What do a firewall and a fortress have in common? They are no longer strong
enough to protect the valuables housed inside. Like the walls of an old
fortress, the cracks in the firewall are allowing the bad guys to slip in -
unannounced and unnoticed. By the time these thieves get in, the damage is
already done and the network is already compromised. Intellectual property is
easily slipped out the back door leaving no trace of forced entry. If we want
to reign in on these cybercriminals, it's high time we start thinking the way
these thieves think. If we don't, malware, rootkits, AETs and other nefarious
threats will continue to undermine our sense of security. Here's what we're
469,000 unique malware samples discovered weekly 83% organizations hit by
Advanced Persistent Threats Mobile malware grew 30% with 99% Android targeted
Root kit attacks return to... (more)
Explosive growth in connected devices. Enormous amounts of data for
collection and analysis. Critical use of data for split-second decision
making and actionable information. All three are factors in making the
Internet of Things a reality. Yet, any one factor would have an IT
organization pondering its infrastructure strategy.
Download Slide Deck: ▸ Here
How should your organization enhance its IT framework to enable an Internet
of Things implementation? In his session at Internet of @ThingsExpo, James
Kirkland, Chief Architect for the Internet of Things and Intelligent System... (more)
"SAP had made a big transition into the cloud as we believe it has
significant value for our customers, drives innovation and is easy to
consume. When you look at the SAP portfolio, SAP HANA is the underlying
platform and it powers all of our platforms and all of our analytics,"
explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this
SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa
Clara Convention Center in Santa Clara, CA.
General Session at 15th Cloud Expo | Thorsten Leiduck, VP ISVs & Digital
Download Slide Deck: ▸ Her... (more)
Fundamentally, SDN is still mostly about network plumbing. While plumbing may
be useful to tinker with, what you can do with your plumbing is far more
intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and
that's reasonable. But SDN opens opportunities for novel constructions in
Layers 4 to 7 that solve real operational problems in data centers. "Data
center," in fact, might become anachronistic - data is everywhere, constantly
on the move, seemingly always overflowing. Networks move data, but not all
networks are suitable for all data.
Download Slide Deck:... (more)
Internet of Things - Key Elements to Success
Download Slide Deck: ▸ Here
Connected devices and the Internet of Things are getting significant momentum
In his session at @ThingsExpo, Jim Hunter, Chief Scientist & Technology
Evangelist at Greenwave Systems, examined three key elements that together
will drive mass adoption of the IoT before the end of 2015.
The first element is the recent advent of robust open source protocols (like
AllJoyn and WebRTC) that facilitate M2M communication.
The second is broad availability of flexible, cost-effective storage designed
to hand... (more)