Articles about Q&A

Strategies for dramatically cutting public cloud costs [Q&A]

IT teams are increasingly moving to the public cloud for its supposed low cost and high agility. However, once implemented in their environments, people are finding public cloud to be expensive and fairly complex to manage.

We spoke to Andrew Hillier, CTO of cloud optimization analytics service provider Densify, who is all too familiar with the struggles that IT organizations face as their public cloud costs rise through the roof. Read on for his insights into strategies that organizations can implement when looking to reduce cost, risk and complexity in the public cloud.

Continue reading

Promobot talks about service robotics and the future of the industry [Q&A]

Robots are one of the main world trends in the world of technology. Automation and AI are increasingly entering our lives, and robotics is the most dynamically developing industry.

Russian company Promobot is the largest manufacturer of autonomous service robots in Russia, Northern and Eastern Europe. Several hundred Promobot robots already work in the US, China, Kazakhstan, Ireland, the UK, Spain, Chile and other countries around the world. They work as administrators, promoters, hostesses, are able to increase the financial performance of companies, the quality of service and customer loyalty.

Continue reading

DMARC -- rebuilding trust in email [Q&A]

email icon

Email has become the default means of communication for both businesses and individuals, but as we saw yesterday it isn't without its problems.

A major issue email has is that of security, cyber criminals are getting better at creating phishing and other messages that accurately spoof commercial organizations. But there is a technology in the form of Domain-based Message Authentication, Reporting and Conformance (DMARC) which has the potential to restore faith in email communication.

Continue reading

Why are so many organizations struggling to patch? [Q&A]

Patch download

Many recent cyber attacks like WannaCry have succeeded by exploiting vulnerabilities that, although known, have gone widely unpatched.

Why do some organizations find it so difficult to keep their systems up to date and what can they do to better protect themselves? We spoke to Wendy Nather, principal security strategist at Duo Security to find out.

Continue reading

How Neurostimulation can help with stroke rehabilitation and create super-soldiers of the future [Q&A]

My dad had a stroke in his early 60s that left him partially paralyzed. He later had another stroke that killed him. That had a big impact on my life, and since then I’ve been interested in stroke research, and medical advancements in that field.

Neurostimulation in particular is proving beneficial to stroke victims, and I spoke to Nexeon CEO and neurotechnology expert Will Rosellini and Director of Clinical Research Navid Khodaparast about how it’s helping enhance stroke rehabilitation, and its future potential for augmenting healthy brains.

Continue reading

The future of enterprise flash storage [Q&A]

Storage interface

The all-flash storage market is predicted by Gartner to be worth $9 billion by 2020. But while flash offers speed advantages it's also expensive so it seems likely that the foreseeable future will see a mix of storage.

We spoke to Lazarus Vekiarides, CTO and co-founder of ClearSky Data, which offers enterprise storage, backup and DR as a fully managed hybrid cloud service, to find out more about flash storage and how best to exploit it.

Continue reading

How ransomware is going manual to target victims [Q&A]

The ransomware attacks that make the news are the ones like WannaCry and NotPetya that spread rapidly and affect many businesses.

But there's a new breed of manual ransomware attack happening that seeks to pick its victims much more selectively with a view to causing maximum disruption. We spoke to Roy Fisher, incident investigator at cyber security company MWR to find out more.

Continue reading

Raspberry Pi founder Eben Upton talks sales numbers, proudest moments, community projects, and Raspberry Pi 4 [Q&A]

Here at BetaNews, we’re big fans and supporters of the Raspberry Pi. The super-affordable ARM GNU/Linux computer has brought programming back into schools (and beyond) and enjoyed staggering success, becoming the most successful British computer of all time, in just a few short years.

I chatted with Eben Upton, creator of the Raspberry Pi, about his success, most memorable highlights, and plans for the future.

Continue reading

Is your software-defined storage truly software-defined? [Q&A]

It's no secret that today's technology sector is interested in software-defined storage (SDS) -- you'll often hear talk of its ability to reduce costs and increase simplicity. But while many companies are pointing to their technology as SDS, most only have a portion of what’s necessary to be considered truly software-defined.

In order to fix this confusion, we need to agree on a concrete definition of SDS in order to get the best use of the technology and understand how organizations can use it as a cost effective data management solution. We spoke to Ashok Rajagopalan, head of products at elastic block storage provider Datera, to understand this hype and find out how vendors in today’s cluttered market can stand out as true SDS solutions.

Continue reading

How the authentication landscape is changing [Q&A]

Biometric scan

Recently there has been much talk of the death of the password and a switch to other forms of authentication, like biometrics, which are seen as more secure.

But is biometric security a complete answer, and do we risk swapping usability for security? We spoke to Perry Chaffee, vice president of strategy at password-less security company WWPass to find out about the latest trends in authentication.

Continue reading

How Zombies, Run! changes lives, and what's coming next [Q&A]

Running is a great way to get fit and lose weight, but it’s rarely fun. London-based developer Six to Start has changed all that with Zombies, Run!, the most popular smartphone fitness game in the world, which transforms a boring run into an action-packed journey through the zombie apocalypse.

I’m a big fan, having used it since the early days, as well as other Six to Start apps, including The Walk, and Racelink. I spoke with Adrian Hon, CEO of Six to Start, and he told me about the app’s early days, and what’s next for the company.

Continue reading

Protecting hybrid apps from attackers [Q&A]

In order to speed up development times and roll out their apps across multiple platforms without the need to create entirely new code, companies are increasingly turning to hybrid apps. The problem is that these rely on HTML and JavaScript code which is relatively easy to reverse engineer.

How can businesses prevent this and keep their apps and the data they handle safe from hackers? We spoke to Andrew Whaley VP of engineering for Europe at application protection specialist Arxan Technologies to find out.

Continue reading

Is multi-cloud architecture just a fad? [Q&A]

Enterprises often find themselves working with more than one cloud provider. This multi-cloud approach is a lot like hybrid cloud, yet many companies today may not consider this type of environment. If they have, they are more than likely wondering how to manage and govern the data held in separate clouds. They want to know how to find the best use of different architectures in a multi-cloud world.

We spoke to Lief Morin, CEO of infrastructure solutions and managed services company Key Information Systems, to discuss what he's hearing from his clients on multi-cloud strategies and when organizations should skip this type of approach altogether.

Continue reading

How secure operating systems can help protect endpoints [Q&A]

endpoint security

Endpoints are often the weakest links in any IT system, but protecting them effectively now means much more than simply guarding against malware.

As businesses rely more on the cloud and on web-based applications, the endpoint provides a gateway that can be vulnerable to attack.

Continue reading

How deception-based technology is turning the tables on hackers [Q&A]

Trap

Cyber attacks are constantly evolving and consequently businesses are always seeking new ways of defending themselves. This is as much about understanding the nature of attacks as about preventing them.

One of the latest developments is the use of deception, employing camouflaged traps and tokens to throw the attackers off balance by detecting and understanding the nature of the attack and their plans.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.