Hacking Wars and #MachineLearning | @CloudExpo #API #ML #BigData Fri, 30 Sep 2016 11:00:00 EDT It feels like the barbarians are continually at the gate. We can’t seem to go more than a week before a new data breach is in the news, impacting potentially millions of individuals. The targets range from companies like Omni Hotels, which had been breached affecting up to 50,000 customers whose personal and credit card information was exposed, to North Carolina State University, where over 38,000 students’ personal information, including their SSNs, were at risk. As I mentioned in a recent blog ‘Internet of Things and Big Data – who owns your data?’, we have been storing our personal and credit card information in a variety of systems, credit card companies, banks, online retailers, hotels - and that’s just naming a few. The information in those systems is more valuable than gold to the hackers. The hacker attacks are constant, creative, and changing frequently.
[session] Embedded #IoT Device Security | @ThingsExpo #BigData #IIoT #M2MFri, 30 Sep 2016 10:45:00 EDT Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security has to be weaved into processes without affecting operational reliability, uptime, efficiency and safety requirements. This issue is compounded by the magnitude of smart and connected devices that are projected to be disseminated throughout the network in all verticals.
[video] @HGSTStorage Approach to #Storage | @CloudExpo #SDS #DataCenterFri, 30 Sep 2016 09:30:00 EDT Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here
In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discussed how a new approach is necessary, one that supports the attributes of the cloud with the millions of applications and users depending on it for their business and personal lives. Object storage is the millennial approach to cloud-based data storage, archival, retrieval and cost. Why? Because it delivers significantly higher data reliability and allows virtually unlimited expansion for storage. Perfect for a hash-tagging, selfie-taking, always communicating and collaborating in an on-demand world.
[session] Holistic IoTification | @ThingsExpo #IoT #M2M #DigitalTransformationFri, 30 Sep 2016 05:00:00 EDT Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls?
In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this framework: Anatomy, Ramp-up, Use case, Business case, Architecture, Technology selection, Implementation, and Platform (ARUBA TIP). The interdisciplinary techniques and anti-patterns of this method will be discussed, along with best practices and lessons learned, to help organizations transform to and enable IoT effectively.
Shift in IIoT #Monitoring | @ThingsExpo #IoT #IIoT #M2M #DigitalTransformationFri, 30 Sep 2016 03:00:00 EDT There’s been a seismic shift in monitoring earthquakes via the Industrial Internet of Things (IIoT) with advanced Machine-to-Machine (M2M) technology having reshaped the industrial communication industry. Every device or machine along the network, even at the outermost edge, now has the opportunity to be fully-connected for automated collection and delivery of information. As Sensor-2-Server (S2S) communication technology evolves to keep up with the demand for this connectivity paradigm, new efficiencies are created and Big Data is available to drive actionable intelligence.
M2M and #MachineLearning | @ThingsExpo #IoT #M2M #IIoT #API #BigDataThu, 29 Sep 2016 21:45:00 EDT Time and again, those keeping a pulse on the Internet of Things (IoT) space frequently hear about the “rise of the machines.” Humanity is not only discovering fascinating ways to integrate machines into our daily lives, but also finding new uses for machines as well. How? Machines are now “internet-connected” just like the smartphones we carry around in our pockets. And this isn’t just on the commercial side with the likes of smart thermostats or connected vehicles – even tractors and oil and gas machinery are industrial examples of where new “things” are now on the digital network.
[slides] #Kubernetes Cluster and #Ansible | @DevOpsSummit #Docker #DevOpsThu, 29 Sep 2016 21:45:00 EDT Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments.
In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MySQL cluster as a Kubernetes application.
Digital Transformation | @CloudExpo #BigData #IoT #DigitalTransformationThu, 29 Sep 2016 20:30:00 EDT Those that lead are able to collect and analyze data that followers can't. Think about the first climber to reach the top of the mountain, they have a new and different view slower followers don't. If you believe, as I do, that understanding data is the secret sauce of the digitally transformed enterprise, then having data not available to your competitors is a treasure!
Those that achieve digital transformation before their competitors will have advantages - and advantages have advantages. Not only do they have new experiences and new data to analyze and understand, they are able to develop and implement new strategies that make no sense to slower competitors without access to the new data. The digitally transformed can act on data invisible to slower competitors.
[session] How to Monetize Your Data | @ThingsExpo #IoT #M2M #BI #BigData Thu, 29 Sep 2016 15:15:00 EDT Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics.
In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organization in a “as-a-service” cloud model, and discuss the role that the data lake plays in monetizing the organization’s growing wealth of data.
Java Deserialization: Running Faster Than a Bear | @CloudExpo #API #Java #CloudMon, 20 Jun 2016 16:42:00 EDT Software components that were once good can sour instantly when new vulnerabilities are discovered within them. When that happens, the bears are coming, and you have to respond quickly.
Two men are walking through a forest. Suddenly, they see a bear off in the distance, running toward them. Adrenaline pumping, they start running away. But then one of them stops, takes some running shoes from his bag and starts putting them on.
“Frank, what are you doing?” says the other man. “Do you think you will run faster than the bear with those?”
“I don’t need to run faster than the bear,” Frank replies. “I just have to run faster than you.”
This scenario repeats itself every time a new security vulnerability is discovered in a widely used open source component. Imagine the bear as your adversary. Rushing to attack when easy prey is present. Your response time is critical.
IIoT Consortium @ThingsExpo Media Sponsor | #IoT #IIoT #InternetOfThingsTue, 31 May 2016 22:00:00 EDT SYS-CON Events announced today Object Management Group® has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Audit Certificate Inventory in Java/JDK | @CloudExpo #API #Java #CloudTue, 03 May 2016 09:35:00 EDT The purpose of this document describes how to generate a report for all the certificates using in the Java environment by using a simple shell script. The script checks all certificates that are stored in Keystores. The script generates a report in the form of CSV file and the report contains the hostname, Keystore Name, Certificate Alias, Issues to (common name), Issued by, Expire in number of Days and Expiration Date.
BMC Introduces MainView for Java Environments Enabling a Transaction Engine for Digital BusinessTue, 03 May 2016 08:04:00 EDT BMC has announced MainView for Java Environments. This integrated systems management solution provides complete insight into how Java is consuming resources and affecting application performance on the modern mainframe.
In the race to thrive as a digital business and to gain a competitive advantage, organizations are increasingly looking to Java for z/OS® to quickly develop applications. With the demand for instant service, always-available, high-performing applications, it is not surprising that 93 percent of mainframe organizations in a BMC survey said Java usage is growing or steady, and Java is the language of choice for writing new or rewriting existing mainframe applications. However, Java workloads can affect performance and availability on the mainframe, as they consume system resources without regard for the needs of other applications or services. An integrated management approach allows IT Operations a holistic view of the environment to quickly and easily discover Java Virtual Machines (JVMs) and to manage the effect of their resource consumption on application performance.
SAP Hybris: Achieving Omni-channel with Application PerformanceMon, 02 May 2016 12:01:00 EDT The retail industry is transforming in today’s digital age. Consumer behavior keeps evolving and online spending is skyrocketing. In addition, retail customers are looking for a blended online and in-store experience and expecting brick-and-mortar stores and online channels to be integrated through an omni-channel strategy. This requires retailers to become customer obsessed and strive to deliver personalized, convenient and seamless shopping experiences online and in the stores.