Thor Olavsrud

Author Archives: Thor Olavsrud

MapR delivers support for containers, security

MapR Technologies today announced the general availability of the MapR Converged Data Platform, which brings Hadoop together with Spark, Web-scale storage, NoSQL and streaming capabilities in a unified cluster, designed to support customers deploying real-time global data applications. The Converged Data Platform features security, data governance and performance features enhancements built to meet enterprise requirements, and adds support for containers, including persistent storage and integrated resource management. + ALSO ON NETWORK WORLD MapR Aims to Take SQL-on-Hadoop to Next Level +To read this article in full or to leave a comment, please click here

11 cloud trends that will dominate 2016

Along with social, mobile and analytics, cloud technologies and models have earned a place as one of the core disruptors of the digital age. And while the cloud market has matured over the years, its interaction with the rapidly growing data and analytics landscape suggests there are plenty more disruptive opportunities for cloud in 2016. As 2016 gets underway, five insiders share their predictions for what 2016 holds in store for the cloud.[ Related: It’s a hybrid cloud world, and we’re all just living in it ]To read this article in full or to leave a comment, please click here

6 analytics trends that will shape business in 2016

In its recently released Analytics Trends 2016 report, consulting firm Deloitte predicts six major trends will significantly shape business in 2016."Business leaders continue to face many varying challenges and opportunities, and staying ahead of these trends will have a lasting impact on how their organizations will operate in the future," says John Lucker, principal, Deloitte Consulting. "By going on the offensive with issues such as cybersecurity, organizations are making a strategic shift in the way they operate. Concurrently, the widening data scientist talent gap could be a business growth barrier. One thing is certain: effectively using analytics is essential in delivering insights that help achieve new levels of innovation and value."To read this article in full or to leave a comment, please click here

Defending against insider security threats hangs on trust

When it comes to security, insider threats are an unfortunate fact of life. But if you're thinking only about combatting malicious insiders, you may be miscalculating the risk."The insider threat is much broader," says Steve Durbin, managing director of the Information Security Forum (ISF), a nonprofit association that assesses security and risk management issues on behalf of its members. "It isn't just about bad apples — people that are deliberately out to steal information or harm organizations."MORE ON NETWORK WORLD: Free security tools you should try The other two types of insider threats, Durbin says, are negligent insiders, who are aware of security policies but find a workaround, probably with the best of intentions, to get work done, and accidental insiders. A negligent insider, faced with the need to get a large file to a colleague, might turn to a non-approved Web-based file hosting service. An accidental insider might be a manager who is emailing employee performance reviews and miskeys an email address. Due to the magic of autocomplete, that email winds up in the wrong hands.To read this article in full or to leave a comment, please click here

5 information security trends that will dominate 2016

Every year, it seems, the threats posed by cybercriminals evolve into new and more dangerous forms while security organizations struggle to keep up.As 2015 draws to a close, we can expect the size, severity and complexity of cyber threats to continue increasing in 2016, says Steve Durbin, managing director the Information Security Forum (ISF), a nonprofit association that assesses security and risk management issues on behalf of its members."For me, 2016 is probably the year of cyber risk," Durbin says. "I say that because increasingly I think we are seeing a raised level awareness about the fact that operating in cyber brings about its own peculiarities."To read this article in full or to leave a comment, please click here

Organizations sloppy about securing privileged accounts

Companies' haphazard processes for managing administrative or other privileged accounts are putting them at risk of security breaches, according to a new global security survey.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The survey, conducted by Dimensional Research and sponsored by Dell, found that 83 percent of respondents face numerous challenges with managed privileged accounts and administrative passwords. That's not to say they lack procedure for securing them — nearly 80 percent say they have a defined process for managing them — but they're not diligent about it.To read this article in full or to leave a comment, please click here

Cloudera unveils in-memory store, security layer for Hadoop

Just ahead of the opening of Strata + Hadoop World in New York City tomorrow, Cloudera today unveiled a new open source project to enable real-time analytic applications in Hadoop and an open source security layer for unified access control enforcement in Hadoop.The first project, Kudu, is an in-memory store for Hadoop that supports high-performance sequential and random reads and writes, enabling fast analytics on changing data.To read this article in full or to leave a comment, please click here

Startup launches big data-as-a-service

For many enterprises, big data is hard and slow. Procurement and deployment of data infrastructure can be both expensive and difficult to scale at the pace that data volumes can grow. A startup founded by former Netezza executives says that the answer to these data engineering woes is the cloud. The startup, Cazena, came out of stealth today after two years of development with an enterprise big data-as-a-service offering intended to simplify and automate securely moving and optimizing big data processing in the cloud. It's a managed service platform that founder and CEO Prat Moghe — who served as senior vice president of strategy, products and marketing at Netezza — says addresses the security and complexity challenges that have kept many enterprises from migrating their big data workloads to the cloud.To read this article in full or to leave a comment, please click here

IBM woos cloud developers

IBM is stepping up its efforts to atract cloud developers. Big Blue today announced a three-pronged approach that includes a new collaborative platform to help developers stay on top of open source technologies, the release of 50 tools and services to the open source community and partnerships with 200 academic institutions across 36 countries. The new platform, developerWorks Open, is a cloud-based environment through which developers can download code and access blogs, videos, tools and techniques. The goal is to accelerate their ability to build and deploy open source apps.To read this article in full or to leave a comment, please click here

How IBM Watson apps are changing 7 industries

Watson transforms industriesSince IBM opened IBM Watson to the world last year, it has been building a developer and entrepreneur community around the development platform. The community now consists of more than 280 commercial partners, as well as tens of thousands of developers, students, entrepreneurs and other enthusiasts that are generating up to 3 billion monthly API requests on Watson.To read this article in full or to leave a comment, please click here

Microsoft adds MDM capabilities to Office 365

Microsoft today announced the general availability of mobile device management (MDM) capabilities for Office 365, which is designed to give administrators the built-in capability to manage access to data in the cloud-based productivity suite across iOS, Android and Windows Phone devices. The MDM features are available at no additional cost in all Office 365 commercial plans, according to Microsoft. "With today's GA, the first app every organization will look to secure and protect now comes with MDM capabilities natively built into it," Brad Anderson, corporate vice president, Enterprise Client & Mobility at Microsoft, wrote in a blog post. "This means IT admins can set up security policies on devices to ensure that O365 corporate email and data can be accessed only on phones and tablets that are managed and compliant."To read this article in full or to leave a comment, please click here

IoT revolution hinges on licensing, entitlement management

We may be in the midst of a third industrial revolution — one driven by intelligent devices connected to the Internet, enabling services, solutions and big data offerings around every day industrial and consumer goods. Software licensing and entitlement management will be the heart of this new industrial revolution, according to a report by Flexera Software and IDC."The industrial revolution came about as we moved from human labor to machine automation," says Steve Schmidt, vice president of Corporate Development at Flexera Software. "Then a second industrial revolution came about as systems were put in place and new energy sources became available: railroads, iron and steel production, manufacturing automation, the use of steam power, oil, electricity and electrical communications."To read this article in full or to leave a comment, please click here

1 3 4 5