Cloud Computing

Cloud Computing / Most Viewed

IBM’s $34B Red Hat Aquisition Makes It the World’s Largest Hybrid Cloud Provider

International Business Machines Corp (IBM) on Tuesday announced the completion of its $34 billion acquisition of the software company Red Hat Inc making it IBM's largest acquisition ever in its 100-year-plus history. more

Cloud Computing Traffic Expected to Grow 12-Fold by 2015

Global cloud computing traffic is expected to grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015 -- a 66% compound annual growth rate -- according to Cisco's Global Cloud Index. 1.6 zettabytes is approximately equivalent to 22 trillion hours of streaming music; 5 trillion hours of business Web conferencing with a webcam; 1.6 trillion hours of online high-definition (HD) video streaming. more

U.S. Expresses Concerns Over China’s Internet Regulatory Regime, In New Report

The Trump administration has criticized China on a number of trade issues in its Foreign Trade Barriers report including cloud computing restrictions, Voice-over-Internet Protocol (VoIP) and Domain Name Rules. more

Gartner Says Worldwide IaaS Public Cloud Services Market Grew 31.3% in 2018

The worldwide infrastructure as a service (IaaS) market grew 31.3% in 2018, reaching $32.4 billion, up from $24.7 billion in 2017, according to Gartner, Inc. more

How to Manage and Secure Big Data

Several developments are coming together in cloud computing that are creating shockwaves throughout society and in the economy. Over the last five years we have seen the debate about cloud computing hotting up. There was the hype around the new development at the same time as warnings regarding security and privacy, and for a while the market seemed subdued about the new development. However the economic reality of cloud computing meant that enterprises and government bureaucracies had little choice but to move ahead with cloud computing... more

Federal Cybersecurity Best Practices: FISMA Continuous Monitoring

Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of continuous monitoring requirements. A recent GAO report found that two-thirds of agencies "did not adequately monitor networks" to protect them "from intentional or unintentional harm." more

Your AI Strategy Canvas: Part 1

As the final project of my UC Berkeley School of Information course in Artificial Intelligence strategies, we had to submit an AI strategy canvas. Today, I will attempt to share important aspects of the canvas, so you and your team may have a template to work from and consider. Let's begin. We will look at both a strategy and operations perspective both internally and externally. Part one will include Internal and Operational Strategies, while Part II will examine external processes, threats, and procedures. more

Internet Regulation in the Age of Hyper-Giants

As we enter the seventh round of the net neutrality fight, advocates continue to make the same argument they've offered since 2002: infrastructure companies will do massive harm to little guys unless restrained by strict regulation. This idea once made intuitive sense, but it has been bypassed by reality. ... When Tim Wu wrote his first net neutrality paper, the largest telecoms were Verizon, AT&T, and SBC; they stood at numbers 11, 15, and 27 respectively in the Fortune 500 list. more

Verisign Expands MANRS Relationship to Strengthen Global Routing Security

Verisign has been involved with an initiative known as Mutually Agreed Norms for Routing Security, or MANRS, since its inception. MANRS, which is coordinated by the Internet Society, focuses on strengthening the security and resiliency of IP networks throughout the world by identifying and providing best practices for mitigating common routing security threats. MANRS began as a collaboration among network operators and internet exchange providers, with Verisign formally becoming a participant in its Network Operator Program in 2017. more

NFV Orchestration Without Network Visibility: OS MANO Needs Operational Improvements

Open Source (OS) Management and Orchestrations (MANO) is a European Telecommunications Standards Institute (ETSI) initiative that aims to develop a Network Function Virtualization (NFV) MANO software stack, aligned with ETSI NFV. The main goal of MANO is to simplify the onboarding of virtual network components in telco cloud data centers. The initiative has gained impressive momentum among leading Communication Service Providers (CSPs) around the world as part of their NFV programs. more

Help Us Build a Sustainable European Cloud

Last month, I announced our Open Data Hub to the CircleID community, inviting anyone interested in making the digital sector more transparent to join our efforts. Today, I am excited to share summaries of our three-part series describing our vision for a sustainable European cloud. It’s a key part of our Roadmap to Sustainable Digital Infrastructure by 2030, and one that is meant to not merely challenge the dominance of the big, non-European cloud providers, but offer an entirely different paradigm that is open-source, fair, sustainable, and creates economic opportunities for all. more

Internet Is Too Loud, Literally

Lily Hay Newman reporting in Slate: "You may associate the sound of the Internet with the sound of a computer fan or the extinct song of dial-up. But the real sound of the information super highway is the whir of hard discs and fans spinning inside servers and creating a powerful white noise. It seems like it might be a soothing din, but workers report that it's a problem." more

Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values

Alphabet Inc.'s Google has announced that it will not compete for the Pentagon's cloud-computing contract with an estimated value of $10 billion; says the project may conflict with its corporate values on artificial intelligence. more

The Hybrid Cloud Impact on IPv6 Adaptation

Over the last couple of months, the enterprise computing space seems to have started a shift from private cloud paradigm into the hybrid cloud model. That makes sense, because the hybrid cloud allows companies to forgo the capital and the operating expenses associated with private clouds, in exchange for a pay-as-you-go model where you can just sit back and consume the business applications. more

Trust - The Key to Cloud Computing Growth in Europe

The European Commission is optimistic about the future of cloud computing in the region and predicts it will not only save on data storage costs, but create new jobs and boost GDP. The European Union's cloud computing strategy was finally unveiled last week and is expected to boost GDP by around AUD$200 million (about 1 per cent) and create almost four million jobs in just under a decade. This is the first concerted effort by the EU to increase the popularity of cloud computing among businesses. more

Industry Updates

Four Steps to Mitigate Subdomain Hijacking

3 Key Recommendations to Trust the Cloud More by Trusting It Less

As Global Internet Demands Skyrocket, Expert Share Advice on How to Optimize IT Infrastructure to Meet Modern-Day Challenges

Smart City Market Boom: New eco Study Forecasts Over 17 Percent Annual Growth

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

New Study by eco Alliance: Best Practices Show Future Potential for Green IT 2030

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Moving from the Castle-and-Moat to the Zero-Trust Model

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Your Business In Europe: Understanding GDPR & Privacy Shield