Nation States move from passive to active cyber defenses

Nation States move from passive to active cyber defenses

Look for evidence in the public domain that any government has admitted to targeting another government’s civilian or military digital infrastructure and you won’t find much, for obvious reasons.  To date, almost all official rhetoric has been about defending citizens and infrastructure against foreign states, but that is changing.

Blockchain Enabled Industrial Strength Trust for Modern Business Environments

Blockchain Enabled Industrial Strength Trust for Modern Business Environments

Practitioners in the telecommunications space are almost universally aware of the ISO/OSI network management models. These models, along with work done in the International Telecommunications Union, have long defined the dominant model for fault, configuration, account, performance, and security management, or FCAPS.

Over the last two to three decades, FCAPS has become a proven approach to network management that works very well in a centralized, single-provider environment.

Finding the Content, You Want

Finding the Content, You Want

Let’s say you’re looking to find content on a particular subject. In the past, you would use the standard search engines like Google or Bing, from Microsoft. But given how much energy and money goes into things like search engine marketing and search engine optimization, you’ve come to realize that search is not the same as find and that the search engines are not helping you discover what you are looking to find.

Cloudmageddon: the bifurcation of builders and buyers

Cloudmageddon: the bifurcation of builders and buyers

For decades, the people who bought infrastructure were the same people (or at least working for the same company) as the people who used that infrastructure. Put less obtusely, companies were responsible for buying, building, and ultimately using the compute, storage, networking, and applications on which their businesses relied.

Why Do Factories Need a Digital-Ready Infrastructure?

Why Do Factories Need a Digital-Ready Infrastructure?

Digital transformation, digital business, digitization, digital disruption. There are countless ways to phrase it, but it boils down to this. When digital technologies enable new business models, that’s digital transformation. Digital factory initiatives are generating incredible business outcomes, and at the core there’s a common denominator—a digital-ready infrastructure.

New Trends or News Trends

New Trends or News Trends

The technology world is often abuzz with what’s going to be the latest and greatest. But often, the so called “new trend” is really a news trend.

Let’s take what leading research firm Gartner predicted back in late 2016 as being the top technology trends for 2017. While these are all very much in the daily news we all read and consume, for the most part we’re either not yet touched by them, or for those of us who are, are likely in the industry developing the technology, promoting the technology or considered a really early adopter.

IoT Isn’t Just About the ‘Thing’

IoT Isn’t Just About the ‘Thing’

Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations and sources, to drive decision making is a key asset of the IoT and one that will help organizations to reap the financial benefits it promises.