Security Is the Biggest Barrier To Cloud Adoption; Unisys Has a Solutions Portfolio

Secure Cloud Computing

Subscribe to Secure Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Secure Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The digital society has emerged. Today’s always-connected world and the applications we interact with are changing the way we live. People are mobile, our devices are mobile, and by all accounts, everything that is a noun – a person, place or thing – will soon be connected and generating data… and all that traffic is destined for an application – that could also be portable – located somewhere in a data center. But not all data traffic is created equally and critical information might need some action that requires automation of the deployment process. At the same time, organizations can’t afford to manually make policy adjustments every time something needs attention. Automated coordination between applications, data and infrastructure from provisioning to applying policies and services which are in-line with business needs must be in place. This is Orchestration.... (more)

Is 2016 Half Empty or Half Full? | @CloudExpo #BigData #IoT #Mobile #Security

With 2016 crossing the half way point, let’s take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. According to the Identity Theft Resource Center (ITRC), there have been 522 breaches thus far in 2016 exposing almost 13,000,000 records. Many are health care providers as our medical information is becoming the gold mine of stolen info. Not really surprising since the health care wearable market is set to explode in the coming years. Many of... (more)

I’m Sorry Sir, You’re Obsolete | @ThingsExpo #IoT #M2M #API #Cloud

A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone 4 since the connector was that 1 inch protruding plug. When I got the iPhone6, those clocks instantly became useless. Obsolete. At least the phone connector part lost its value. I’ve been thinking about this for a while. The rate of obsolescence. The state when an object, technology, service or practice is no longer needed or wan... (more)

Ransomware Evolution | @CloudExpo #InfoSec #DataCenter #Security

Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer. And then it started becoming obsolete because an end-user. People were asking themselves: “That is my computer, would I pay $100 for it? If I don't really have data, I’d better format my PC and start all over again.” So, that strategy – locking access to computers, started becoming obsolete.  What did the bad guys do?  They realized that the previous strategy was onl... (more)

Your Applications Deserve iApps | @ThingsExpo #IoT #M2M @API

F5 iApps are user-customizable frameworks for deploying applications that enables you to ‘templatize’ sets of functionality on your F5 gear. You can automate the process of adding virtual servers or build a custom iApp to manage your iRules inventory. Application ready templates were introduced in BIG-IP v10 and the goal was to provide a wizard for the often deployed applications like Exchange, SharePoint, Citrix, Oracle, VMware and so forth. This allowed the abstraction some of the configuration details and reduced the human error when following the pages of the thick deploymen... (more)

Are People Programmable? | @ThingsExpo #IoT #BigData

For the month of June, DevCentral is highlighting our Programmability Month and Codeshare Challenge. A fantastic opportunity to catch up on the power of programmability and learn how the BIG-IP platform can transform your infrastructure with a few lines of code. Since my coding ability is still in the infancy stage, I thought of looking at programmability from a different angle. Can we code a human? First, the word ‘Programmability.’ According to multiple sources including dictionary.com, it is derived from the adjective ‘Programmable’ or capable of being programmed. As a noun, i... (more)