Author Archives: Thor Olavsrud
Author Archives: Thor Olavsrud
With enforcement of the European Union's General Data Protection Regulation (GDPR) set to begin on May 25, 2018, organizations that handle any personal data relating to EU residents must begin preparing now, if they haven't already.Most organizations will need to designate a data protection officer (DPO), says Steve Durbin, managing director of the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management."The GDPR is putting data protection practices at the forefront of business agendas worldwide," Durbin said in a statement earlier this month. "Its scope is unmatched by any other international law, and we estimate that more than 98 percent of ISF members will be affected by its requirements because they process the personal data of EU residents, or are based in the EU. For most organizations, the next 18 months will be a critical time for their data protection regimes as they determine the applicability of the GDPR and the controls and capabilities they will need to manage their compliance and risk obligations."To read this article in full or to leave a comment, please click here
With enforcement of the European Union's General Data Protection Regulation (GDPR) set to begin on May 25, 2018, organizations that handle any personal data relating to EU residents must begin preparing now, if they haven't already.Most organizations will need to designate a data protection officer (DPO), says Steve Durbin, managing director of the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management."The GDPR is putting data protection practices at the forefront of business agendas worldwide," Durbin said in a statement earlier this month. "Its scope is unmatched by any other international law, and we estimate that more than 98 percent of ISF members will be affected by its requirements because they process the personal data of EU residents, or are based in the EU. For most organizations, the next 18 months will be a critical time for their data protection regimes as they determine the applicability of the GDPR and the controls and capabilities they will need to manage their compliance and risk obligations."To read this article in full or to leave a comment, please click here
Security, not availability, is now the number one priority driving the adoption of application services, according to a new report by F5 Networks.Applications are becoming core to the digital economy, and organizations are increasingly turning to application services to keep them humming. In its third annual State of Application Delivery report, F5 Networks found that the average number of app services used by organizations increased from 11 in 2016 to 14 today. Sangeeta Anand, senior vice president of product management and marketing at F5 Networks, adds that the average organization plans to deploy 17 app services in the next 12 months.To read this article in full or to leave a comment, please click here
Security, not availability, is now the number one priority driving the adoption of application services, according to a new report by F5 Networks.Applications are becoming core to the digital economy, and organizations are increasingly turning to application services to keep them humming. In its third annual State of Application Delivery report, F5 Networks found that the average number of app services used by organizations increased from 11 in 2016 to 14 today. Sangeeta Anand, senior vice president of product management and marketing at F5 Networks, adds that the average organization plans to deploy 17 app services in the next 12 months.To read this article in full or to leave a comment, please click here
Millennials in the workplace are increasingly taking on IT decision maker (ITDM) roles, and in pursuit of improved agility, they are pushing their organizations to embrace public cloud and adjust IT policies to better enable innovation, according to a study by Microsoft and Wakefield Research.As 2017 begins, millennials already represent a third of the workforce, and the Brookings Institute forecasts they will make up 75 percent of the workforce by 2025.To read this article in full or to leave a comment, please click here
As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017."2016 certainly lived up to expectations," says Steve Durbin, managing director of the ISF. "We saw all sorts of breaches that just seemed to get bigger and bigger. We lurched from one to another. We always anticipate some level of it, but we never anticipate the full extent. I don't think anybody would have anticipated some of the stuff we've seen of late in terms of the Russians getting involved in the recent elections."To read this article in full or to leave a comment, please click here
As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017."2016 certainly lived up to expectations," says Steve Durbin, managing director of the ISF. "We saw all sorts of breaches that just seemed to get bigger and bigger. We lurched from one to another. We always anticipate some level of it, but we never anticipate the full extent. I don't think anybody would have anticipated some of the stuff we've seen of late in terms of the Russians getting involved in the recent elections."To read this article in full or to leave a comment, please click here
As 2016 draws to a close, a new study suggests big data is growing in maturity and surging in the cloud.AtScale, which specializes in BI on Hadoop using OLAP-like cubes, recently conducted a survey of more than 2,550 big data professionals at 1,400 companies across 77 countries. The survey was conducted in conjunction with Cloudera, Hortonworks, MapR, Cognizant, Trifacta and Tableau.[ Analytics 50 winners for 2016 ] AtScale's 2016 Big Data Maturity Survey found that nearly 70 percent of respondents have been using big data for more than a year (compared with 59 percent last year). Seventy-six percent of respondents are using Hadoop today, and 73 percent say they are now using Hadoop in production (compared with 65 percent last year). Additionally, 74 percent have more than 10 Hadoop nodes and 20 percent 20 percent have more than 100 nodes.To read this article in full or to leave a comment, please click here
IBM believes blockchain technology, with its capability to create an essentially immutable ledger of digital events, will alter the way whole industries conduct transactions. To make that happen, Big Blue asserts, requires a complete ecosystem of industry players working together.To that end, IBM today said it is building a blockchain ecosystem, complete with a revenue sharing program, to accelerate the growth of networks on the Linux Foundation's Hyperledger Fabric. IBM envisions the ecosystem as an open environment that allows organizations to collaborate using the Hyperledger Fabric.To read this article in full or to leave a comment, please click here
"One thing you realize early on," says Luke Tillman, technical evangelist for Apache Cassandra at DataStax, "is that things are constantly changing."That's a fact of life for developers and their managers. It's true whether you're working with JavaScript front-end frameworks or databases."You almost feel bad for front-end developers," Tillman says. "A front-end framework gets hot for a year or two and then you've got to change."So first, Tillman says, you've got to accept that change is constant. That's the easy part.Finding their motivation (Hint: it may be $$$) "Once you accept that change is constant, the question is not only how do you stay relevant, but also what is your motivation for staying relevant," Tillman says.To read this article in full or to leave a comment, please click here
Wireless carrier competition in the U.S. is white hot — analysts increasingly see signs of wireless market saturation, meaning that growth is most likely going to come from competitors. Of the four major U.S. carriers, T-Mobile USA has led the way, slashing prices, killing the two-year contract and daring its competitors to follow suit.As competition intensifies, Finnish mobile technology provider Nokia believes customer service will emerge as an even more important key differentiator, and analytics and machine learning will take customer service to the next level in the U.S. and around the globe.In 2011, when AT&T announced its intention to acquire T-Mobile USA from Deutsche Telekom, it looked like the wireless market in the U.S. was well on its way to becoming a duopoly. Verizon Wireless and AT&T already held the lion's share of customers between them, and they both held licenses to the majority of wireless spectrum too. But then the Antitrust Division of the U.S. Department of Justice blocked the proposed $39 billion acquisition.To read this article in full or to leave a comment, please click here
Distributed database software vendor DataStax announced today that it had completed the acquisition of DataScale, a specialist in cloud-based management services for data infrastructure, paving the way for a fully managed version of DataStax's offering in early 2017."There is a huge need for an always-on, distributed database," says Martin Van Ryswyk, executive vice president of Engineering, DataStax. "Whether you're in retail, transportation, the hotel business — everyone has to have an online presence. That has driven this need for this type of database we've built.""What happens in these technology shifts, when something gets really important and really hot at a certain time, you start to get a skills shortage," he adds.To read this article in full or to leave a comment, please click here
Financial technology (fintech) products and services are picking up tremendous steam, particularly with younger, tech-savvy and affluent customers, according to the World FinTech Report 2017 (WFTR), recently released by Capgemini, LinkedIn and Efma (a global nonprofit organization composed of banks and insurance companies). But even as fintech firms reshape the financial services landscape, customers are struggling to trust them."We're seeing adoption across the globe," says Bill Sullivan, head of Global Financial Services Market Intelligence at Capgemini Financial Services. "It's not so much replacing incumbents as adding on."[ Related: How 3 fintech startups are shaking up security ]To read this article in full or to leave a comment, please click here
Financial technology (fintech) products and services are picking up tremendous steam, particularly with younger, tech-savvy and affluent customers, according to the World FinTech Report 2017 (WFTR), recently released by Capgemini, LinkedIn and Efma (a global nonprofit organization composed of banks and insurance companies). But even as fintech firms reshape the financial services landscape, customers are struggling to trust them."We're seeing adoption across the globe," says Bill Sullivan, head of Global Financial Services Market Intelligence at Capgemini Financial Services. "It's not so much replacing incumbents as adding on."[ Related: How 3 fintech startups are shaking up security ]To read this article in full or to leave a comment, please click here
Data and analytics are increasingly becoming central to business decision-making, especially in areas such as driving customer growth, improving productivity and managing risk. But even as organizations push to make their decision-making more data-driven, business leaders accustomed to making decisions based on gut-instincts and experience are having trouble trusting insights from data and analytics (D&A).Forrester Consulting, commissioned by the Data and Analytics Global team at professional services firm KPMG, recently surveyed 2,165 data and analytics decision-makers from a range of industries in Australia, Brazil, Canada, China, France, Germany, India, the U.K. and the U.S.To read this article in full or to leave a comment, please click here
The internet of things (IoT) is set to transform municipal life, according to government officials surveyed by the nonprofit trade association Computing Industry Trade Association (CompTIA)."Cities and city leaders are thinking more holistically about different uses of technology that are integrated and bringing different aspects of the city together into a unified whole," says Tim Herbert, senior vice president, research and market intelligence, CompTIA."Improved decision-making made possible through new or better streams of data ranks as the highest perceived benefit," he adds.How to build a smarter city In June and July of this year, CompTIA surveyed 172 government personnel with some degree of technology decision-making responsibility for its Building Smarter Cities report. It found that one-half of local, state and federal government personnel believe IoT and the smart cities enabled by IoT will definitely provide value. A further 39 percent felt IoT and smart cities would probably provide value.To read this article in full or to leave a comment, please click here
The likelihood that companies will experience a security incident continue to rise every year. While most organizations have put a data breach preparedness plan in place to combat such incidents, most executives aren't updating or practicing the plan regularly, according to study released earlier this month."When it comes to managing a data breach, having a response plan is simply not the same as being prepared," Michael Bruemmer, vice president at Experian Data Breach Resolution (which sponsored the study) said in a statement. "Unfortunately many companies are simply checking the box on this security tactic. Developing a plan is the first step, but preparedness must be considered an ongoing process, with regular reviews of the plan and practice drills."To read this article in full or to leave a comment, please click here
The likelihood that companies will experience a security incident continue to rise every year. While most organizations have put a data breach preparedness plan in place to combat such incidents, most executives aren't updating or practicing the plan regularly, according to study released earlier this month."When it comes to managing a data breach, having a response plan is simply not the same as being prepared," Michael Bruemmer, vice president at Experian Data Breach Resolution (which sponsored the study) said in a statement. "Unfortunately many companies are simply checking the box on this security tactic. Developing a plan is the first step, but preparedness must be considered an ongoing process, with regular reviews of the plan and practice drills."To read this article in full or to leave a comment, please click here
When it comes to cars, there can be little question that Formula 1 is at the bleeding edge, pushing the limits of engineering. So, it is fitting that it is now helping to push the limits of virtual reality (VR) and augmented reality (AR).For the third year running, the motor racing competition's "Official Connectivity Provider," Tata Communications (also the Official Managed Connectivity Supplier of the Mercedes AMG Petronas Formula One Team), operated the F1 Connectivity Innovation Prize — which seeks to leverage F1's legacy of innovation to inspire fans around the world to harness their technical expertise and passion for the sport to drive their own innovation.To read this article in full or to leave a comment, please click here
While the internet itself was first envisioned as a way of enabling robust, fault-tolerant communication, the global routing infrastructure that underlies it is relatively fragile. A simple error like the misconfiguration of routing information in one of the 7,000 to 10,000 networks central to global routing can lead to a widespread outage, and deliberate actions, like preventing traffic with spoofed source IP addresses, can lead to distributed denial of service (DDoS) attacks.The Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here