Security Is the Biggest Barrier To Cloud Adoption; Unisys Has a Solutions Portfolio

Secure Cloud Computing

Subscribe to Secure Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Secure Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Download Whitepaper Here Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availability, efficient and greener solutions can offer much reduced operational expenses (OPEX) to the cloud service providers. Further considering the reduced OPEX, voluminous deployment in cloud environment, lesser form factors (i.e. reduced real estate investment) and intrinsic design solutions, capital expenses (CAPEX) becomes much equitable and compelli... (more)

Announcing @VirgilSecurity to Exhibit at @CloudExpo | #Cybersecurity #IoT

SYS-CON Events announced today that VirgilSecurity will exhibit at the 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 
  See Virgil's Technical Specifications for the up-to-date list of programming languages and platforms supported by our library. Generally all modern platforms and programming languages are supported. Developers have full control over how private keys are generated, stored, and synchronized on end-client devices. Virg... (more)

Announcing @CalsoftInc to Exhibit at @CloudExpo | #Cybersecurity #SDN #API

SYS-CON Events announced today that CalSoft Inc will exhibit at the 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering high quality products and services at the right time and cost. Our customer focused engagement models and innovative Accelerator IPs speed up time-to-market and accelerate reve... (more)

Ransomware Evolution | @CloudExpo #InfoSec #DataCenter #Security

Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer. And then it started becoming obsolete because an end-user. People were asking themselves: “That is my computer, would I pay $100 for it? If I don't really have data, I’d better format my PC and start all over again.” So, that strategy – locking access to computers, started becoming obsolete.  What did the bad guys do?  They realized that the previous strategy was only good when the data that computer was holding was valuable. So they started asking ransom for the data, and that's what they're doing now. That was the evolution. It's the same thing with the same bad people doing that, evolving over time, and then we get a situation now where the bad guys ... (more)

Your Applications Deserve iApps | @ThingsExpo #IoT #M2M @API

F5 iApps are user-customizable frameworks for deploying applications that enables you to ‘templatize’ sets of functionality on your F5 gear. You can automate the process of adding virtual servers or build a custom iApp to manage your iRules inventory. Application ready templates were introduced in BIG-IP v10 and the goal was to provide a wizard for the often deployed applications like Exchange, SharePoint, Citrix, Oracle, VMware and so forth. This allowed the abstraction some of the configuration details and reduced the human error when following the pages of the thick deployment guides for those applications. Application templates were great but there was no way to customize the template either during the deployment or adjust it after. Then came iApps®. Introduced in TMOS v11, iApps is the current BIG-IP system framework for deploying services-based, template-driv... (more)

I’m Sorry Sir, You’re Obsolete | @ThingsExpo #IoT #M2M #API #Cloud

A few years ago, those little iHome alarm clocks started to appear in hotel rooms. Cool gadgets that you could mount your mobile phone to battery charge or play the music on the device. We also had a few in our home. They worked perfectly for the iPhone 4 since the connector was that 1 inch protruding plug. When I got the iPhone6, those clocks instantly became useless. Obsolete. At least the phone connector part lost its value. I’ve been thinking about this for a while. The rate of obsolescence. The state when an object, technology, service or practice is no longer needed or wanted… even though it still may be in good working order. E-waste is the fastest growing segment of the waste stream. With the technological advances, not only are we buying the latest and greatest electronics but we’re also dumping perfectly good, working devices at silly rates. There was eve... (more)

The Visible Data of the Invisible User By @PSilvas | @ThingsExpo #IoT

As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automobiles and surveillance cameras has grown into a an industry where shirts, shoes, sleeping bags and even liquor bottles want to gather your info. And most of these devices monitor silently without you even knowing. According to Ryan Matthew Pierson over at Readwrite.com, ‘The strength of IoT is in its ability to be invisible to the user.’ In addition, the mad dash to simply insert a chip, beacon and software into everyday objects is slowly graduating to era where user experience, privacy and security are becoming critically important for mass adoption. In 2014 Gartner released a report saying... (more)

You’re Getting Under My (e)-Skin By @PSilvas | @ThingsExpo #IoT

Imagine if the temporary tattoos that come in a box of Cracker Jack (if you’re lucky) had an electronic display logo that lights up when you put it on. Or a fitness tracker that you tape to yourself rather than wearing it around your wrist. Or a watch so thin that it lights the time while blending into your skin. Or even, a sensor that can be applied directly to an organ to determine health. This is the future for electronic skin. Yup, I said it: E-Skin. Researchers in Japan have developed an ultra-thin and ultra-stretchy material that can mimic the flexibility of human skin. Ultraflexible organic photonic skin is an organic polymer with light-emitting diodes (PLEDs) or small sheets of energy-efficient lights that are laminated right on the skin. These are intended to equip the human body with electronic components for health-monitoring and information technologies.... (more)

From Enterprise to Cloud, Virtualization Today on SYS-CON.TV

Virtualization has become a critical part of Enterprise IT strategy. Why and how has it become one of the most important change agents in our industry? To answer these questions I had the good fortune recently to be able to speak to a select group of top IT industry executives who joined me in the 4th Floor Reuters TV Studio overlooking Times Square in New York City for a special SYS-CON.TV "Virtualization Power Panel." The executives - Red Hat CTO Brian Stevens, Citrix CTO Simon Crosby, Egenera CTO Pete Manca, Allen Stewart, Group Manager of Windows Virtualization at Microsoft, and Brian Duckering, Sr. Director of Products and Alliances at Symantec - were energized about virtualization for a variety of reasons, not least because it has already proven itself (the recent woes of VMware notwithstanding) to be a multi-billion dollar business. Virtualization itself is cu... (more)

The Top 250 Players in the Cloud Computing Ecosystem

In the run-up to the next Cloud Expo, 7th Cloud Expo (November 1–4, 2010) being held at the Santa Clara Convention Center in Silicon Valley, it's time to give my earlier list a complete overhaul. Here, accordingly, is an expanded list of the most active players in the Cloud Ecosystem. I have increased it from the 'mere' 150 I identified back in January of this year, to 250, testimony – as if any were needed! – to the fierce and continuing growth of the "Elastic IT" paradigm throughout the world of enterprise computing. Editorial note: The words in quotation marks used to describe the various services and solutions in this round-up are in every case taken from the Web sites of the companies themselves. Omissions to this Top 250 list should be sent to me via Twitter (twitter.com/jg21) and I will endeavor to include them in any future revision of this newly expanded rou... (more)

Cloud Expo 2011 East To Attract 10,000 Delegates and 200 Exhibitors

SYS-CON Events announced today that the 8th International Cloud Expo will take place June 6-9, 2011, in New York City. The International Cloud Computing Conference & Expo series is the world's leading Cloud-focused event and is held three times a year, in New York, Silicon Valley and in Europe. Over 600 corporate sponsors and 10,000 industry professionals have participated in Cloud Computing Expo since its inception, more than all other Cloud-related events put together. Cloud Computing Expo 2011 East Call for Papers Deadline November 30, 2010 - SUBMIT YOUR SPEAKING PROPOSAL TODAY! The four-day event will offer a rich array of sessions led by exceptional speakers about the business and technical value of cloud computing with more than 150 sponsors and exhibitors and over 5,000 estimated delegates from well over 48 different countries. Explore Cloud Expo Sponsorship &... (more)