IDG Contributor Network: The new Rogue IT: A growing, invisible threat to your IT operations

Back in the day, “rogue IT” typically entailed departments building servers and putting them under their desks in an attempt to circumvent the IT department and all of the pesky security controls that came with IT-approved servers.

Often, those servers sat under a desk, inside a closet or back room — unpatched, unprotected, and non-compliant — for long stretches of time before finally being discovered. 

Those were the good ol’ days, compared to the new type of rogue IT that’s quickly spreading through today’s IT landscape. It’s invisible, nearly undetectable, and completely unacceptable, to say the least. 

The new rogue IT involves departments buying things online (think Amazon Web Services, Google Services, and Microsoft Azure), and setting up off-the-books IT operations outside of your organization’s boundaries. 

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: 2016: The year of IT-driven solutions to business problems

It wouldn’t be the beginning of a new year without two hallmarks: resolutions and predictions. My 2016 resolution is to help companies understand the importance of strong financial management when moving into hybrid clouds. Every day, I’m reminded by examples I hear, read, and experience which remind me that, if you don’t start with a strong financial management foundation, things quickly get out of control in the highly scalable and automated world of cloud.

As for my predictions, they too focus on hybrid cloud. In 2015, we saw the C-suite begin to recognize the pervasive force of both private and public cloud, and 2016 promises to be the year of hybrid cloud as the two merge into a single offering. 

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Cloud is now a core strategy — are you onboard?

What are clouds?

That’s a question a child might ask, but for CIOs today, the answer centers on a completely different meaning. Top tech chiefs and company executives are trying to figure out how to use cloud technology and to what degree it should be part of their company strategy.

Without a doubt, statistics show the cloud can no longer be ignored:

  • According to a Gartner study cited by Information Age, public cloud spending increased 32 percent in 2015 and is expected to reach $ 16.5 billion this year
  • A Forbes survey found 93 percent of organizations run cloud applications, and 82 percent of enterprises have a hybrid cloud strategy
  • A Verizon survey found that cloud strategies enabled 69 percent of respondents to reengineer their business processes

Security, however, remains a top concern. To find out more about the use of cloud, I connected with Bryce Austin, CIO and CISO at Digineer and a cybersecurity expert. We talked about cloud strategies, misinformation about security issues, and why public and private clouds are part of a sound strategy. 

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: How to keep Office 365 migration costs in check

Microsoft’s Office 365 – the cloud-based version of Microsoft’s flagship productivity software solution – is growing by leaps and bounds. The enterprise adoption rate of Office 365 has nearly tripled since 2014 and some estimate the offering is now the most widely used business cloud application available – even more than Salesforce.com.

With adoption rates reaching new highs, enterprises are more motivated than ever to join their peers in the Microsoft Office cloud. But migration to Office 365 is rarely a simple process and it’s easy for costs to spiral upward.

Here are seven questions to ask to keep Office 365 migration costs in check, and optimize usage rights and flexibility:

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: U.S. Postal Service will scan your mail and email you images before delivering

Who else has ambled down to the mailbox only to find it full of junk, or disappointingly devoid of eBay purchases?

I have, and although I enjoy the chance for a gasp of fresh air after an electron-infested session at the computer, the sojourn can often be a bit of a waste of time.

That may be about to change, though.

The U.S. Postal Service has caught on to this often-failed, bizarre ritual for possibly millions of people each day, and is now sending scanned images of the actual mail pieces as it processes them to some customers’ inboxes.

Those customers can see the outside of the actual items being delivered before they make it to the mailbox.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Cloud: The engine of the omni-channel customer experience

In a recent conversation, I was asked what I felt was the driving force behind the technology innovations disrupting businesses across the globe. Expecting some sort of a cloud computing-centric answer, my inquirer was surprised when I answered “time.” Although cloud is certainly the engine underpinning many tech advancements, the driving force is the conservation of our most precious resource: time. 

We have created a connected world in which we have blasted through barriers to cram as much as possible into our daily lives. We save time by doing research online. We save time by texting when we can’t talk. We save time by letting a GPS-enabled map guide us to our destination. Given all the enabling technologies at our disposal, it’s no surprise our expectations from online transactions are projected onto our offline life. These mismatched expectations are the core reason why businesses are shifting from a multi-channel customer experience strategy to omni-channel.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Why enterprise DevOps will make IT organizations and CIOs relevant

Digital business is changing the competitive environment; the proliferation of startups created by highly qualified unemployed seniors and entrepreneurs, the increasing adoption of cloud which reduces IT cost and the Internet of Things substituting traditional services with digital services are forcing business lines (BL) to opt for new paradigms. Market responsiveness achieved through flexible IT environments is what they need; extending DevOps to competitive and revenue issues and establishing it as the foundation of IT operating models is what’ll make IT organizations relevant. That’s what enterprise DevOps is about.

Why DevOps initiatives struggle to meet BL expectations

Despite its accelerated adoption, DevOps remains either misunderstood or improperly implemented. Today’s implementation approaches have several weaknesses: 

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: How Microsoft is changing its strategy with Dynamics

Go back a handful of years and Microsoft was seen as a big, bad, monolithic vendor that was very much resting on its laurels. The change of CEO marked a turning point for Microsoft, however, and under Satya Nadella the company has shown itself to be innovative, nimble, and a pragmatic operator. This is perhaps best seen in Azure, Microsoft’s cloud platform, which most commentators see as the most credible public cloud after Amazon Web Services (although, it has to be said, Azure is a distant second to the AWS powerhouse). The company has also done great work with its office productivity applications – Office 365 is now seen as a truly credible cloud office productivity and collaboration offering.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Microsoft moves to answer those pesky Safe Harbor concerns

A few weeks ago when the news came out that Safe harbor provisions would no longer be a safe haven for U.S. vendors doing business in Europe, there was plenty of concern about what it would mean for the largest U.S. cloud vendors — Salesforce, Microsoft, Google and Amazon Web Services (AWS) all have massive business in Europe and relied on the Safe Harbor provisions to keep customers feeling secure.

It didn’t take long to see some reactions from the vendor side and just this week Microsoft announced a plan to offer many of its cloud services, including Azure, Office 365 and Dynamics CRM Online, served directly from data centers in Germany. But that in itself isn’t particularly innovative, and may not actually resolve the issues around jurisdiction. So Microsoft is moving beyond simply having in-country data centers and are delivering services in Germany via a third party. 

To read this article in full or to leave a comment, please click here

Computerworld Cloud Computing

IDG Contributor Network: 4 considerations for minimizing (or eliminating) your mean time to innocence

Your users are complaining: some system is down or slow. You need to determine if the problem is under your control or if the fault lies with a third party, such as your ISP or a SaaS provider. The time it takes to figure that out is your MTTI: “Mean Time to Innocence.”

At the recent O’Reilly Velocity show in New York City, my colleague, Phil Stanhope, talked about this topic. He pointed out a few important reasons why determining MTTI is so much more complex now than it was 10+ years ago. The Internet is increasingly complex and routinely experiences outages, instabilities, and attacks. While cloud providers, CDNs, and acceleration services may claim to be “always up,” that doesn’t mean that they’re “always reachable.” In fact, they are almost certainly experiencing a constant rate of low-level failure that is largely outside IT’s control and is still affecting users. Therefore, getting to MTTI is harder than ever.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: How CIOs can reinvent IT with ITaaS

In recent years business lines have been increasingly going the shadow IT route to achieve their critical objectives, showing there’s a real disconnect with IT as to how to leverage cloud computing.

The problem lies with cloud vendors who ignore the issue of the business vision. They see low IT costs and accelerated application delivery as business growth drivers while businesses are more concerned with market responsiveness achieved through agile and collaborative environments that bring together the business and IT.

The business is right: organizational silos, hierarchical barriers, unclear business priorities and people issues like power struggles, resistance to change, defiance of policies and politics are all impediments that only make it more difficult to achieve flexibility, fast problem solving and decision making. 

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

IDG Contributor Network: Drones are part of the Internet of Things, drone maker says

We can thank a guy named Todd Harper, who managed to successfully capture foot-cam videos of 3D Robotics’ chief Chris Anderson giving the keynote speech at the InterDrone show earlier this month and put them on YouTube (Parts One and Two). 

InterDrone is a conference and drone expo. 3D Robotics, or 3DR as it’s sometimes called, is major drone maker, with some of its funding from Qualcomm.

I’ve written about Qualcomm’s recent drone chip development in “Intel, Qualcomm getting into drones.”

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

Yahoo tackles large ‘malvertising’ campaign in its ad network

Yahoo said Monday it had removed malware from its advertising network, after malicious code there had gone undetected for at least six days.

Security researchers at Malwarebytes said they discovered malicious ads planted in Yahoo’s network on Sunday and alerted Yahoo. The malware attack had been underway since last Tuesday, wrote Jerome Segura, a senior security researcher at Malwarebytes Labs.

The malware was found in Yahoo’s ads network at ads.yahoo.com, which runs ads across Yahoo’s sites like its finance, games and news portals, as well as Yahoo.com. Users may have come across the infected ads when visiting Yahoo’s sites.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

IDG Contributor Network: Devops in an application-centric cloud world

The application-centric cloud development model becomes a devops approach to managing applications. Traditional cultural differences between developers and operations are very pronounced in the current information technology environments, but devops brings forth a blended approach to moving applications and a much quicker and more agile approach to the application-centric cloud.

Devops also makes both sides responsible for the success of the application. It’s not only true for an application cloud, but also for the third platform that IDC calls the new environment, or the bifurcated platform, as Gartner calls it. The reason for the new model is that one cannot wait for the cycle times that were created by the old model to facilitate the service level agreements that most companies need to be competitive.

To read this article in full or to leave a comment, please click here

InfoWorld Cloud Computing

The Need For People To Look For The Right Computer Network Support

There is little disputing the prominent role of the computer in todays hectic and competition-driven social environment. Its status as an extraordinary piece of equipment gets reinforced by ceaseless inventions, while adding to its practical usefulness. No home or workplace should be without one. Its latest developments aside, you also need to keep track of its smooth functioning and link up with related equipment. For this reason, computer network support is vital.

Although it might sound simple, finding the right provider to offer you these services might not be that easy. This is because you are not only looking for a provider with the certifications but one with all the required knowledge. This is not debatable as the technicians must be able to deliver in keeping your systems fully functional.

Some of the areas that the company should have knowledge in include the ability to expand the network when the need arises, installing hubs or even cutting cables to add new connectors. This means they must be conversant with the protocols followed.

Apart from offering support on hardware, it is also very important to consider the software and data section which is very significant. For instance the task of keeping your firewalls intact is very important as it is the only you can be assured that the information within your system is secure. They should also be able to suggest the best antivirus software to keep your computers safe from virus attacks.

Another area where such a company will play an important role is managing the company websites. With almost every company having their own website it would help you cut costs if you get a provider who understands corporate networks and web development. This will also provide you with a smooth working environment hence leading to a higher productivity.

Company networks have also advanced to other areas such as security. For instance, you might want to install a process control and security video system. With the increasing internet bandwidths, you might also want to install a video conferencing system which can greatly reduce travel costs for the company. All these are somehow related but you will need a provider who understands them in depth in order to have smooth operation.

Remember that the most appropriate computer network support companies should provide you with solutions regarding improvements, security and communication matters.

The computer can be utilized for multiple things, including jobs, research, studying and many more things. If you need to know about computer network support, then let us help you figure it out..