Cloud Computing

Cloud Computing / Recently Commented

Who Would You Nominate for the Internet Hall of Fame? (Nominations Open Until March 15)

Who do you think deserves recognition in the Internet Hall of Fame? Do you know of someone who has played a key role in the Internet's development who should be recognized? (And is not already among the existing IHOF inductees?) If you know of someone who deserves the recognition, nominations are open until March 15, 2017. As outlined by Internet Society President & CEO Kathy Brown in a blog post today, the Internet Hall of Fame seeks to honor three types of inductee. more

Critical Differences Of Public And Private Clouds

Private or public? Both cloud types offer benefits and both have enjoyed significant growth over the last few years. Yet, what's the best bet for your business: The virtually limitless resources of public cloud stacks, or the close-to-home control of private alternatives? Here's a look at some critical differences between public and private clouds... more

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more

CircleID’s Top 10 Posts of 2016

The new year is upon us and it's time for our annual look at CircleID's most popular posts of the past year and highlighting those that received the most attention. Congratulations to all the 2016 participants and best wishes to all in the new year. more

Is Proprietary Dead?

A new age of openness is coming upon us. At least that's what we're being told. For instance -- "The reign of closed solution suites is over, shifting to the rise of open, heterogeneous software ecosystems." Maybe it's my 30 years in the information technology business (how many people remember Thomas-Conrad ARCnet hardware?), but I'm not convinced. It's worth taking a moment to consider the case. more

Edge Computing, Fog Computing, IoT, and Securing Them All

The oft used term "the Internet of Things" (IoT) has expanded to encapsulate practically any device (or "thing") with some modicum of compute power that in turn can connect to another device that may or may not be connected to the Internet. ... The information security community -- in fact, the InfoSec industry at large -- has struggled and mostly failed to secure the "IoT". This does not bode well for the next evolutionary advancement of networked compute technology. more

Building the Future of Enterprise - Notes from AWS re:Invent 2016

I attended AWS re:Invent 2016 about three or four weeks ago. Being new to both AWS and to re:Invent I was an outsider again, observing with virgin eyes. This means I learned a lot. Hopefully it means I saw things a bit differently than those more fully entrenched in this new community. So while others have long since covered the product announcements and other major news from the event, I'll take this opportunity to touch on some of the things that struck me as descriptive and/or indicative of the greater trends at play here. more

A Three Minute Guide to Network Automation Bliss

The cloud computing paradigm has been making steady progress in 2016. With the DevOps model making its way from cloud to networking, the business upside of fully automated service architectures is finally beginning to materialize. The associated service agility is expected to unleash new business models that transform the ways in which applications and connectivity can be consumed. more

What’s the Impact of Cloud Computing on the Environment?

Post-Thanksgiving is a time of reflection where we are thankful for technological improvements that allow us to succeed. Every-so-often, technology comes along that not only improves our business but can also help the world. Cloud computing is such a technology. Transitioning to the cloud is a good choice for just about any business, for several reasons. Cloud applications offer scalability, performance, cost-effectiveness and easy mobile access. more

Death of Transit: A Need to Prevent Fragmentation

Way back in the olden days, folks decided that cities should invest lots of money in public transportation systems. The reasons were many fold, including reducing the number of individual vehicles being driven in too, and parked in, congested "downtown" areas, and increasing traffic to businesses in those areas, increasing their commercial viability. Many of these systems are sold to the public with the idea that they will (at least) break even against capital and operational expenses over time, but the reality is far different. more

Building a Base of Knowledge for Advocacy Abroad in the Digital Age

Answering questions at the Internet Association's Virtuous Circle conference last week, Secretary Kerry presented the U.S. Department of State's effort to prioritize global digital economy issues abroad in order to reflect the growing importance of these issues in both economic and foreign policy. The State Department has made real progress on this initiative in the last year and hopes to continue our momentum going forward. more

Interest in Cloud-Based Email Infrastructure Grows by 35% in 3rd Quarter of 2016

Cloud-based interest in email infrastructure trended up this past quarter. Port25, a Message Systems Company, tracks cloud-based interest (CBIs) among large volume senders based on evaluation and purchase requests received, in conjunction with overall site engagement. In Q3, CBIs on Port25's website grew by 34.97% over Q2, to a total of 48.2% of unique evaluation and purchase requests. more

Amazon Announces IPv6 Support for Amazon CloudFront, AWS WAF, and Amazon S3 Transfer Acceleration

Amazon has made an announcement that CloudFront, AWS WAF, and Amazon S3 Transfer Acceleration have all been updated to support IPv6. more

How to Handle an Outage Like a Pro

In just the last two weeks, there were three major DNS outages between Google, Microsoft Azure, and Fonality. But only one of these companies was able to make even bigger waves with the way they handled their blunder. Fonality, who sells VoIP services and business phone systems, offered a very rare and transparent analysis of their outage. In a detailed statement from Chief Marketing Officer Jeff Valentine, readers were given crucial insight on how to prevent the same mistakes from happening to other companies. more

Transformation - the Real Business Case for NFV and SDN

2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more

Industry Updates

Four Steps to Mitigate Subdomain Hijacking

3 Key Recommendations to Trust the Cloud More by Trusting It Less

As Global Internet Demands Skyrocket, Expert Share Advice on How to Optimize IT Infrastructure to Meet Modern-Day Challenges

Smart City Market Boom: New eco Study Forecasts Over 17 Percent Annual Growth

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

New Study by eco Alliance: Best Practices Show Future Potential for Green IT 2030

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Moving from the Castle-and-Moat to the Zero-Trust Model

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Your Business In Europe: Understanding GDPR & Privacy Shield