In This Issue
- 3X IP Traffic by 2020
- Reinventing the Web
- A DHS Cyber Reorg?
- Report from the CEO
- Cyber Commission
- Cybersecurity Threats
- Software as Weaponry
- Cybersecurity Militia
- NetApp: Changing IT
- Telefonica & PTC IoT
- DevOps Brings Agility
- ETSI Mobile-Broadcast
- Lawmakers Divided
- IoT Edge Computing
- Quantum Weirdness
- Vacuum Tube Tech
- Coming DCIA Events
According to today’s release of the Cisco Visual Networking Index (VNI) Complete Forecast for 2015 to 2020, global IP traffic will nearly triple at a compound annual growth rate (CAGR) of 22 percent over the next five years.
More than one billion new Internet users are expected to join the global Internet community, growing from three billion in 2015 to 4.1 billion by 2020.
The global digitization transformation, based on the adoption of personal devices and deployment of machine-to-machine (M2M) connections will have an even greater impact on traffic growth.
Over the next five years, global IP networks will support up to 10 billion new devices and connections, increasing from 16.3 billion in 2015 to 26.3 billion by 2020.
There are projected to be 3.4 devices and connections per capita by 2020-up from 2.2 per capita in 2015.
Advancements in the Internet of Things (IoT) are continuing to drive IP traffic and tangible growth in the market.
Applications such as video surveillance, smart meters, digital health monitors, and a host of other M2M services are creating traffic increases… Read More
Twenty-seven years ago, Tim Berners-Lee created the World Wide Web as a way for scientists to easily find information.
It has since become the world’s most powerful medium for knowledge, communications and commerce – but that doesn’t mean Mr. Berners-Lee is happy with all of the consequences.
“It controls what people see, creates mechanisms for how people interact,” he said of the modern day web.
“It’s been great, but spying, blocking sites, repurposing people’s content, taking you to the wrong websites – that completely undermines the spirit of helping people create.”
So on Tuesday, Mr. Berners-Lee gathered in San Francisco, CA with other top computer scientists – including Brewster Kahle, head of the nonprofit Internet Archive and an internet activist – to discuss a new phase for the web.
Today, the World Wide Web has become a system that is often subject to control by governments and corporations.
The House Homeland Security Committee on Wednesday will mark up legislation by Chairman Michael McCaul (R-TX) to reorganize how the Department of Homeland Security (DHS) protects critical infrastructure from digital threats.
The bill, set to be introduced Tuesday, would replace the National Protection and Programs Directorate (NPPD) with a new agency tasked with protecting the computer networks that run the nation’s power grid, water utilities and more.
The proposed agency – the so-called Cybersecurity and Infrastructure Protection Agency – would remain under the authority of the DHS, but would have operational capabilities.
The administration has pushed for a reorganization of the NPPD – which currently houses a cyber-focused office – but the particulars have been the subject of some quibbling between the DHS and lawmakers.
The agency has proposed three operational units within the renamed NPDD – an office of infrastructure protection, an “elevated and enhanced” cybersecurity office and the existing Federal Protective Service, which protects federal buildings.
McCaul’s legislation differs from the administration’s proposal in a number of key ways… Read More
What are your plans for next week?
On June 21st and 22nd, why not join with thousands of information technology enthusiasts at Cloud & DevOps World.
The DCIA is pleased to offer you a free VIP pass to attend the event, and all you have to do is click here and enter your contact information.
With case studies and thought leadership presentations from companies like Airbus, Google, Hotels.com, Twitter, and many more, Cloud & DevOps World will provide valuable insights to help you drive your business into the digital economy.
To view the online agenda please click here.
There are many other reasons why you should come to London to be part of this great event.
With conference tracks covering Cloud Computing, Big Data, Internet of Things (IoT), Security, DevOps, Containers, and Enterprise Mobility – plus their corresponding expo areas – you’ll find all the expertise and solutions you need all under one roof.
If you’d rather have a more practical experience, we’ve planned live demos, hands-on labs, and technical training sessions.
Meet-ups have taken London by storm as a new way for developers to access content and learn about new technologies, and the top two leaders in this space will be hosting a meet-up on the evening of Tuesday June 21st at London Olympia, so plan to attend that for a relaxed evening of networking and DevOps discussion.
In general, we’ve built-in more networking time, interactive sessions, and networking areas for you to meet with industry associates than at previous events.
Our expert speakers are end-users of technology who will be sharing their experiences implementing a variety of solutions and offer insights into future deployment strategies.
We’re especially proud to present the fourth annual Cloud & DevOps Awards ceremony, a celebration of excellence and innovation in the global cloud computing industry.
Featuring eight categories and hosted by Bryan Glick, Editor in Chief of Computer Weekly, the Awards ceremony will take place on Tuesday in the Expo Hall.
And finally, your VIP pass will provide access to the VIP lounge all day where we’ll be serving drinks and refreshments.
We look forward to welcoming you to Olympia in London on June 21st as our VIP guest. Share wisely, and take care.
A presidential commission dedicated to improving cybersecurity will meet in Berkeley, CA later this month to discuss the digital economy.
It’s the third meeting of the president’s Commission on Enhancing National Cybersecurity (CENC), and the first time it will gather on the West Coast.
At the April meeting, Sullivan advocated that the commission focus on inspiring government investment in proactive cybersecurity measures rather than its current approach, what he described as reactionary clean-up measures after breaches happened.
“Can we be the New Deal for the Internet?” asked Sullivan.
The groups will gather June 21st at the University of California’s Berkeley campus.
Since President Obama formed the commission in February, it has met twice – first at an April kickoff meeting in Washington DC, and in New York, NY last month to discuss cybersecurity in the insurance industry… Read More
As more businesses move online, criminals are following them.
If you’re still using yesterday’s cybersecurity strategies, you’re vulnerable to malicious attacks that could permanently damage your business.
It’s time to wake up and invest in learning about cybersecurity strategies.
When you run a small business, you might feel less targeted by cyber-criminals. But nothing could be further from the truth.
In reality, small and medium-sized businesses are much more prone to attack than large corporations.
Cyber-criminals aren’t necessarily hunting for large firms.
What they want is easy access and valuable data.
“It is the data that makes a business attractive, not the size – especially if it is delicious data, such as lots of customer contact info, credit card data, health data, or valuable intellectual property,” says Jody Westby, CEO of Global Cyber Risk… Read More
The internet was created nearly 40 years ago by men – and a few women – who envisioned an “intergalactic network” where humans could pull data and computing resources from any mainframe in the world and in the process free-up their minds from mundane and menial tasks.
“The hope is that, in not too many years, human brains and computing machines will be coupled,” wrote Joseph Carl Robnett Licklider, who was known as “Lick” and is the man widely remembered as the internet’s Johnny Appleseed.
Mr. Licklider joined the Pentagon in 1962, and his ideas later formed the basis for the military’s primordial internet work.
Even a big-vision idealist like Mr. Licklider could never have imagined that more than 50 years later, we would be telling the internet our deepest secrets and our whereabouts, and plugging in our smartphones, refrigerators, cars, oil pipelines, power grid, and uranium centrifuges.
And even the early internet pioneers at the Pentagon could not have foreseen that half a century later, the billions of mistakes made along the way to creating the internet of today and all the things attached to it would be strung together to form the stage for modern warfare… Read More
At a Monday speech, Senator Sheldon Whitehouse (D-RI) proposed a creating a new “militia” charged with performing network security tests across the entire government.
Currently, every government agency is in charge of its own security.
Whitehouse told an audience at the Center for Strategic and International Studies in Washington there should be a centralized cybersecurity inspector.
“A single, specialized office dedicated to federal cybersecurity, with authority to do white-hat tests of agency security, could attract world-class talent and would spur federal agencies to keep pace in the cyber arms race against hackers,” he said.
The new corps would not unseat the people currently in charge of various departments’ cybersecurity. Instead, Whitehouse suggests it would provide third-party oversight and perhaps even encourage agencies to more take responsibility for their own protection rather than be embarrassed by the militia’s oversight.
Whitehouse envisioned an ever-ready civilian core to perform these tests, similar to – or even under the auspices of – the National Guard… Read More
Disruptions to business models through cloud computing and flash are problems the IT industry needs to solve, according to NetApp, which laid out its channel plans at its Partner Executive Forum today.
Speaking at the Lisbon event today, Henri Richard, Executive Vice President of Worldwide Field and Customer Operations at NetApp, said, “In the IT industry, we have two fundamental issues at the same time: business model change and technology change.”
“Cloud disrupts the traditional business model and flash disrupts current technology models.”
“There is a fight ahead of us, and this is a fight that doesn’t take prisoners, just leaves dead bodies.”
In the opening presentation today, Richard said that the vendor racked up $5.5 billion in revenue for its financial year ending in 2016, adding that more than $4 billion of that figure was brought in by partners.
Telefonica’s Smart Device Service, which is comprised of device enablement and management capabilities, enables customers to transform their business with connected applications and services.
By using ThingWorx, Telefonica is extending the platform’s rapid application development, connectivity, and analytics capabilities, which help organizations reduce the time and cost of building, deploying, and achieving value from connected product and service applications.
Telefonica ´s Smart Device Service is fully integrated with Smart m2m, Telefonica ´s managed connectivity platform, to provide customers with complete visibility, control and management of the end to end solution.
With this agreement, Telefonica will offer customers business solutions that seamlessly integrate applications, networks and devices, enabling them to transform their businesses.
Telefonica’s operators will leverage ThingWorx’s components and global ecosystem of partners to deliver secure reliable IoT services… Read More
Moving to a DevOps approach in your organization has long been advocated as being a good idea – but what benefits does it provide?
A new piece of research from managed cloud services provider Claranet argues better quality of applications is the key reason to move over.
The study, which surveyed 900 IT decision makers across Europe, argues the classic reason for moving to DevOps, greater business agility, is not a catch-all.
Indeed agility (55%) was only the third most popular benefit, behind greater apps (60%) and a better understanding between employees (56%). Increased profitability (55%), better customer satisfaction (52%), and greater operational efficiency (50%) were also highly cited.
Not one person surveyed said there were no benefits of a DevOps approach in their organization.
Almost a third (32%) of firms polled said they are implementing DevOps practices, up from 26% the year before… Read More
Europe’s ETSI has transformed itself in recent years from a sleepy organization to a genuine trailblazer in defining new network architectures.
Its Network Functions Virtualization (NFV) project has created a widely accepted basis for carrier-grade virtualization and accelerated adoption to a surprising degree; its related Mobile Edge Computing (MEC) initiative is a key element in harnessing the convergence of telecoms and IT, and enabling new operator models based on the distributed cloud.
The group is not standing still either.
Both NFV and MEC prefigure key concepts which will underpin 5G, and the organization sees itself having a part to play in pushing the discussion on from academic R&D to deployable commercial solutions.
It has helped to do that in NFV – which will be part of commercial trials and roll-outs for over one-third of MNOs by the end of next year – and is now turning its eyes on 5G.
Last month, it brought together researchers from many R&D programs within the European Union’s Horizon 2020 initiative… Read More
The Senate is taking up its version of an annual defense bill, setting the stage for debate over a change in authority for US Cyber Command.
A House-passed version of the annual defense bill directs the president to elevate the Pentagon’s top cyber unit to a standalone warfighting entity.
But the current version of the Senate bill lacks that provision. A bipartisan group of senators wants to bring the Senate version of the National Defense Authorization Act (NDAA) in line with its House counterpart.
The amendment would pull Cyber Command out from under the authority of Strategic Command, from which it currently must obtain permission before conducting cyber operations.
The move appears to have widespread support from lawmakers, as well as Adm. Michael Rogers, the unit’s head. He said last month that elevating the unit to a full combatant command would make it more nimble and “generate better mission outcomes.”
PTC today announced at LiveWorx 2016 that it is expanding its Internet of Things (IoT) technology platform by delivering comprehensively distributed, real-time edge computing capabilities, specifically designed for the rigor of industrial use cases.
PTC now offers a pre-integrated edge ‘solution stack’ that collects and aggregates data from sensors, performs highly automated machine learning and predictive analytics, enables web and mobile development, and supports augmented reality (AR) experiences.
With these innovations, PTC not only supports edge computing with the technology platform, but additionally supports distributed, hybrid deployments that include capabilities both at the edge and in the cloud.
Turning billions of points of data into actionable information is one of the IoT’s primary value-drivers, but organizations have historically faced challenges with traditional architectural approaches for IoT computing – due to the volume, velocity, and variety of data produced within an IoT ecosystem.
PTC addresses this challenge with a robust platform that offers comprehensive IoT computing at the edge – computing that occurs on or near the connected device itself… Read More
In a feat that demonstrates the feasibility of using satellites to transmit uncrackable quantum messages, scientists have measured the quantum properties of photons sent to space and back again.
Physicists beamed the blips of light up to a satellite that reflected them back to Earth.
Upon the photons’ return, the team, led by Paolo Villoresi of the University of Padua in Italy, observed a property known as quantum interference.
That confirmed that the particles’ quantum traits remained intact over the 5,000-kilometer space voyage. The team reports the advance in a paper to be published in Physical Review Letters.
The technique could one day lead to quantum cryptography by satellite, allowing users to send snoop-proof encryption keys for encoding secret information.
“It’s important for the sake of secure communication and advancement of physics,” says Villoresi. But that’s not the only reason he took on the challenge. “I can more honestly say that it’s cool… Read More
The future of computing may be in its past.
The silicon transistor, the tiny switch that is the building block of modern microelectronics, replaced the vacuum tube in many consumer products in the 1970s.
Now as shrinking transistors to even more Lilliputian dimensions is becoming vastly more challenging, the vacuum tube may be on the verge of a comeback.
In a darkened laboratory here, two stories beneath the California Institute of Technology campus, two students stare through the walls of a thick plastic vacuum chamber at what they hope will be the next small thing – a computer chip made from circuits like vacuum tubes whose dimensions are each roughly one-thousandth the size of a red blood cell.
At stake is the future of what electronic engineers call scaling, the ability to continue to shrink the size of electronic circuits, which is becoming harder to do as they become as small as viruses.
It has been more than half a century since the physicist Richard Feynman predicted the rise of microelectronics… Read More
Cloud and DevOps World Forum 2016 — June 21st-22nd in London, England. Now in its eighth year, C&DWF is firmly established as the leading content-led exhibition for the European Cloud and DevOps community and the premiere meeting place for CIOs.
2016 Creative Storage Conference — June 23rd in Culver City, CA. The tenth annual CS will bring together digital storage providers, equipment manufacturers, software distributors, and professional media and entertainment end-users to explore the conference theme “The Art of Storage.”
Security of Things World — June 27th-28th in Berlin, Germany. Topics include securing cyber physical systems for IoT, expanding IT security with intelligence-led ops, business continuity management considerations, data privacy in an interconnected world, and security strategies.
Mobile World Congress Shanghai — June 29th – July 1st in Shanghai, China. MWC Shanghai is a very unique gathering that brings together industry participants ranging from C-Level mobile executives to end-user consumers passionate about mobile.
Industry of Things World Europe — September 19th-20th in Berlin, Germany. IoT business models, new IoT markets and strategies, product lifecycle management, next generation data handling and value assessment, IoT organizational impacts, and IoT security issues.
Government Video Expo — December 6th-8th in Washington, DC. GVE is the East Coast’s largest technology event for broadcast and video professionals, featuring a full exhibit floor, numerous training options, free seminars, keynotes, panel discussions, networking opportunities, and more.