We continue to see an increasing trend in cyber-attacks in line with the
growth of new technologies, and enterprises have to protect themselves. It is
critical for enterprises to devise their own measures to protect against
cyber-attacks because any tolerance on this front is more than an IT issue
but may affect the very existence and the business model of the enterprise.
We have seen in a recent incident where a cyber-attack prevented a large
enterprise from performing their basic business process.
Limitations of Policy Based Approach
In the past decade to mitigate the risk of cyber-attacks, enterprises usually
appointed security officers and they ensured typical Zero Tolerance Policies
on their network, applications, processes and people. Some of them include:
No access from home No external devices at work No access to the Internet at
work No access t... (more)
Windows 10: The Next Chapter
On January 21, 2015, Microsoft unveiled the next major beta of Windows 10,
the Consumer Preview, with an event at the company's home in Redmond,
Washington. As it is a major release for Microsoft we expected to see several
new features toward Microsoft's vision of ‘Mobile First' & ‘Cloud First'
and toward a Universal Application Platform across all of desktop, laptop,
mobile devices, gaming devices and other Internet Of Things.
Most of the preview predictions indicate the inclusion of Cortana Digital
Assistant as part of Windows 10. Cortana is not some... (more)
My Wish List From Microsoft Azure DevOps Solutions in 2015
As the DevOps movement is growing every day, naturally we find quite of lot
of vendors offering DevOps solutions.
The main reason for multiple different offerings from multiple vendors is the
lack of clear definition and understanding among the consumers of DevOps.
Most of the offerings back track from benefits of DevOps, as DevOps is all
about fast turn around of new business capability features from a software
product towards its end customers. This means that wide array of products
that aim at, faster provisioning (Cl... (more)
Fog Computing and the Growth of IoT Analytics Hardware in 2015
Internet Of Things - Hardware Play a Major Role: We see a great increase in
support from software platform vendors for IoT implementation in enterprises,
especially from bigger players. Up to now most of these support comes in the
form of software frameworks, platform, libraries and components, which
range from :
Agents : Help to connect different devices and source data from them. Hubs :
Provide the ability to queue messages from multiple agents and ensure that
the agents are not waiting for the consumption Stream ... (more)
The adoption of the Internet Of Things (IoT) is growing and its growth is
synonymous with the growth of Cloud. As per predictions from IDC:
IoT and the Cloud: Within the next five years, more than 90% of all IoT data
will be hosted on service provider platforms as cloud computing reduces the
complexity of supporting IoT "Data Blending".
This means that any organization that wanted to transform themselves using
IoT has to automatically embrace the cloud too, especially the public cloud.
This brings in an important aspect with respect to the CIO mindset that cloud
is no longer an op... (more)