I’ve been into serverless technologies for a few years now. The thought of not having to care about what platform my code is executing on, or having to manage and operate it, resonated with my developer side that just wants to code. I also saw it as a possible catalyst for change in how we are developing applications using cloud provider services, one that allows services from multiple clouds to be pieced together to form a whole application…but more on that further down this blog!
Sunday, 25 February 2018
Friday, 23 February 2018
Security Threats – The New Reality for Utilities
Security experts agree: Cyberattacks are the new reality for utility companies.
A major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In 2016, 3.85 trillion kilowatthours (kWh) [EIA] was consumed in the U.S., enabling consumers, transportations, commercial and industrials business to perform their daily activities. No doubt that over the world, national and regional power grids are critical infrastructures requiring adequate protections such as the North-American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan.
A major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In 2016, 3.85 trillion kilowatthours (kWh) [EIA] was consumed in the U.S., enabling consumers, transportations, commercial and industrials business to perform their daily activities. No doubt that over the world, national and regional power grids are critical infrastructures requiring adequate protections such as the North-American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan.
Wednesday, 21 February 2018
How to Overcome Privacy Program Stumbling Blocks
Our Security Services team works with customers to navigate these waters.
who is a lead consultant in our Privacy and Data Protection Services practice. According to Steve, there are a few key areas where organizations can stumble:
◈ New dimensions of data access management
◈ Transparency
◈ Traceability and assurance
who is a lead consultant in our Privacy and Data Protection Services practice. According to Steve, there are a few key areas where organizations can stumble:
◈ New dimensions of data access management
◈ Transparency
◈ Traceability and assurance
Monday, 19 February 2018
Manufacturing mobility: Data, voice, video, and location
Manufacturers use wireless to increase margins, reduce cycle times, enable lean, and improve equipment productivity. While pervasive wireless connects sensors, tools, robots, AGVs, and RFID devices, it also enables mobility. Mobility supports far more than just cell phones, tablets, and laptops.
Very simply put, mobility drives data, voice, video and location applications.
Very simply put, mobility drives data, voice, video and location applications.
Friday, 16 February 2018
DevSecOps: Security at the Speed of Business
We will describe another key aspect of DevSecOps – developing security guardrails with a hands-on approach via Agile hackathons.
DevSecOps is about bridging DevOps workflows with Information Security (Infosec) Operations by embedding security as code during development, validation during testing and leveraging automation to run continuous operations. From many years in IT, we know that it’s a good idea to first prove ideas manually before we automate. Agile security hackathon is how we bring in participants from relevant disciplines within Information Security and application teams to first go through a set of implementation steps to configure the most important security requirements – the guardrails. With the winter Olympics in progress, this is akin to the guardrails that help a gravity powered Bobsled go faster along iced tracks in a safe manner.
DevSecOps is about bridging DevOps workflows with Information Security (Infosec) Operations by embedding security as code during development, validation during testing and leveraging automation to run continuous operations. From many years in IT, we know that it’s a good idea to first prove ideas manually before we automate. Agile security hackathon is how we bring in participants from relevant disciplines within Information Security and application teams to first go through a set of implementation steps to configure the most important security requirements – the guardrails. With the winter Olympics in progress, this is akin to the guardrails that help a gravity powered Bobsled go faster along iced tracks in a safe manner.
Wednesday, 14 February 2018
Continuous Integration and Deployment for the Network
The requisite for Continuous Integration and Deployment (CI/CD) pipeline being used in the network is growing. Continuous Integration and deployment helps counteract inaccuracies in daily network deployments and changes, hence is critically required. The upshot for change release and automated network testing is that changes are simplified, done more quickly and more streamlined, with CI/CD.
Monday, 12 February 2018
Five things that are bigger than the Internet: Findings from this year’s Global Cloud Index
The scale of the Internet is awe-inspiring. By 2021, there will be 4.6 billion people and 27 billion devices connected to the Internet, and Internet traffic will reach 2.8 trillion Gigabytes (or 2.8 Zettabytes) per year.
Even with multiple Zettabytes crossing the network each year, there are some things that dwarf even the Internet. We started the Global Cloud Index (GCI) seven years ago in order to capture the scale of data more generally, as it relates to the advent of the cloud. In our most recent report, there are five categories of data that meet or exceed Internet traffic volume by 2021.
Even with multiple Zettabytes crossing the network each year, there are some things that dwarf even the Internet. We started the Global Cloud Index (GCI) seven years ago in order to capture the scale of data more generally, as it relates to the advent of the cloud. In our most recent report, there are five categories of data that meet or exceed Internet traffic volume by 2021.