There have been a number of reports recently about customer lists leaking out through Email Service Providers (ESPs). In one case, the ESP attributed the leak to an outside hack. In other cases, the ESPs and companies involved have kept the information very quiet and not told anyone that data was leaked. People do notice, though, when they use single use addresses or tagged addresses and know to whom each address was submitted. Data security is not something that can be glossed over and ignored. more
The company has pledged that in the coming years, it will purchase the output of several new solar farms. more
The Trump administration has criticized China on a number of trade issues in its Foreign Trade Barriers report including cloud computing restrictions, Voice-over-Internet Protocol (VoIP) and Domain Name Rules. more
Several developments are coming together in cloud computing that are creating shockwaves throughout society and in the economy. Over the last five years we have seen the debate about cloud computing hotting up. There was the hype around the new development at the same time as warnings regarding security and privacy, and for a while the market seemed subdued about the new development. However the economic reality of cloud computing meant that enterprises and government bureaucracies had little choice but to move ahead with cloud computing... more
Data analytics isn't just for large organizations anymore. As businesses and community collectives increasingly move their operations into digital spaces, the vast amounts of data being collected pose an opportunity for them to get to know their stakeholders better. While the security implications of this migration are hard to be taken lightly, the potential for game-changing insights is likewise enormous. more
As the final project of my UC Berkeley School of Information course in Artificial Intelligence strategies, we had to submit an AI strategy canvas. Today, I will attempt to share important aspects of the canvas, so you and your team may have a template to work from and consider. Let's begin. We will look at both a strategy and operations perspective both internally and externally. Part one will include Internal and Operational Strategies, while Part II will examine external processes, threats, and procedures. more
The Obama Administration has announced today a "Big Data Research and Development Initiative." The initiative, has committed to more than $200 million in new funding spearheaded by the White House Office of Science and Technology Policy (OSTP) and National Science Foundation (NSF), along with the National Institutes of Health (NIH), Department of Defense (DoD), Defense Advanced Research Projects Agency (DARPA), Department of Energy (DoE) Office of Science, and U.S. Geological Survey (USGS), seeks to "advance state-of-the-art core technologies needed to collect, store, preserve, manage, analyze, and share huge quantities of data; harness these technologies to accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning; and expand the workforce needed to develop and use Big Data technologies." more
Open Source (OS) Management and Orchestrations (MANO) is a European Telecommunications Standards Institute (ETSI) initiative that aims to develop a Network Function Virtualization (NFV) MANO software stack, aligned with ETSI NFV. The main goal of MANO is to simplify the onboarding of virtual network components in telco cloud data centers. The initiative has gained impressive momentum among leading Communication Service Providers (CSPs) around the world as part of their NFV programs. more
The world has officially entered what the MLi Group labels as the "New Era of The Unprecedented". In this new era, traditional cyber security strategies are failing on daily basis, political and terrorist destruction-motivated cyber attacks are on the rise threatening "Survivability", and local political events unfold to impact the world overnight and forever. Decision makers know they cannot continue doing the same old stuff, but don't know what else to do next or differently that would be effective. more
Lily Hay Newman reporting in Slate: "You may associate the sound of the Internet with the sound of a computer fan or the extinct song of dial-up. But the real sound of the information super highway is the whir of hard discs and fans spinning inside servers and creating a powerful white noise. It seems like it might be a soothing din, but workers report that it's a problem." more
It is now out -- all 539 pages entitled "Declaratory Ruling, Report and Order, and Order" (Reversal Order). As someone who has dealt with this subject matter at a working level over the past 40+ years, it seems clear that the FCC will readily prevail here and the protagonists need to move on. (Admittedly that is wishful thinking given the appellate revenue to be made and press blather opportunities.) The document from a Federal Administrative Law perspective is very thorough and well-crafted. more
Yesterday's Wikipedia outage, which resulted from invalid DNS zone information, provides some good reminders about the best and worst attributes of active DNS management. The best part of the DNS is that it provides knowledgeable operators with a great tool to use to manage traffic around trouble spots on a network. In this case, Wikipedia was attempting to route around its European data center because... more
A new age of openness is coming upon us. At least that's what we're being told. For instance -- "The reign of closed solution suites is over, shifting to the rise of open, heterogeneous software ecosystems." Maybe it's my 30 years in the information technology business (how many people remember Thomas-Conrad ARCnet hardware?), but I'm not convinced. It's worth taking a moment to consider the case. more
The super storm has caused major power and Internet outages in a region that is home to more than 60 million people. Unsurprisingly, the impacts on Internet connectivity have been severe, reports Renesys. more
When I read government arguments in defense of the NSA, an oft-repeated line was: We're not targeting Americans. We're targeting foreigners. Foreigners. I really dislike that word. And I'm sure companies like Apple, Google and Facebook do as well. Why? more