IT Industry

Home/IT Industry

HP plans to invest $1B in open cloud services

By |May 26th, 2014|Categories: Cloud Computing, IT Industry, Tech News|

IDG News Service – Following a similar move by IBM, Hewlett-Packard is unifying its cloud portfolio under a single architecture and brand name, called HP Helion.

The company has pledged to invest $1 billion in open cloud products and services over the next two years, along with community-driven, open-source cloud technologies.

“Just as the community spread the adoption of Linux in the enterprise, we believe OpenStack will do the same for the cloud,” said Hewlett-Packard CEO and President Meg Whitman, in a webcast announcing Helion Tuesday.

Customers have been asking for open-source-based cloud technologies, Whitman said. Harnessing the collective effort around open-source projects such as OpenStack, “the result is something that is more flexible, secure and affordable than any one company could do alone,” she said.

A distribution of OpenStack, called Helion OpenStack, is the first Helion component HP has released. Helion OpenStack will serve as the cornerstone for the Helion line of […]

Time to Limit the Cyber Arms Race

By |May 20th, 2014|Categories: IT Industry, Security, Tech News|

We are in the middle of the biggest arms race since the Cold War, one that could lead to cyberwar, which we discussed in a recent post. Massive amounts of money are globally put into building cybercapabilities for defense, offense, and intelligence. This development is part of a large on-going trajectory: the strategizing of cyberspace and its movement into the national security sphere. Curiously, it is not the amount of weapons that serves as the defining factor in the race. It is the skills that people have and the level of technology they are able to develop.

A cyberweapon needs to be up to date on the target system, capable of exploiting a vulnerability that the defenders are not aware of, and able to create the desired impact. This makes cyberweapons products that cannot be stockpiled and shelved for a long period or used when needed. […]

Lenovo set to launch cloud-based services for mobile devices, data centers

By |May 18th, 2014|Categories: Cloud Computing, Data Storage, IT Industry, Mobile/Wireless Devices, Tech News|Tags: , |

IDG News Service – The ability to come up with cohesive cloud offering has eluded Lenovo for years, but the company is taking steps to offer more services that it can wrap around its mobile devices and enterprise products.

Lenovo subsidiary Stoneware is planning to offer hosted application services that will build on existing secure cloud and virtual desktop services. Lenovo opened its first public cloud service just a year ago, building it around technology acquired from Stoneware in September 2012.

Stoneware’s current WebNetwork virtual desktop offering is more like a cloud desktop, with a browser-like interface providing access to remote applications, storage services and other Web application services. The tiled user interface provides access to applications like Microsoft Office and Adobe Photoshop, which are hosted in data centers and don’t need to be downloaded and installed locally on mobile devices and PCs. The cloud desktop […]

Citrix adds desktop management to XenMobile

By |May 16th, 2014|Categories: Cloud Computing, IT Industry, Tech News|Tags: |

IT staff will be able to manage Windows 8 desktops in addition to mobile devices

May 6, 2014
(IDG News Service)

Citrix Systems wants to manage desktops and mobile devices with the latest version of XenMobile, and is also working on making it easier for XenApp users to upgrade.

Citrix is this week gathering employees, partners and customers for the company’s most important event, the Synergy conference in Los Angeles. The main theme this year is Citrix’s continued efforts to let users access data and apps on any device, and let the IT department manage and secure all of it, according to Matt Morgan, vice president of corporate product marketing management at Citrix.

To get closer to that goal, Citrix is announcing upgrades, new products and demonstrating technologies the company’s developers are working on. That includes XenMobile 9, a […]

EMC takes on Amazon’s cloud service with cheaper alternative

By |May 15th, 2014|Categories: Cloud Computing, IT Industry, Tech News|Tags: , |

IDG News Service – EMC is taking on Amazon’s cloud storage service with a private cloud platform it says will cost less to use.

The Elastic Cloud Storage Appliance, launching on Monday at EMC World and delivered by the end of June, is a hyperscale storage system for enterprises to deploy in their own facilities. EMC previewed it last year under the code name Project Nile.

The ECS Appliance is part of a wider move into cloud and so-called software-defined storage by EMC, which is looking beyond traditional storage even as the company and most of its customers continue to rely on dedicated hardware platforms. Also on Monday, EMC is introducing ViPR 2.0, an update to its storage virtualization and management software, while rolling out a data-protection appliance for midsize customers under the Data Domain line.

EMC says the ECS Appliance is as easy to use as public cloud storage […]

Unisys unveils invisibility cloak for network traffic

By |May 15th, 2014|Categories: IT Industry, Networking, Networking – Wired & Wireless, Tech News|Tags: , |

Network World – If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

Stealth has been around since 2005, when it was developed exclusively for the Defense Department, which remains one of its largest customers. Several years ago Unisys took it to commercial enterprises and has paid for various independent tests to try to compromise the system, all of which have failed.

This is because Stealth uses four layers of security: each packet is encrypted with AES256, then split into three separate pieces and dispersed across the network, destined for a particular group of users that have to be running its protocols.

To deploy Stealth, you create virtual “communities […]

CIOs Face BYOD Hard Reality: Employees Don’t Care

By |May 9th, 2014|Categories: IT Industry|

By Tom Kaneshige

April 25, 2014 09:07 AM ET

CIO – CIOs fret about corporate data security on “Bring Your Own Devices,” or BYOD, but do employees care? A good number of them — 15 percent — believe they have no to minimal responsibility to protect data stored on their personal devices, according to a recent survey from Centrify, an identity management software provider.

“It is clear organizations need to continue to educate employees on the dangers and risks of mobile security but also look to solutions that safeguard the devices and applications which these employees have access to,” says Michael Osterman, principal analyst with Osterman Research.

Centrify surveyed more than 500 employees at mid-to-large companies and found a startling disconnect between perceived BYOD risk and reality.

Nearly half of those surveyed have more than six third-party apps on their BYOD products, and more than 15 percent have had their personal account or password compromised, […]

Security lessons from RSA

By |March 5th, 2014|Categories: IT Industry, Tech News|

The RSA Conference, the flagship meetup for cryptography, information security, and IT experts from around the world, just wrapped on Feb. 28. I attended panels, talked to professionals about security, and learned a couple of new lessons about personal protection in the age of big data.

There were a lot of lessons from RSA, most of them concerning IT Professionals. Some were about enterprise-level security, and a few were on the relationship of government and big data. But what can the average consumer cull from these discussions? Read on, and take control of your online security and digital privacy.

1. The business of hacking

Hackers are no more evil than the average netizens, nor are they loners. Hackers have their own social communities around their illicit activities. Whether they’re trying to make money off stolen data (cyber-criminal), taking a stance (hacktivist), or just keeping tabs (surveillance), hackers have turned hacking into a business, […]

Gmail takes a Friday timeout

By |January 24th, 2014|Categories: IT Industry|

Google’s Gmail service, which provides e-mail for around 450 million people, went offline Friday around 11:04 a.m. PT. Service began to return for many Gmail users 25 minutes later, although some are still without full service.

Related stories:

A Google spokesperson said that the company is looking into the outage.

Google quickly updated its apps status dashboard to reflect that Gmail was down. Officially, the company flagged the outage as a “service disruption,” and not a “service outage,” although that’s probably little consolation to people who weren’t able to access their Gmail. Google has updated the dashboard to show service disruptions for Gmail, Calendar, Talk, Drive, Docs, Sheets, Slides, Drawings, Sites, Group, Voice, and Google+ Hangouts.

Coincidentally, Google site reliability engineers were hosting a Reddit “Ask Me Anything” during Gmail’s naptime.

Twitter exploded with the expected snark of the masses, including competitor Yahoo, which also tweeted the news with a […]

IBM sells its x86 server business to Lenovo for $2.3 billion

By |January 23rd, 2014|Categories: IT Industry|

An expected deal to sell off its Intel-based servers to the Chinese electronics company has arrived, reflecting the shifting realities of the market for powerful networked machines.

Stephen_Shankland2_60x432

January 23, 2014 2:33 AM PST

Giving up a years-long fight for profits in a highly competitive part of the market for powerful networked machines, IBM has agreed to sell its x86 server business to Lenovo for $2.3 billion, the companies announced Thursday.

The x86 server line use Intel and AMD microprocessors — typically beefed-up cousins to those that run the vast majority of personal computers. IBM in 2005 sold its PC business to Lenovo, too, but it’s keeping its other server lines — its mainframes and those that use its own Power processors.

The sale reflects the changing dynamics of the market for servers, which provide services like hosting Web sites, tracking inventory, and managing banking transactions. […]