Question of the day: Will technology end up being our ultimate downfall? In the not-so-distant past, I wrote a series of blog posts on the expectation of privacy with user device tracking. If you are interested, you can check them out here. Lately, there have been a few things in the news that make it worth writing another post in that series.
Use of the cloud depends upon ubiquitous networking. And not just everywhere, but extremely high speed as well. This came to mind as I was sitting at the top of a mountain in a national park and heard someone ask Siri a question. Siri’s response was that the network was not in reach. This struck me as funny, then odd, then sent me down the path of ubiquitous networking. We are in the age of the Internet of Things (IoT), and if we do not have a network, then IoT fails rather spectacularly. So, what are the real requirements for IoT? Continue reading Cloud Dependency: Ubiquitous Networking
Google has delivered live migration in its Google Compute Engine cloud offering. Now comes word from Barb Darrow at Gigaom that Amazon is working on live migration as well. Is it possible that the cloud bambies are waking up to the fact that not all applications are stateless and that for many applications, shutting down instances is simply unacceptable? Are the cloud bambies waking up to enterprise requirements for availability and performance management?
There are two distinct points of view when discussing cloud security: the tenant’s point of view, and the cloud service provider’s point of view. Both of these points of view are legitimate, but often one is confused for the other, as we discuss our points of view without really clarifying. However, within each of these points of view are two distinctly different approaches to cloud security.
The recent spate of news out of Home Depot and, further back, Target point to the need for better supply chain security. But really, how can we address the issue? There are several answers, but none of them seem feasible in today’s IT environments. Why? They all require open communication, constructive criticism, and willingness to work toward a solution. However, what we find is that many IT organizations feel that anyone outside their immediate organization is suspect, security is the enemy, audit is also their enemy, and developers know all. Continue reading Supply Chain Security