Articles

Affichage des articles du mars, 2012

4 Big Data Myths - Part I

Image
It was cloud then and it's Big Data now. Every time there's a new disruptive category it creates a lot of confusion. These categories are not well-defined. They just catch on. What hurts the most is the myths. This is the first part of my two-part series to debunk Big Data myths. Myth # 4: Big Data is about big data It's a clear misnomer. "Big Data" is a name that sticks but it's not just about big data. Defining a category just based on size of data appears to be quite primitive and rather silly. And, you could argue all day about what size of data qualifies as "big." But, the name sticks, and that counts. The insights could come from a very small dataset or a very large data set. Big Data is finally a promise not to discriminate any data, small or large. It has been prohibitively expensive and almost technologically impossible to analyze large volumes of data. Not any more. Today, technology — commodity hardware and sophisticated software to levera

Learning From Elevators To Design Dynamic Systems

Image
Elevators suck. They are not smart enough to know which floor you might want to go. They aren't designed to avoid crowding in single elevator. And they make people press buttons twice, once to call an elevator and then to let it know which floor you want to go to. This all changed during my recent trip to Brazil when I saw the newer kind of elevators. These elevators have a common button panel outside in the lobby area of a high rise building. All people are required to enter their respective floor numbers and the machine will display a specific elevator number that they should get into. Once you enter into an elevator you don't press any numbers. In fact the elevators have no buttons at all. The elevator would highlight the floor numbers that it would stop at. That's it! I love this redesigned experience of elevators. It solves a numbers of problems. The old style elevators could not predict the demand. Now the system exactly knows how many people are waiting at what floor

NJVC® VP and GM, Cloud Services, Kevin L. Jackson to Speak on Cloud Security at 2012 Emerging Threats and Cyber Defense Symposium

Image
Vienna, Va., March 15, 2012 — NJVC®, one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense, is pleased to announce that Kevin L. Jackson, vice president (VP) and general manager (GM), cloud services, will speak at the 2012 Emerging Threats and Cyber Defense Symposium, March 20 -21 at Georgia Tech Research Institute in Atlanta. The conference is hosted by the Defense Industry Cyber Threat Working Group and Federal Bureau of Investigations, Atlanta Division. Jackson’s presentation will center on the issues surrounding the security of cloud computing in the highly secure IT environments of the intelligence community. He will dispel myths about the lack of security in the cloud, and discuss how the adoption of the Federal Risk and Authorization Management Program by the federal government will ensure a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services. Jackson will als

Understanding DDOS Attack !!!

Image
What is DDos Attack ? Compromised PCs, or “bots,” are formed into groups called “botnets” and are used as weapons by cyber-attackers to launch various forms of cyber attacks. These attacks range widely from DDoS to identity theft and clandestine intelligence gathering operations. During Distributed Denial of Service attempts, attackers launch attacks using different techniques including HTTP, HTTPS, ICMP, SYN Floods, UDP Floods, DNS Request Floods, GET Floods, and others. The attack components are often used in combination, and range in size from a few hundred megabits per second (Mbps) to over 80 gigabits per second (Gbps). Increasingly sophisticated attacks are based around application requests at Layer-7. Normally, DDOS consists of 3 parts . One is the Master ,Other the slave and atlast the victim. The master is the attack launcher ie the person/machine behind all this,sound’s COOL right . The slave is the network which is being compromised by the Master and Victim is the target sit

NJVC’s Kevin L. Jackson Co-Authors INSA White Paper on Cloud Computing for the Intelligence Community

Image
Findings Reflect Insight from More than 50 Cloud Thought Leaders   VIENNA, Va.--( BUSINESS WIRE )-- NJVC ® , one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense , announces that a white paper addressing the risks and benefits of cloud computing for the intelligence community (IC)—co-authored by Kevin L. Jackson, NJVC vice president and general manager, cloud services—was released today. The Intelligence and National Security Alliance (INSA) released the white paper in conjunction with Government Executive magazine at a cloud computing panel discussion at the National Press Club in Washington. “The government-industry collaboration demonstrated by this study serves as an important model for us all. I thank everyone involved for their individual contributions in support of the whole.” The white paper, “ Cloud Computing: Risks

INSA Study on Cloud Computing in the Intelligence Community: Rollout 13 March 2012 | SYS-CON MEDIA

Image
( Originally posted by Bob Gourley at CTOvision )         Over the last year I’ve had the pleasure of serving with a team of volunteers from the Intelligence and National Security Alliance (INSA) as we dove deep into topics associated with Cloud Computing and the Intelligence Community . National security technologists have long been thought leaders when it comes to adopting advanced technology to serve important missions and have long been leveraging the emerging benefits of cloud computing and mission focused applications like Big Data . Our study sought to learn lessons from these pioneers in the IC and we also sought to provide useful information to the government from our interactions with industry. Frankly this last piece was quite a challenge, since the technologists working this issue in government are very well plugged-in to the developments in industry in this cloud computing space.  However, in the end, we believe we produce something that will help further t