Data transformation: The missing ingredient from edge computing strategies

Edge computing

It’s easy to get excited about the Things in the Internet of Things (IoT). Tiny computers, factory robots, devices with 3D cameras, devices with GPS units -- everything from telemetry units on long-haul freight trucks to gumball-size sensors reporting from atop the cooling towers of power plants. The world of network-connected devices, whether specialized or general purpose, is more varied and creative than ever.

The innovation taking place with this hardware is truly impressive. But to take full advantage of the hardware, it’s important to pay just as much attention to the software. Edge computing is going to quintuple the amount of data enterprises collect from devices in just the next three years. quintuple the amount of data that enterprises collect from devices in the next three years alone. How to manage that data and make the most of it -- well, that’s a pretty edgy job.

Continue reading

IT departments struggle to balance innovation against everyday operations

money innovation balance

Everyday tasks, such as maintaining reliable operations, are outweighing more creative projects, such as leading innovation and supporting new digital business initiatives in IT departments according to a new study.

The survey, carried out by IDG Connect, among over 300 IT decision makers, and commissioned by unified operations specialist Ivanti. finds that maintaining critical infrastructure and IT systems is the activity listed more than half (56 percent) of respondents as being expected of IT.

Continue reading

How technology is changing the way we work

Workplace

As millennials now become the largest component of the workforce, and as the freelance or 'gig' economy grows, expectations around technology in the workplace are changing.

Cloud communications and collaboration firm Intermedia has produced a report looking at how companies can utilize technology to foster a more collaborative, productive, and accessible workplace, and at the same time help attract and retain top talent.

Continue reading

Now you can insure your business against cryptomining

insurance key

It's common for businesses to insure against the risk of losing their systems to natural disasters or power outages, but a new product allows you to insure against fraudulent use of IT and telephony, including cloud and internet-based services.

San Francisco-based cyber insurer Coalition is launching Service Fraud coverage that reimburses organizations for the direct financial losses they incur as the result of being charged for fraudulent use of business services including Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Network-as-a-Service (NaaS), and telephony services.

Continue reading

Europe leads the world in cloud adoption

Cloud growth arrow

Europeans have the highest cloud adoption rate in the world at 84 percent according to a new report, up by 27 percent since 2016.

The study of 20,000 organisations' use of cloud technology was carried out by cloud security company Bitglass finds that Office 365 is the most widely adopted cloud application across EMEA.

Continue reading

90 percent of enterprises run or plan to run VMs in the cloud

cloud virtual machines

In a new survey released ahead of this year's VMworld, cloud protection and management company Druva reveals cloud adoption is growing for virtualized workloads, with 90 percent of respondents running, or planning to run, virtual machines in the cloud in 2018.

But the survey also highlights significant risks associated with this shift, as organizations discover that on-premises approaches to data management are outdated and no longer adequate for the cloud era.

Continue reading

SaaS solution simplifies secondary data and app management

Business technology

Increasingly businesses don't have all of their secondary data and apps in one place. Instead they are spread across multiple locations in house and in the cloud.

Storage specialist Cohesity is launching a SaaS-based management solution that empowers customers to see, manage, and take action on their secondary data and applications globally.

Continue reading

New platform simplifies enterprise cloud management

Cloud

As systems move to the cloud companies are faced with increased complexity and the need for flexibility. In addition there are roadblocks including intensive data migrations, reliance on legacy systems, and security and regulatory concerns.

Information management company M-Files is launching a new information management system that enables organizations to flexibly combine cloud and on-premises deployments with a single user license and without having to lock into one model.

Continue reading

82 percent of organizations moving to analytics don't know where their critical data is located

data search

Although 75 percent of organizations are moving away from traditional business intelligence towards data analytics, a worrying 82 percent say they don't know where their critical data is located.

A study for analytics database vendor Exasol, conducted by researchers Vanson Bourne, reveals 'dark data' is still a major challenge for businesses trying to move to an analytics model.

Continue reading

IT decision makers look to AI to prioritize operational alerts

AI

Faced with an abundance of alerts related to system status IT decision makers are looking to AIOps solutions -- combining big data and machine learning -- to differentiate between legitimate signals and inconsequential noise, according to a new report.

The survey from hybrid IT management platform OpsRamp finds 68 percent have experimented with AIOps tools, and nearly three-quarters (73 percent) are taking advantage of AIOps capabilities to gain more meaningful insights into system alerts.

Continue reading

Three-quarters of corporate network breaches are via web applications

Attack route

According to a new report from Kaspersky Lab, 73 percent of successful perimeter breaches on corporate networks in 2017 were achieved using vulnerable web applications.

In addition to web applications, another common vector for penetrating the network perimeter was attacks on publicly available management interfaces with weak or default credentials.

Continue reading

Four ways to prevent an enterprise phishing attack

Phishing

According to a new FBI report, businesses lost more than $676 million as a result of email fraud in 2017 -- up 88 percent from the year before. Clearly, businesses are losing the war against email scammers, as phishing attacks have become increasingly sophisticated and widespread.

Phishing is a method of social engineering (i.e. deception) used to gain access to a social media account, bank account or another protected resource. Hackers typically use an email or text message to trick the user into providing login information. Once the user reveals a username and password, the attacker will hijack the account. The outcome can be as devastating as a fully drained bank account. Frankly, all individuals and businesses should take phishing seriously.

Continue reading

Organizations still struggle with basic firewall management

firewall

Firewalls remain an important element of security architecture, but many organizations are still struggling with the basics, according to a new study.

Security policy management company FireMon has released its 2018 State of the Firewall report which reveals that 94 percent of respondents believe firewalls are as or more critical than ever.

Continue reading

SnapLogic integrates with GitHub to speed up DevOps capabilities

DevOps

Self-service application specialist SnapLogic is announcing new integration with GitHub to automate critical elements of continuous integration and continuous delivery (CI/CD).

The integration enables system administrators to host different versions of their work, including tasks, pipelines, and projects from SnapLogic, with visibility into changes with each update.

Continue reading

Organizations struggle with 'cyber hygiene’ basics

cyber hygiene

Almost two-thirds of organizations are failing to use established benchmarks to set security baselines and are struggling to maintain visibility into their networks, according to a new report.

The study, carried out for security and compliance specialist Tripwire by Dimensional Research, looks at how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as 'cyber hygiene.'

Continue reading

Load More Articles