The digital society has emerged.
Today’s always-connected world and the applications we interact with are
changing the way we live. People are mobile, our devices are mobile, and by
all accounts, everything that is a noun – a person, place or thing – will
soon be connected and generating data… and all that traffic is destined for
an application – that could also be portable – located somewhere in a
But not all data traffic is created equally and critical information might
need some action that requires automation of the deployment process. At the
same time, organizations can’t afford to manually make policy adjustments
every time something needs attention. Automated coordination between
applications, data and infrastructure from provisioning to applying policies
and services which are in-line with business needs must be in place.
This is Orchestration.... (more)
2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your con... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)
As the march to connect each and every noun on this planet continues with a
blistering pace, the various ways, contraptions and sensors used to collect
data is greatly expanding. What once was a (relatively) small collection of
fitness trackers, smartwatches, thermostats, automobiles and surveillance
cameras has grown into a an industry where shirts, shoes, sleeping bags and
even liquor bottles want to gather your info. And most of these devices
monitor silently without you even knowing. According to Ryan Matthew Pierson
over at Readwrite.com, ‘The strength of IoT is in its abili... (more)
Phishing has been around since the dawn of the internet. The term was first
used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many
baited hooks and lures started dropping. Popular transaction destinations
like PayPal and eBay were some of the early victims of these spoofed sites
asking customers to update their personal and credit card information. By
2004, it was a full-fledged ‘get rich quick scheme’ with many financial
institutions – and their customers – as targets.
Oxford Dictionary defines Phishing as, ‘The fraudulent practice of sending
emails purpor... (more)