Security Is the Biggest Barrier To Cloud Adoption; Unisys Has a Solutions Portfolio

Secure Cloud Computing

Subscribe to Secure Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Secure Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

SYS-CON Events announced today that Infoblox, the industry leader in DNS, DHCP, and IP address management, the category known as DDI, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Empower the Security Ecosystem Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. They are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core-enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements. Contact Infoblox at https://www.infoblox.com. 21st International Cloud Expo, taking place October 31 - November 2, 2017, at... (more)

Securing Key Management | @CloudExpo #AI #DX #API #CloudNative #Security

Cloud migration of modern enterprise infrastructure has been a defining trait of recent times. The cloud brings increased efficiency, streamlined operations, an increased shared knowledge base, and scale that was simply not possible earlier. Enterprise IT executives expect that 60 percent of workloads will run in various clouds by 2018 according to survey data of 1,200 buyers by 451 Research. However, according to the NorthBridge Future of Cloud Computing survey, the largest survey of its kind, security remains the number one inhibitor of enterprise migration to the cloud. One of the key reasons for this is that enterprises relinquish control of their infrastructure in the process, and suffer a lack of privacy and protection from the cloud provider while running in a public cloud. According to the NorthBridge survey, enterprises' biggest concerns include dependenc... (more)

Is 2017 Half Empty or Half Full? | @ThingsExpo #AI #ML #DX #IoT #SmartCities

With 2017 crossing the half way point, let’s look at some technology trends thus far. Breaches: Many personal records are half empty due to the continued rash of intrusions while the crooks are half full of our personal information along with some ransom payments. According to the Identity Theft Resource Center (ITRC), there have been 7,689 breaches since 2005 (when they started tracking) compromising – get this – 900,315,392 records. Almost 3 times the U.S. population. In 2016, 56% of all Data Breaches began with a user clicking on a phishing email. The big story for 2017 I think, is the rise of ransomware. Kaspersky reports a 250% increase in ransomware for the first few months of 2017. From WannaCry to Petya to Fusob, criminals are holding systems hostage until a ransom is paid…or not. Ransomware seems to be this year’s big trend with backups saving some from to... (more)

Can Falling Prices of the Cloud Make Hosted Solutions Irrelevant? | @CloudExpo #Cloud #DataCenter

The margins of cloud products like virtual machines are still in the 50% range. In essence, price drops are going to be a regular feature for the foreseeable future. This begets the question - are hosted solutions becoming irrelevant today? Boston-based market research firm, 451 Research, has been publishing their ‘Cloud Price Index' for a few years now. The quarterly study looks into the pricing of various offerings in the cloud market to understand the shifting dynamics in the public, private and hybrid cloud market. According to Dr. Owen Rogers from 451 Research, the approach here is similar to how inflation is calculated - the price of a distributed sample of products from the market are analyzed periodically to ascertain the rise or drop in the prices of the various cloud offerings. One big takeaway from the various reports published over the years is how muc... (more)

Lightboard Lessons: What is HTTP?

In this Lightboard Lesson, I light up some #basics about HTTP. HTTP defines the structure of messages between web components such as browser or command line clients, servers like Apache or Nginx, and proxies like the BIG-IP. ps Related: What is HTTP? What is HTTP Part II – Underlying Protocols ... (more)

Application Delivery Controller | @CloudExpo #SDN #VM #AI #Virtualization

A Little History Application Delivery got its start in the form of network-based load balancing hardware. It is the essential foundation on which Application Delivery Controllers (ADCs) operate. The second iteration of purpose-built load balancing (following application-based proprietary systems) materialized in the form of network-based appliances. These are the true founding fathers of today’s ADCs. Because these devices were application-neutral and resided outside of the application servers themselves, they could load balance using straightforward network techniques. In essence, these devices would present a “virtual server” address to the outside world, and when users attempted to connect, they would forward the connection to the most appropriate real server doing bi-directional network address translation (NAT). Figure 1: Network-based load balancing appliance... (more)

What Is #MQTT? | @ThingsExpo #IoT #M2M #RTC #DigitalTransformation

The mad dash to connect virtually every noun to the internet or the Internet of Things is creating a massive M2M network for all the devices, systems, sensors and actuators to connect & communicate on the Internet. With that, they need a communications protocol to understand each other. One of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe and publish” messaging protocol designed for lightweight machine-to-machine (or IoT) communications. In this episode of Lightboard Lessons, I light up how MQTT works. ps Related: IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society What are These "Things? The Intruders of Things Internet of @ThingsExpo, taking place June 6-8, 2017 at Javits Center, New York City, is co-located with 20th International @CloudExpo and will feature technical sessions from a rock star conference facult... (more)

DevCentral’s Featured Member for July – Vosko Networking’s Niels van Sluis

For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko’s security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP and Check Point. He started his professional career about 20 years ago in the ISP industry as an Unix Administrator, and switched to the public healthcare sector around 2001. In more recent years, he’s moved more towards working on network security and design. Apparently, having a Unix background helps a lot when working with modern security devices, since most of them are running on some flavor of Unix. When not working or spending time on DevCentral, he likes to travel, visit historic places and enjoy nature. And Niels is DevCentral’s Featured Member for July! DevCentral: Tell us a little about the areas of BIG-IP expertise y... (more)

What Is Virtual Desktop Infrastructure | @CloudExpo #VDI #Cloud #DataCenter

What is VDI? Imagine not having to carry around a laptop or be sitting in a cubicle to access your work desktop applications. Virtual desktop infrastructure (VDI) is appealing to many different constituencies because it combines the benefits of anywhere access with desktop support improvements. Employees typically use a wide range of mobile devices from laptops to tablets and from desktops to smartphones are being used. The diversity of these mobile devices and the sheer number of them in the workplace can overwhelm IT and strain your resources. Desktop Virtualization centralizes sets of desktops, usually in a data center or cloud environment, and then provide access to your employees whether they are in the office, at home or mobile.  VDI deployments virtualize user desktops by delivering them to distinctive endpoint devices over the network from a central locatio... (more)

9th International Cloud Expo | Cloud Expo Silicon Valley – Photo Album

Cloud Computing Expo on Ulitzer 9th International Cloud Expo, held on November 7 - 10, 2011, in Santa Clara, CA, attracted more than 120 sponsors and exhibitors with over 7,500 registered delegates and four content-packed days with a rich array of sessions about the business and technical value of cloud computing led by exceptional speakers from every sector of the cloud computing ecosystem. The Cloud Expo series is the fastest-growing Enterprise IT event in the past 10 years, devoted to every aspect of delivering massively scalable enterprise IT as a service. We invite you to enjoy here our photo album of the show...we'll be adding new images all week.   \ ... (more)

What Is a Proxy? | @DevOpsSummit #Agile #DevOps #ContinuousDelivery

The term ‘Proxy’ is a contraction that comes from the middle English word procuracy, a legal term meaning to act on behalf of another. You may have heard of a proxy vote. Where you submit your choice and someone else votes the ballot on your behalf. In networking and web traffic, a proxy is a device or server that acts on behalf of other devices. It sits between two entities and performs a service. Proxies are hardware or software solutions that sit between the client and the server and does something to requests and sometimes responses. The first kind of proxy we’ll discuss is a half proxy. With a Half-Proxy, a client will connect to the proxy and the proxy will establish the session with the servers. The proxy will then respond back to the client with the information. After that initial connection is set up, the rest of the traffic with go right through the proxy... (more)