Government security image via Shutterstock
Will President Obama act on the issue of government backdoors? Find out in this week’s roundup.
1. Government backdoor security concerns prompt letter to President – Sharon Shea (SearchSecurity)
As privacy and security concerns rise, President Obama is urged to dismiss the call for government backdoors.
2. Alcatel-Lucent boosts capabilities of service provider SDN platform – Antone Gonsalves (SearchSDN)
Alcatel-Lucent introduces a service provider SDN platform designed to improve response times in making changes to corporate networks.
3. Cloud threatens traditional IT jobs, forces changes – Robert Gates (SearchDataCenter)
Cloud computing is making corporate-owned data centers less common, and companies continue to reduce IT staff.
4. OpenStack containers, PaaS tie-ins give users a leg up – Trevor Jones (SearchCloudComputing)
OpenStack containers can come in many forms as the Foundation has taken an agnostic approach to the emerging orchestration technologies around it.
5. IoT will force CIOs to enter the realm of operational technology – John Moore (SearchCIO)
IoT is mature enough for enterprise adoption, said a panel of experts at the 2015 MIT Sloan CIO Symposium, but successful deployments require CIOs to engage with operational technology.
VMware image via Shutterstock
What does VMware’s forecast look like after its first-quarter results? Find out in this week’s roundup.
1. VMware forecast: partly cloudy with chance of market gain – Ed Scannell and Tom Walat (SearchServerVirtualization)
VMware has made significant investments in network virtualization, end-user computing and the cloud. By the first-quarter results, those efforts are paying off.
2. Rackspace: Expect more of a leadership role in OpenStack community – Trevor Jones (SearchCloudComputing)
In this Q&A, Rackspace’s Private Cloud VP and GM discusses the state of the OpenStack community and the company’s plan to strengthen its role in it.
3. AMD roadmap redrawn for data center destination – Meredith Courtemanche (SearchDataCenter)
AMD expects to add some processor choice into the Wintel-dominated x86 server market as soon as next year.
4. Bugs, lack of support lead to Tor Cloud Project shutdown – Maxim Tamarov (SearchCloudSecurity)
Tor Project shuts down its AWS bridge effort, Tor Cloud, but encouraged developers to set up their own Tor bridges to promote anonymous cloud usage.
5. Security ethics survey shows honesty is a tricky business – Michael Heller (SearchSecurity)
A security ethics survey conducted at the 2015 RSA Conference indicates that infosec professionals may be wary of media attention in breach and vulnerability reporting.
Windows Update image via Shutterstock
Have we seen the end of Patch Tuesday? Check out the changes Microsoft announced at Ignite 2015 in this week’s roundup.
1. Microsoft debuts password-free Windows Hello, Patch Tuesday changes – Robert Richardson (SearchSecurity)
Microsoft Ignite 2015 showed that Microsoft may have rethought the Tuesday part of Patch Tuesday, but Windows Update is stronger than ever.
2. Outlook for iOS, Android gets MAM, fulfills IT wish list – Jake O’Donnell (SearchConsumerization)
IT has more controls than ever for Microsoft’s new Outlook mobile apps, yet only those with Intune can use its new MAM.
3. All-in-one systems simplify OpenStack private clouds – Robert Gates (SearchDataCenter)
OpenStack has been an option for advanced users for many years, but new combinations match server hardware with enterprise support.
4. Windows Server 2016 preview 2 hits without containers – Ed Scannell (SearchWindowsServer)
Microsoft has re-factored Windows Server around containers, but IT pros must wait a little longer before they can actually test them out.
5. Sapphire attendees take long view despite S/4HANA roadmap gaps – Jim O’Donnell (SearchSAP)
SAP Sapphire attendees expressed long-term confidence in the company’s S/4HANA platform, but also said the transition will not be simple to make.
Data Science image via Shutterstock
By James Kobielus (@jameskobielus)
What minimal qualifications do you actually need to call yourself a data scientist these days?
The cynical answer would be: whatever you can get away with. But the fuller answer would be: whatever the market can bear.
By the latter I’m referring to the core principle of a dynamic free-market economy: supply will emerge, by hook or crook, to satisfy demand.
A realist would admit that–even if you have no experience, qualifications, certification, track record, or any other objective evidence that you are on some level a competent data scientist—you can plausibly, without fraudulent intent, call yourself one if you feel that you’re up to the challenge. That’s called “marketing.” And if someone else accepts your self-definition and opts to engage you in an initiative in which you’re expected to deliver on your offer of data scientific services, you are doubly entitled to call yourself one. That’s called “sales.” And if you can indeed, in spite of all appearances, provide data scientific services that they find acceptable, and if you can collect monetary compensation in the process, you’re indeed a legitimate, professional data scientist.
Those are the minimal qualifications for calling yourself a professional in any line of work in a free economy. Of course, there may, in various lines of work and various jurisdictions, be plenty of formal degrees, certifications, union memberships, and other hoops you may need to jump through before you’re entitled to call yourself, say, a doctor, lawyer, certified public accountant, or air-traffic controller. There are few such hoops in the data-science profession so far.
Likewise, there are in various professions codes of conduct that are widely accepted and constrain the extent to which anybody can pass off shoddy work as the valid output of a competent professional. As I noted here, various individuals and groups in the data science profession have proposed such codes of conduct, though none is universally recognized. And none of the ones that have been proposed is being used in any concerted fashion to limit who may or may not market themselves as a data scientist.
To the extent that employers adopt hiring practices that incorporate minimal qualification criteria from these or other codes of conduct, you wouldn’t be able to market your so-called data science bonafides to any of them until such time as you conform to those. Clearly, the self-taught, self-appointed data scientists among us must face up to that challenge if they wish to make steady careers in the profession.
Given the persistent undersupply of qualified data scientists to meet growing demand, the autodidacts (who can actually deliver the goods) will be able to prosper in today’s big-data-besotted economy. Many of them will avail themselves of the ample free resources to boostrap themselves into this “sexy” profession on the cheap.
All power to them. Being an aspiring data scientist in this day and age is a bit like being an aspiring soldier in a wartime emergency. The fact that you’ve enlisted or been conscripted doesn’t make you up the challenge. The fact that somebody handed you a gun and a uniform doesn’t mean you can be trusted to defend your country. The fact that you can follow orders and march in a straight line doesn’t mean that you’re cut out for this line of work.
But the fact that somebody’s giving you orders and that they’re apparently satisfied enough with what you’re doing means you’re indeed a soldier now. You’re as much a soldier as the major general…or your drill sergeant.
And nobody can tell you you’re not.
RSA Conference image via Shutterstock
Do you believe the RSA Conference is getting too big for San Francisco? Find out in this week’s roundup.
1. RSA Conference 2015 recap: Record attendance, record stakes – Eric Parizo (SearchSecurity)
This year’s RSA Conference once again broke the previous year’s attendance record. Is the show getting too big for San Francisco? Plus key takeaways and final words from our executive editor.
2. Apache CloudStack marches on in OpenStack’s shadow – Trevor Jones (SearchCloudComputing)
What CloudStack lacks in corporate sponsorships it makes up for in user appeal and isn’t going away any time soon.
3. Government agencies struggling with security data analytics – Maxim Tamarov (SearchSecurity)
Security data analytics are a must-have for government agencies to stay one step ahead of cyber attackers, according to a study conducted by MeriTalk.
4. EMC World 2015: Expect backup, flash, future directions – Dave Raffo (SearchStorage)
EMC will roll out products in its Data Domain, XtremIO and ViPR platforms at EMC World 2015, but what about a CEO succession plan?
5. Universal apps, holographic magic at Microsoft Build 2015 – Francesca Sales (SearchCIO)
At Microsoft Build 2015, the software giant showed it’s determined to do for mobile devices what it did for PCs — only this time it’s the services, not the OS, that it hopes will be the cash cow.
Security attack image via Shutterstock
Are long-duration security attacks the norm now? Find out in this week’s roundup.
1. Long-duration advanced persistent threats now the norm, say experts – Michael Heller (SearchSecurity)
Threat experts at RSA Conference 2015 say today’s most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect.
2. Spectra Logic Corp. upgrades BlackPearl with more cache, object support – Garry Kranz (SearchDataBackup)
Spectra Logic has tweaked S3 commands on BlackPearl archiving gateway to enable bulk transfer of objects to backend LTFS libraries.
3. Report shows increased failure rates for ERP implementations – Jim O’Donnell (SearchManufacturingERP)
The 2015 ERP report from Panorama Consulting Solutions also shows SAP outpacing Oracle and Microsoft on buyer shortlists.
4. New data center cooling systems slowly displace CRAC – Robert Gates (SearchDataCenter)
As CRAC remains a top data center cooling option, cheaper and more environmentally friendly options will continue to emerge.
5. Google reports 12% revenue increase – Kayleigh Bateman (ComputerWeekly)
Google misses analysts’ $17.5bn target but reports 3.7% profit increase through growth in mobile ad sales.
HP image via Shutterstock
Can HP’s hardware play an important role in the cloud market? Find out in this week’s roundup.
1. HP cloud services here to stay, but IaaS ambition shifts – Ed Scannell and Trevor Jones (SearchCloudComputing)
HP knows its cloud services won’t beat AWS, Google and Azure, but its hardware can play an important role in the cloud.
2. IoT device explosion challenges data center security – Robert Gates (SearchDataCenter)
The billions of Internet connected devices in the IoT wave introduce new data center security concerns that IT managers must head off at the pass.
3. Patch Tuesday, exploit Thursday: Windows HTTP.sys flaw under attack – Michael Heller (SearchSecurity)
A critical vulnerability in Windows HTTP.sys was detailed as part of Microsoft’s April Patch Tuesday, and the flaw is already being actively exploited in the wild.
4. News recap: Report shows promising telecom employment numbers – Katherine Finnell (SearchTelecom)
In telecom news, a report from the Bureau of Labor Statistics shows promising telecom employment numbers; broadband customers are increasingly using OTT services.
5. Crossroads Systems boosts StrongBox DR failover to tape – Garry Kranz (SearchDisasterRecovery)
Crossroads StrongBox archiving appliance ingests writes to disk and copies data to up two tape libraries for disaster recovery.
Cybersecurity image via Shutterstock
Do you think cybersecurity threats are getting more complex? Find out what our experts think in this week’s roundup.
1. Experts disagree on growth, complexity of cybersecurity threats – Michael Heller (SearchSecurity)
The Websense 2015 Threat Report claims that cybersecurity threats are getting more complex, but one expert says the trends aren’t anything new.
2. CipherCloud launches free cloud compliance resource center – Rob Wright (SearchCloudSecurity)
CipherCloud’s new Global Compliance Resource Center aims to clear up the confusion around global compliance and data privacy protection laws as they pertain to the cloud.
3. Microsoft Hyper-V Containers the latest Docker embrace – Trevor Jones (SearchServerVirtualization)
Microsoft continues its push for Docker, the Linux container technology, with a new Hyper-V Container tool for greater application isolation.
4. Microsoft goes small with Nano Server – Jeremy Stanley (SearchWindowsServer)
What’s more (or less) Server Core than Server Core? Microsoft’s Nano Server, expected in the next release of Windows Server, will be all about PowerShell management.
5. Inovalon federates healthcare info into data leaks for analytics – Dave Raffo (SearchStorage)
Healthcare analytics firm Inovalon escapes a siloed approach by building hybrid cloud data lakes for petabytes of data with EMC Federation technology.
Internet of Things image via Shutterstock
Is the IoT hype justified at RSA Conference 2015? Find out in this week’s roundup.
1. RSA Conference 2015 preview: Is IoT hype justified – Michael Heller (SearchSecurity)
The Internet of Things dominates the agenda at RSA Conference 2015, but experts believe enterprises should focus their attention on threat intelligence and other topics.
2. VMware EVO:RAIL attracts lots of tire kickers, few drivers – Ed Scannell (SearchServerVirtualization)
VMware users are showing interest in EVO:RAIL, but competitive offerings and more complex decision making slows the purchasing process down.
3. Azure Site Recovery expands cloud DR to VMware users – Trevor Jones (SearchCloudComputing)
Azure Site Recovery expands Microsoft’s cloud disaster recovery capabilities to VMware users and potentially to other services, too.
4. Wells Fargo continues massive data center consolidation – Robert Gates (SearchDataCenter)
Since merging with Wachovia in 2009, Wells Fargo has closed 100 data centers, decreasing its risk profile and reducing its carbon footprint.
5. IBM innovation centers give enterprises a dry run with SDN technology – Gina Narcisi (SearchSDN)
As enterprise interest in SDN grows, new IBM innovation centers allow businesses to test SDN technology from a variety of vendors.
Analytics image via Shutterstock
By James Kobielus (@jameskobielus)
Some possessions are best left mute and dumb, unless you feel you can’t get through life if everything you own isn’t constantly peppering you with “friendly reminders,” like an overbearing spouse.
Machines don’t need to sleep, and they can monitor anything and everything 24×7. As the Internet of Things (IoT) pushes sensor-driven smarts into everything, we’re going to create a world where inanimate objects know who we are, what we need, and, through machine-driven alerts, how to guide us in that direction. Not just that, but embedding of IoT endpoints into every personal possession might create a world where we all risk being smothered in an overload of notifications, reminders, guidance, and other messages.
Are you ready to be spammed by the universe at large? It’s been said that the road to perdition is paved with good intentions, and that’s certainly the case with the potential dystopia of IoT-stoked overnotification. As this recent EE Times article notes, there are legitimate reasons why, say, every container of food, drink, pharmaceuticals, cleanser, gasoline, and other substances in and around your household should notify you if they’ve been left open for longer than normal. But do you also want those containers, by default, to instruct you that you need to refill or replace them regularly with some new, improved, premium brand?
Perhaps it’s premature to moan about overbearing IoT analytics, to borrow a phrase from the cited article’s headline. But as smart appliances become mainstream and as people adopt smartwatches and other wearables that receive continuous alerts from hither and yon, it’s only a matter of time before an overnotification culture takes hold everywhere. To get a foretaste of the IoT-stoked message madness that awaits us all, just look at today’s never-ending spam nightmare of email and social media. Either the IoT-triggered notification messages will be turned on automatically when we activate a new smart possession, or we’ll turn them on ourselves and seldom “opt out.”
Sad to say, IoT analytics could make the problem much worse, rather than better. Behind the scenes, cloud-based machine-learning and predictive models may be set up to find a continuing stream of events, threats, and opportunities that absolutely must be called to our attention ASAP.
Say what you will about the privacy and malware implications of all this, but even the most benign of these messages will prove annoying if we receive them constantly and can’t easily tune them out. Even if we could block some IoT notification spam in the future, the need to continually manage it all—even the stuff that we long ago opted into–will wear us down.