Enterprise IT Watch Blog

April 3, 2015  8:49 AM

Stemming the deluge of analytic-driven overnotification

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Analytics, Internet of Things

Analytics image via Shutterstock

By James Kobielus (@jameskobielus)

Some possessions are best left mute and dumb, unless you feel you can’t get through life if everything you own isn’t constantly peppering you with “friendly reminders,” like an overbearing spouse.

Machines don’t need to sleep, and they can monitor anything and everything 24×7. As the Internet of Things (IoT) pushes sensor-driven smarts into everything, we’re going to create a world where inanimate objects know who we are, what we need, and, through machine-driven alerts, how to guide us in that direction. Not just that, but embedding of IoT endpoints into every personal possession might create a world where we all risk being smothered in an overload of notifications, reminders, guidance, and other messages.

Are you ready to be spammed by the universe at large? It’s been said that the road to perdition is paved with good intentions, and that’s certainly the case with the potential dystopia of IoT-stoked overnotification. As this recent EE Times article notes, there are legitimate reasons why, say, every container of food, drink, pharmaceuticals, cleanser, gasoline, and other substances in and around your household should notify you if they’ve been left open for longer than normal. But do you also want those containers, by default, to instruct you that you need to refill or replace them regularly with some new, improved, premium brand?

Perhaps it’s premature to moan about overbearing IoT analytics, to borrow a phrase from the cited article’s headline. But as smart appliances become mainstream and as people adopt smartwatches and other wearables that receive continuous alerts from hither and yon, it’s only a matter of time before an overnotification culture takes hold everywhere. To get a foretaste of the IoT-stoked message madness that awaits us all, just look at today’s never-ending spam nightmare of email and social media. Either the IoT-triggered notification messages will be turned on automatically when we activate a new smart possession, or we’ll turn them on ourselves and seldom “opt out.”

Sad to say, IoT analytics could make the problem much worse, rather than better. Behind the scenes, cloud-based machine-learning and predictive models may be set up to find a continuing stream of events, threats, and opportunities that absolutely must be called to our attention ASAP.

Say what you will about the privacy and malware implications of all this, but even the most benign of these messages will prove annoying if we receive them constantly and can’t easily tune them out. Even if we could block some IoT notification spam in the future, the need to continually manage it all—even the stuff that we long ago opted into–will wear us down.

March 30, 2015  9:13 AM

TechTarget’s weekly roundup (3/23 – 3/30)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Cloud Security, HP, OpenStack, SDN

HP image via Shutterstock

Need help with OpenStack? Find out how HP’s Helion Rack is giving it a helping hand in this week’s roundup.

1. HP Helion Rack gives users helping hand with OpenStack – Ed Scannell (SearchCloudComputing)

HP’s new private-cloud-in-a-box, Helion Rack, should speed deployment of private clouds for IT pros unable to jump the OpenStack skills hurdle.

2. FISMA report highlights federal cloud security deficiencies – Rob Wright (SearchCloudSecurity)

A new report on government cybersecurity efforts delivered some troubling findings for the federal government’s cloud operations.

3. Survey: Enterprises ready to buy SDN products – Antone Gonsalves (SearchSDN)

A majority of U.S. businesses are preparing to implement SDN products in the data center by 2017 in order to reduce networking costs.

4. New tool eases enterprise file sync-and-share searches, security – Jake O’Donnell (SearchConsumerization)

SearchYourCloud’s new tool gives users a way to search multiple cloud sync-and-share services on mobile and desktops, with file-level security.

5. IBM splits SoftLayer cloud storage into endurance, performance tiers – Sonia Lelii (SearchCloudStorage)

SoftLayer upgrades its IBM Cloud storage with services for granular performance management that calibrate IOPS to application needs.

March 22, 2015  6:53 PM

TechTarget’s weekly roundup (3/16 – 3/23)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Cisco, Internet of Things, Object storage, Wearable devices

Internet of Things image via Shutterstock

Is the IT industry ready for the Internet of Things? Find out in this week’s roundup.

1. IoT technologies emerge to manage connected-device deluge – Jake O’Donnell (SearchConsumerization)

Deployment of IoT, wearables and connected devices are coming at rates even experts never thought possible and IT must be ready.

2. Azure IoT play biggest yet amongst mega cloud vendors – Trevor Jones (SearchCloudComputing)

Azure IoT Suite may be the first major cloud platform to cover the spectrum of collecting, analyzing and presenting data from Internet of Things devices.

3. Experts: Consumer Privacy Bill of Rights may ease privacy compliance – Michael Heller (SearchSecurity)

The Consumer Privacy Bill of Rights proposed by the Obama administration is a good first step, according to experts, and may simplify privacy compliance for enterprises currently dealing with many different state laws.

4. Cisco Spark the new name for Project Squared collaboration app – Gina Narcisi (SearchUnifiedCommunications)

Cisco has given a new name to Project Squared. The cloud-based collaboration app is now Cisco Spark and will cost as much as $25 per user per month, the company said at Enterprise Connect.

5. Promise Technology pushes into object storage for PB scale with VSky – Sonia Lelii (SearchStorage)

Promise Technology’s VSky object storage can handle petabytes of data and is aimed at rich media and video surveillance.

March 16, 2015  9:17 AM

TechTarget’s weekly roundup (3/9 – 3/16)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
AWS, Data storage, Juniper Networks, SDN, VMware

VMware image via Shutterstock

Who will win in the brewing hybrid cloud management battle: VMware or AWS? Find out in this week’s roundup.

1. Hybrid cloud management battle brews between VMware and AWS – Beth Pariseau (SearchCloudComputing)

VMware plans to allow its customers to move virtual machines into and out of the AWS cloud and AWS has a plugin for vCenter. Which approach will prevail?

2. Unidesk adds Hyper-V support, bolsters Microsoft VDI – Jake O’Donnell (SearchVirtualDesktop)

Unidesk 3.0 includes support for Microsoft VDI, giving some VMware Horizon users reason to consider a move to Hyper-V.

3. Does Rowhammer mark a new wave of hardware vulnerabilities? – Michael Heller (SearchSecurity)

Experts agree that the Rowhammer vulnerability likely isn’t an immediate threat to enterprises, but disagree on whether hardware vulnerabilities are about to reach a tipping point.

4. Juniper SDN switches aimed at enterprise clouds – Antone Gonsalves (SearchSDN)

Juniper Networks has introduced a line of SDN switches that give corporations a choice in open and proprietary technology for building public and private clouds.

5. Google tries to melt Amazon Glacier’s lead in cold data storage – Sonia Lelii (SearchCloudStorage)

Google Cloud Storage Nearline takes on Amazon Glacier, promising restore times in seconds rather than the hours it takes for Glacier customers.

March 9, 2015  9:26 AM

TechTarget’s weekly roundup (3/2 – 3/9)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Cisco, Docker, IBM Watson, VMware

IBM image via Shutterstock

Can AlchemyAPI give IBM Watson new life? Find out in this week’s roundup.

1. IBM Watson looks to AlchemyAPI to boost its appeal – Ed Scannell (SearchDataCenter)

IBM acquired cognitive computing provider AlchemyAPI in the hopes it can whip up an application elixir that gives Watson new life.

2. Docker acquires talent to bolster container virtualization – Antone Gonsalves (SearchSDN)

Docker’s acquisition of SocketPlane is expected to help bring greater scalability to container virtualization, making the emerging hypervisor alternative more enterprise-ready.

3. Microsoft confirms Windows vulnerable to FREAK attack – Michael Heller (SearchSecurity)

The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.

4. Cisco, VMware unveil CSP products to tap growing market – Antone Gonsalves (SearchSDN)

CSP products introduced at the Mobile World Congress included cloud-based analytics from Cisco and virtualized networking technology from VMware.

5. Survey shows concerns of IT managers spur hybrid cloud adoption – Sarah Wilson (SearchCloudStorage)

According to a recent study conducted by EMC, the top concerns of IT managers today could be contributing to an uptick in hybrid cloud deployments.

March 2, 2015  1:06 PM

Spark and its growing pains

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Apache, Hadoop, Spark

Big data image via Shutterstock

By James Kobielus (@jameskobielus)

Fending off industry hype requires that we stay focused on the maturity, or lack thereof, of any new technology. Just because pundits, developers, and venture capitalists are currently jazzed by this or that new tech doesn’t mean the bubble is robust enough to withstand full-bore commercialization. Enthusiasm withers fast when people start to realize that the quick riches they expected from promising new technologies may never materialize.

Let’s hope that commercialized Apache Spark offerings start to live up to the incessant hype that touts it as the evolutionary advance beyond Hadoop. It’s a promising technology, but, as we’ve seen with Hadoop, development into an enterprise-grade big-data platform takes years, requires substantial investments across the ecosystem, and may not happen unless the new approach hits does something better and/or cheaper than alternatives. Since the beginning of this decade, the Hadoop industry has steadily addressed those challenges and developed into a substantial and robust big-data platform.

Spark isn’t quite there yet, so we should give it time to come into its own. Almost a year ago, I started to toss my thoughts on Spark into the general pool of big-data punditry. I devoted my first Spark-centric post to a fairly detailed overview of what Spark is, does, and supports. A few months later, I looked at Spark’s evolving role in the hybridized ecosystem of big-data platforms. A few weeks ago, I commented on the arbitrariness of Spark’s inclusion in the Apache Hadoop project’s core scope. On the latter point, Spark’s focus on real-time, streaming, in-memory, and graph-centric machine-learning applications makes it quite distinct from “traditional” Hadoop, though both leverage HDFS as a storage subsystem.

Just as Hadoop’s issues have occasionally eclipsed its strengths in the minds of enterprise IT professionals, Spark’s immaturity is coming into clearer focus. For Hadoop professionals, this recent article reads like déjà vu. It cites the following growing pains with Spark on the road to becoming a robust enterprise-grade platform:

  • Lack of long-time, broad, or deep experience with Spark within the IT and big-data professions
  • Lack of detailed documentation on Spark that includes in-depth guidance on the toughest technical issues and advanced application scenarios
  • Lack of comprehensive tools for managing, monitoring, securing, tuning, optimizing, and recovering Spark jobs and clusters
  • Lack of Spark integration with a wide range of middleware and databases
  • Lack of broad range of commercial Spark solutions and technical support resources
  • Lack of broad API coverage for Spark that includes languages beyond the core of Scala

All of this sounds very much like the Hadoop market 2-3 years ago. Few industry observers doubt that the Spark industry will address each of these issues as the market matures. But, first, Spark must gain mainstream adoption at a reasonably brisk pace in order for that maturation to rise to the level at which Hadoop is now.

March 2, 2015  11:09 AM

TechTarget’s weekly roundup (2/23 – 3/2)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
AWS, HP, Hybrid cloud, IBM

Hybrid cloud image via Shutterstock

Do you think IBM can make a mark in the hybrid cloud market? Find out in this week’s roundup.

1. IBM guns for the hybrid cloud market — again – Ed Scannell (SearchCloudComputing)

IBM is going after the hybrid computing market – again — but this time it is armed for bear. Will IT pros actually take notice?

2. Another AWS reboot planned for March – Beth Pariseau (SearchAWS)

For AWS shops, news of another reboot in the EC2 fleet shows the cloud provider is staying on top of its security responsibilities.

3. HP: Threat intelligence sources need vetting, regression testing – Michael Heller (SearchSecurity)

According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.

4. FCC approves net neutrality rules – Katherine Finnell (SearchTelecom)

Internet service providers will be regulated as common carriers under Title II as the FCC approves net neutrality rules.

5. PernixData FVP adds RAM compression to server-side storage cache – Dave Raffo (SearchVirtualStorage)

PernixData Flash Virtualization Platform’s latest version compresses data on RAM, and its server-side caching software pools flash and memory resources.

February 23, 2015  10:04 AM

TechTarget’s weekly roundup (2/16 – 2/23)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Cisco, Google, malware, Windows Server

Google image via Shutterstock

Did you notice Google’s Compute Engine was down last week? Find out all the details in this week’s roundup.

1. Google Compute Engine experiences global cloud outage – Trevor Jones (SearchCloudComputing)

An apparent network connection failure led to a two-hour, cross-region cloud outage for Google Compute Engine customers this week.

2. DH2i first off the line with Windows Server containers – Nick Martin (SearchWindowsServer)

With DH2i’s release of DxEnterprise, IT pros can manage enterprise deployments of Windows Server containers.

3. Carbanak bank malware attack causes nearly $1 billion in losses – Michael Heller (SearchFinancialSecurity)

A malware attack on more than 100 banks around the globe has led to one of the largest bank heist schemes in history, with losses potentially reaching $1 billion.

4. New Cisco collaboration certs expand expertise beyond voice, video – Gina Narcisi (SearchUnifiedCommunications)

The new Cisco collaboration certifications address the need to expand collaboration training for IT professionals beyond voice and video training.

5. EMC Isilon dives deeper into analytics, Hadoop, data lakes – Dave Raffo (SearchStorage)

EMC added a NAS array that can scale to 50 PB and upgraded its operating system to support the latest version of HDFS, plus OpenStack Swift.

February 16, 2015  9:21 AM

TechTarget’s weekly roundup (2/9 – 2/16)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Box, CIO, Cisco, Office 365

CIO image via Shutterstock

What cloud projects do CIOs have in the works? Find out in this week’s roundup.

1. CIOs focus on Office 365, hybrid cloud 2015 – Kristen Lee (SearchCIO)

With 2015 underway, SearchCIO checked in with CIOs to see what cloud projects they have in the works. Many said they are migrating to Office 365; hybrid cloud is also on the horizon.

2. Microsoft issues fixes for Internet Explorer, Group Policy – Toni Boger and Jeremy Stanley (SearchWindowsServer)

Microsoft issued patches across nine bulletins for February’s Patch Tuesday update. The company fixed issues within Group Policy and Internet Explorer.

3. Cisco targets large SDN deployments with Nexus 9000 improvements – Antone Gonsalves (SearchSDN)

Cisco plans to add an industry standard controller to the Nexus 9000 to give customers the option of using the switch for large-scale SDN deployments utilized by carriers and cloud service providers.

4. Box introduces BYOK encryption key management service – Rob Wright (SearchCloudSecurity)

Box will give enterprise cloud data storage customers the ability to control and store their own encryption keys through its new Enterprise Key Management service.

5. Seagate adds EVault backup appliance for on-premises or cloud – Sonia Lelii (SearchDataBackup)

The EVault backup target appliance expands Seagate’s market reach into an area dominated by EMC’s Data Domain products.

February 8, 2015  9:31 PM

TechTarget’s weekly roundup (2/2 – 2/9)

Michael Tidmarsh Michael Tidmarsh Profile: Michael Tidmarsh
Cisco, Cloud networking, Internet Explorer, social media

Social media image via Shutterstock

Which cloud expert should you follow on social media? Find out in this week’s roundup.

1. Five cloud experts to follow on social media – Nicholas Rando (SearchCloudComputing)

The cloud computing market is growing and evolving at lightning speed. To keep up, follow five of the top cloud experts in 2015 on social media.

2. Same-origin policy IE vulnerability may signal new attack trend – Michael Heller (SearchSecurity)

A new IE vulnerability has led to a proof-of-concept same-origin policy exploit, and some experts say it highlights a technique that may soon become popular among attackers.

3. Cisco unveils high-speed IE switch to drive industrial IoT – Antone Gonsalves (SearchNetworking)

Cisco introduced its first 40 gigabit per second IE switch for manufacturers, energy companies and government organizations that need higher bandwidth on industrial networks.

4. ExaBlox speeds up backups for the Hunger Task Force – Sonia Lelii (SearchDataBackup)

The Hunger Task Force was dealing with long backup windows and an archaic tape-based archiving solution. Exablox’s OneBlox solved those problems for the non-profit.

5. Cisco’s cloud networking play targets hybrid cloud shops – Trevor Jones (SearchCloudComputing)

Cisco’s cloud networking strategy continues to focus on its strengths with a new bundled suite for automation and a shift in licensing.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: