into their products these days, but
that doesn’t mean you should rule out the need for 3rd-party solutions, and
Let’s take the case of anti-virus as an example. Windows 7 –
Microsoft’s upcoming desktop OS platform – will not have a built-in
anti-virus solution. However, Morro will be released by Microsoft as a
no-cost anti-malware (anti-virus, anti-spyware, etc) that will be available
free of charge. So, why are other players in the Windows anti-malware area
still in business? First things first, not everyone will meet ... (more)
Two conflicting opinions crossed my desk today.
Michael Hickins reported on Iranian Phone Spoofing, Fake Twitter Accounts And
Trust in his blog at InformationWeek. People are spoofing cell phone calls
to his Iranian friends' phone accounts, to avoid sanctions for calling
Iran. "Cybersecurity expert Melih Abdulhayoglu, CEO of Comodo, tells me
that content authentication is "the next big thing," Hickins wrote.
I was already thinking about the insecurity of cell phone communications
because Molly Dolesalek reported on them in Processor Magazine. "It's fairly
easy to tap into a cell phone conversation, but the business world doesn't
really understand that," Dunleavy says. For that reason, he believes that
there will be more interest in voice encryption, including VoIP encryption,"
she wrote, quoting Mike Dunleavy, president of Diginonymous.
Authenticate or encrypt? ... (more)
Further assisting resellers with increasing sales opportunities in the
government space, Arrow Enterprise Computing Solutions, a business segment of
Arrow Electronics Inc., is expanding its General Services Administration
Schedule 70 across its North American operations and adding enterprise
technology to its program.
A GSA Schedule 70 includes prenegotiated contracts to public-sector agencies
for information technology solutions that are available at a set price and
have been approved by the GSA to be compliant with specific laws and
regulations. The Arrow ECS GSA schedule (previously managed by Arrow ECS’
Alternative Technology Group) is in the top 4 percent of Schedule 70
“Expanding the GSA program that the Alternative Technology Group
established in 2005 across Arrow ECS’ entire North American operations
enables us to make the progra... (more)