IT Support and Hardware for Clinics
32.4K views | +7 today
Follow
IT Support and Hardware for Clinics
News, Information and Updates on Hardware and IT Tools to help improve your Medical practice
Your new post is loading...
Your new post is loading...
Scoop.it!

Internet of Everything: Technologies & Minds (How the future is happening now)

Internet of Everything: Technologies & Minds  (How the future is happening now) | IT Support and Hardware for Clinics | Scoop.it

The Internet of Everything (IoE) represents the next “world-changing” revolution, after the Industrial Revolution of 1750 – 1900, and following the Computer & Internet revolution which started in the 1950’s. It is an exciting scenario in which objects, personal devices, even animals communicate, take Intelligent decisions, and autonomous actions on their own without human interaction. This revolution will completely transform industrial sectors and the entire world, for all of us, in ways as powerful as the Industrial Revolution and even more. It is our future, and it is happening now.

How is it happening? For an Evolution of Technologies, and with a Revolution of Minds…

TECHNOLOGIES… the Evolution

From a technology point of view, the Internet of Everything has evolved from the convergence of new advancements related to the Internet, Wireless solutions, and micro-biochip/sensors.

INTERNET Evolution: the advent of the latest Internet Protocol (named IPv6) enables an astonishing increase in the address space, which is a key factor for the Internet of Everything. With this new Internet protocol (IPv6), we can now assign a unique identifier to “everything" on the planet… or, actually, “to every atom on the surface of the earth, and still have enough addresses left to do another 100+ earths”.

WIRELESS Evolution: Once identified with IPv6, all “things” on the planet need to communicate with other “things”. Recent wireless advancements address this need with different types of networks and specific strengths. Low energy short range networks (e.g. NFC and Bluetooth) for wearables, very-high speed networks (e.g. 4G LTE) for cars, Zigbee and Wi-Fi -similar technologies for smart homes / smart cities, and vertical solutions for industrial “IoE” scenarios. All of this for free or at a very low cost.

SENSORS Evolution: inexpensive but powerful sensors are one of the biggest enablers of the Internet of Everything. We are experiencing a continuous vertical drop in the cost of electronic sensors, with their proliferation in devices of any kind. This enables “Internet of Everything” cheap devices to become “alive”, increasingly utilizing images, motion, touch, as well as sounds and environment sensors (including new technologies that react to smell, moisture, smart textiles, smart pavement, etc).

MINDS… the Revolution

SELF-ORGANIZATION Revolution: With processing costs declined by nearly 60x over the last few years, Internet of Everything devices are becoming not just connected but “brilliant” in their ability to decide what to do on their own. New microprocessors are enabling low-cost devices to take actions either independently or with other “things”, in a Self-Organized-Network (SON) flavor. Furthermore, the rich amount of data that devices generate (thanks to sensors) and receive (thanks to wireless) is strengthening this SON revolution, making “things” self-aware, predictive, reactive, and collaborative.

VIRTUAL INTELLIGENCE Revolution: in the new era of the Internet of Everything, we expect intelligence to become either more and more “localized” or, in the opposite direction, “virtualized”. This is a revolution pointing towards two divergent trends. On one extreme, machine brains will reside close to the action, as in “Self-Organized” devices with intelligence “distributed” at network edges, for prioritizing speed. On the opposite extreme, intelligence will be “virtualized” in software-defined machine infrastructures, decoupling machines software from hardware. This means intelligence and data to be outside of local devices, often thousands of kilometers away, enabling “Internet of Everything“ central machines to remotely and automatically operate local devices.

DATA EVERYTHING Revolution: Billions of machines which communicate with each other, enriched with endless kinds of sensors, will generate a prodigious explosion of data. In addition, people connected 24x7 in “socials” and human-thing interactions will add up to this data flow. We are talking about a completely different order of magnitude from today’s so-called “Big Data”. Notably, making sense of this paramount information, through advanced analytics that sift through data, is probably the biggest challenge for the Internet of Everything, and many new technologies are addressing this space.



more...
No comment yet.
Scoop.it!

Top Security Threats Still Plaguing Enterprise Cloud Adoption - Redmondmag.com

Top Security Threats Still Plaguing Enterprise Cloud Adoption - Redmondmag.com | IT Support and Hardware for Clinics | Scoop.it

As cloud computing moves beyond the early-adopter stage, security and privacy concerns and the inherent risk of moving assets off-site are not just fears -- they're real. Uncertainty about data security and privacy slowing the adoption of cloud computing existed before last year's revelations by Edward Snowden of covert government surveillance, but the scope accentuated skepticism, coinciding with the rise of cyber attacks from around the world.

"Edward Snowden's revelations were really a wake-up call for the industry about what the government can do with your data," says IDC analyst Al Hilwa. "And if the government can see your data, who else can? It's really not surprising that security concerns have slowed enterprise adoption."

Those fears notwithstanding, they're unlikely to put a major dent in projected adoption of public cloud services in the coming years. Gartner Inc., for example, predicts cloud computing will constitute the bulk of new IT spending by 2016, and that nearly half of large enterprises will have hybrid cloud deployments by 2017. However, the results of a recent survey by U.K.-based communications services provider BT Group of IT decision makers in large U.S. companies underscore a contradiction: 79 percent of respondents said they're adopting cloud storage and Web applications in their businesses, but they also report their confidence in the security of the cloud is at an all-time low.

Top Security Threats
The lack of confidence is with good cause. The Cloud Security Alliance (CSA) has identified what its researchers believe to be the top nine cloud security threats. Data breaches top that list, dubbed "The Notorious Nine". Also on that list are data loss, service traffic hijacking, insecure interfaces and APIs, denial-of-service attacks, malicious insiders, cloud services abuse, insufficient due diligence, and shared technology vulnerabilities. The company emphasized those risks at a three-day conference in September hosted jointly by the CSA and the International Association of Privacy Professionals (IAPP).

Not on that list, but another major risk, is the ease with which employees can and typically do bypass IT departments when using cloud services, says Jim Reavis, founder and CEO of the CSA. Today, anyone can use a credit card to spin up a virtual machine on Amazon or Microsoft Azure, set up a SharePoint instance via Office 365 or another third-party provider or by using free services such as Box, Dropbox, Google Drive or Microsoft OneDrive. Reavis points out that when people bypass IT when using these and other services, it undermines business-level security policies, processes, and best practices, making enterprises vulnerable to security breaches.

Another risk Reavis points to: the lack of knowledge by IT management of the scope of cloud usage in an organization. At the CSA Congress 2014, the group published the results of a survey of U.S. companies, many of which drastically underestimated the number of cloud-based apps running in their organizations. The report concludes, "Cloud application discovery tools and analytical tools on cloud app policy use and restrictions are crucial in the workplace, especially when it comes to sensitive data being used by these cloud applications. With sensitive data being uploaded and shared by these apps with authorized and unauthorized users, policy enforcement becomes a major role in protecting your data."

The report estimated with more than 8 billion Internet connected devices, a growing number of businesses may own data, but no longer own their infrastructure. "A few years from now, that 8 billion will become a quarter trillion," Reavis says. "If we lose ground on privacy and security today, we'll have a very hard time getting it back. That creates a mandate to embrace the tools and technologies that are emerging to manage and protect these resources."

The proliferation of all those devices and the bring-your-own-device corporate culture has resulted in an enterprise that's more difficult than ever to protect -- cloud or no cloud, says C.J. Radford, VP of Cloud at data security company Vormetric Inc.

"The perimeter has failed or is failing, given that data is now everywhere," Radford says. "If you're only focused on your perimeter, you're going to have a very hard time protecting your data. But that's where the enterprise has traditionally spent its money over the past 10 or 15 years -- essentially, on building a bigger moat. The problem is, you can't build a moat around, well, everything."

Controlling Access
In an increasingly cloud-centric, perimeter-less world, enterprises must concentrate their security efforts on protecting the data itself, Radford says. His company partners with leading cloud vendors, including Amazon Web Services Inc., Rackspace, IBM Corp., and Microsoft, to provide data-at-rest encryption, integrated key management, privileged user access control, and security intelligence logging. Among other things, the Vormetric Key Management Key Agent software works with Microsoft SQL Server Transparent Data Encryption (SQL Server TDE) to help manage SQL encryption.

"Today, it's all about controlling data access," he says. "If you read any of the major breach reports, one of the ways the bad guys are getting access to data is compromising privileged username and password credentials. They're doing it through social engineering, phishing and that sort of thing."

Not surprisingly, Radford is a strong advocate of data encryption, and he also recommends a bring-your-own-key (BYOK) approach. "You should never rely on the provider to manage your encryption keys," he says.

"BYOK means the provider can turn over your data in encrypted form, but it's useless without the key. The other thing it buys you is the ability to `digitally shred' your data. We call that `permanently securing your data.' That's why we always say, rule No. 1 in encryption is never lose your key."

Encryption support is even showing up above the infrastructure level. Azure, Outlook.com, Office 365 and OneDrive, for example, are now supported by Transport Layer Security (TLS), Microsoft announced last summer. The encryption support covers inbound and outbound e-mail, as well as Azure ExpressRoute, which allows users to create private connections among Azure data.

Data encryption and data-centric solutions seem to be especially appealing to enterprises in the post-Snowden era, says Luther Martin, chief security architect for Voltage Security Inc.

Martin believes the primary cloud security concern in the enterprise today is availability.

"If you look at the data, in terms of frequency, most of the cloud incidents so far have been about service outages," he says. "The outages have been relatively short, but they can be terrifying, and there's not much an enterprise can do about them."

He also notes, however, that encryption keys present their own challenge -- namely, keeping track of them. "Effective encryption key management is hard," he says, "and people often don't give it the consideration it deserves. I mean, if you lose a key, you've lost your data, too."




Via Michael Dyer
more...
No comment yet.