Articles

Cloud Computing + Things = "Information Excellence", Not IoT

Image
The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is also feared as the real- life instantiation of The Terminator’s Skynet , where sentient robots team with an omnipresent and all-knowing entity that uses technology to control, and ultimately destroy, all of humanity. Not there yet Lucky for the humans among us, the technical capabilities of both cloud computing and IoT are way behind these Orwellian fears. Although the technology is promising, research and technical hurdles still abound. Challenges include: Datasets that span multiple continents and are independently managed by hundreds of suppliers and distributors; Volume and velocity of IoT dataflows exceed the capacity ad capability of any single centralized datacenter; Current inability to conduct “Big IoT” data processing across multiple distributed datacenters due to technical issues related

Cloud Computing Price-Performance Could Vary By 1000%!

Image
Yes, y ou read that right. The price/performance of your   cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This also means that the cost to you of processing the exact same job in the cloud could vary by this much as well.   This surprising result was discovered by a   Rice University   group, headed by Dr. T. S. Eugene Ng, that has been focusing on cloud computing. Recently they published their joint work with Purdue University:   Application-Specific Configuration Selection in the Cloud: Impact of Provider Policy and Potential of Systematic Testing , in the IEEE INFOCOM 2015 Conference Proceedings. That paper took a first step towards understanding the impact of cloud service provider policy and tackling the complexity of selecting configurations that can best meet the price and performance requirements of

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

Image
Data security breaches and hacker attacks on private businesses , health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with customers’ payment card information and employee data while companies and federal authorities investigate the source of the leaks and spend millions of dollars to repair the harm. Some see these breaches as a threat to national security and in response, the U.S. government has launched the “ 30-day Cybersecurity Sprint ” as a tactic designed to beef up cybersecurity protocols. According to media reports, specific program steps include: Immediately fixing any cybersecurity vulnerabilities Tightening policies and practices for privileged users who can access sensitive information Implementing multifactor authentication procedures for accessing federal networks Employing electronic “indicators” provided b