Академический Документы
Профессиональный Документы
Культура Документы
03
CYBERTREND.COM
MORE SERVERS,
FEWER HEADACHES
HOW TO LEVERAGE
COLOCATION SERVICES
SO YOU CAN FOCUS ON
YOUR CORE BUSINESS
32
9 COVER STORY
making sense of your colocation service
provider options
32 DATA
data visualization makes it easy to get a
handle on your information
47 SECURITY
better authentication options for better
security, and how to handle a cyberattack
14 BUSINESS
the big picture at Samsung, and how bots
interfere with cybermarketing initiatives
36 ENERGY
the latest news and research into energyconscious tech
52 WEB
fog computing, and overcoming hindrances to
seamless content delivery
24 CLOUD
why cheap and easy cloud storage may not
pay off in the long run
38 IT
managed IT services benefits, and why
many companies are building data centers
in Europe
58 ELECTRONICS
the latest in premium consumer electronics
28 MOBILITY
mobile platforms in the enterprise, and
extending wireless connectivity everywhere
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
44 NETWORKING
the evolution of virtual private networking and
how it helps you today
60 TIPS
smartphone, social media, and business
travel tips
Copyright 2015 by Sandhills Publishing Company. CyberTrend TM is a trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend TM is strictly prohibited without written permission.
Cloud infrastructure revenues experienced 16% year-over-year growth, eventually reaching $6.5 billion in revenue
in Q3 2014, based on statistics in IDCs
recent Worldwide Quarterly Cloud IT
Infrastructure Tracker. Whether internally owned or rented from a service
provider, cloud environments are strategic assets that organizations of all types
must rely upon to quickly introduce new
services of unprecedented scale, speed,
and scope, says Richard Villars, vice
president, data center and cloud research,
at IDC. Their effective use will garner
first-mover advantage to any organization
in a hyper-competitive market.
35.1%
13.2%
12.2%
Dont have a formal process for message development; we hire people and expect
them to do the right thing, but its hit-or-miss in terms of execution
10.8%
The consumer use case for generalpurpose smart glasses is weak, says Nick
Spencer, senior practice director at ABI
Research. Last year, he says, smart glasses
were hyped as replacements for smartphones. However, 2014 showed the use
case for smart glasses is task specific, for
example remote assistance, security (facial
and number plate recognition), augmented
reality, and virtual reality, he says. ABI
Research expects unit shipments of smart
glasses to increase 150% this year, with
almost all attributed to the enterprise and
public sector for tasks such as remote assistance, police and military, security, and
warehouse and barcode scanning.
WORKING OUTSIDE
THE WORKPLACE
INTERNETS IMPACT
ON PRODUCTIVITY
10% A Few
Times A Month
8% Almost
Every Day
13% A Few
Times A Week
13%
Every Day
15%
Less Often
41%
Never
7% Less
Productive
46%
No Effect On
Productivity
1% Dont Know/
No Answer
46%
More Productive
STARTUPS
Startup Offers Encrypted
Collaboration
The Vancouver-based
startup Witkit recently
launched a customizable
social collaboration platform designed to replace
all aspects of project
communication, including document collaboration, file sharing, messaging, videoconferencing, and calendar. The key
selling point for this business-focused
platform is that Witkit uses the companys own WitCrypt encryption service,
which encrypts data on one users device
and then decrypts the data on another
users device so that unencrypted information doesnt pass through the cloud or
reside on Witkits servers. President and
CEO Sean Merat says . . . in the unlikely
event that the Witkit servers are compromised, there will be no decrypted data to
be found or at direct risk.
What might the suitcase of the future be able to do? Let you know its location whenever you might be looking for it, regardless of where youre at? Tell you how much it
weighs to spare you any unpleasant surprises when checking in at the airport? Alert
you (and lock itself) when its no longer nearby? Bluesmart, a startup founded in
2013 and headquartered in Mountain
View, Calif., has designed a suitcase that
possesses these and
other features. Billed
as the worlds first
smart, connected luggage, the Bluesmart
TSA-approved hardshell suitcase also
includes a battery
charger and a complementary mobile
app that controls the
suitcases digital lock, helps you plan your trip, and provides the aforementioned vital
statistics for your suitcase. The company recently announced it would receive $2 million
in funding from its Y Combinator backers.
WHOLE CHICKEN
Tecumseh Farms Smart Chicken is truly the most natural chicken in the United States. All Tecumseh Farms
products are raised without the use of animal by-products, antibiotics, or hormones, are 100% all-natural, and are
processed using puried cold air instead of adding non-potable waterthats the air-chilled difference.
WWW.SMARTCHICKEN.COM
KEY POINTS
While data center colocation generally means leasing data center facility
space, its not uncommon today for
colo providers to offer a variety of supporting services.
Add-on colocation features include
managed and hosted services, crossconnects with other tenants, and
industry-specific expertise.
Colocation pricing plans have
shifted from space-based charges to
power-based charges.
Using one or more data center
colocation providers can enable your
organizations internal IT staff for
focus more of its attention on projects
strategic to the business. This practice
also improves your data security.
The Basics
At its core, colocation entails a
provider leasing data center space in
which an organization can place its
own infrastructure. The vendor generally provides the mechanical and
electrical equipment (power, cooling,
physical security, power distribution
units, etc.) and the rack space, and
the organization maintains responsibility for procuring, configuring, and
maintaining the compute, storage,
networking, and security infrastructure. This arrangement, says Lynda
Stadtmueller, cloud services vice president at Frost & Sullivan, grants organizations considerable management
control over workload performance
and security but without the costs of
building out a private data center.
Make A Case
Among the additional services that
colocation providers may offer is office
space, conference rooms, and various
amenities (access to food, break rooms,
etc.), Morgan says. Other offerings are
more operationally focused. Facility
described as colocation interconnect
facilities, cross connects, or carrier
hotels, for example, provides organizations with direct access to multiple
carriers and cloud service providers.
By avoiding the last mile of network access and connecting directly
with high-speed carrier backbones,
organizations can minimize network
delay and costs for their latency-sensitive workloads, Stadtmueller says.
Financial services, gaming, media, and
entertainment industries in particular
can benefit from such services.
10
cases, a provider might develop industry-specific offers or SLAs (servicelevel agreements). Understanding
and responding to industry-specific
needs and challenges allows a colo provider to bring additional value to the
tenant, she says.
Typically, providers offering managed services possess certifications
(HIPAA, PCI, etc.) that most industries require, Vargas says. This is fairly
middle-of-the-road, she says, although
where vendors start going above and
beyond is adding flexibility into contracts. Generally, this requires some
forecasting in terms of the organizations move-in requirements progressing year on year so that by the end
of, say, a five-year contract it will want
to reserve a given amount of space,
Vargas says.
Ive seen some vendors be a little
more accommodating with users when
theyre not certain about what their
capacity requirements are going to be,
Vargas says. So, instead of having to
penalize them for having to expand or
retract parts of the contract, theyre
being a little more flexible in those
terms up front.
Elsewhere, Vargas says, providers
are offering more variability in terms
of resiliency levels. The old colocation model, for example, saw a provider build up its facility so everything
was at, say, a Tier III-plus level. Now,
The Costs
In terms of infrastructureservers,
storage, security appliances, networking, etc.using a colocation facility usually requires the same capital
investments as an on-premises facility.
Additionally, tenants may pay a fee
covering space (by the rack, cage, or
floor), heating/cooling, power, physical security, and network access.
Companies must also budget for IT
personnel to provision and maintain the infrastructure as they would
for on-premises circumstances,
Stadtmueller says.
Beyond charging by the square
foot or rack, providers may charge by
the kilowatt used, Morgan says. For
smaller deployments entailing a few
racks, she says, organizations often pay
a flat fee that grants access to a certain amount of power and bandwidth
and sometimes a set number of IP addresses. Larger deployments may entail
11
Matters Of Location
A key factor in choosing a colocation provider is location itself. This
pertains both to the organizations
geographic focus and the providers
footprint, which can range from multinational to local. Currently, Dinsdale
says, there arent many choices for
companies needing a truly multinational provider. Conversely, for companies that only need a provider in a
single U.S. metropolitan area, the list
of potential providers is substantial.
Generally, organization first
choose a broad geographic location,
such as one near its customers, partners, branch locations, or interconnect facilities in other global regions,
Stadtmulleur says. They then seek a
specific provider. Stadtmueller recommends reviewing the features a vendor
supports at its individual locations,
including if the facility is built along
a fiber network route or has access
to two separate fiber routes for highavailability workloads.
For workloads requiring the highest
possible uptime, Stadtmuller recommends determining whether the facility is protected from power outages
through access to power substations on
two grids, noting, however, that not all
workloads require the highest levels of
access, security, or resiliency. Thus, be
sure to consider price performance factors in decisions.
Other location-specific considerations include noting how often IT
staff will need to visit the facility, how
12
Take Responsibility
A chief concern for any organization using colocation is what becomes
of the colocation agreement should the
organization become unhappy with the
services, or if the provider goes out
of business. In this area, Stadtmueller
says youd better get it right before
signing the contract. Her recommendations: When researching prospective
providers, check their stability (time in
business, ownership, financial strength,
etc.), tour their facility to note how
they operate, and ask for customer references.
Morgan says to ask the provider to
produce incident and maintenance
Reduce Down-Time.
Reduce Waste.
Go With The Best.
PC-Doctor offers the industrys #1 PC diagnostic
repair toolkitssupporting all major brands,
including tablets and ultrabooks.
GO DEEP
866.289.7237 | PCDServiceCenter.com
KEY POINTS
Samsung started off as a trading
company but quickly expanded into
the electronics and home appliance
markets in subsequent decades.
Samsung is commonly known
for its mobile products, including its
TV sets, smartphones, tablets, and
cameras.
Samsung 360 Services for
Business give you 12/5 or 24/7
support for mobile devices, security, and more.
For enterprises, Samsung offers
mobile, networking, telephony, and
marketing solutions. All of these
products build off of Samsungs
heritage but show the companys
ability to adapt and innovate.
14
A Diverse Portfolio
Its much easier to look at Samsung
as a group of business units rather than
Innovation In
The 1990s
15
16
Digital Photography
In the realm of digital cameras,
Samsung offers models as sharp as
28MP or greater, with bright displays
and touch panels. Samsungs digital
camera range includes simple point and
shoot models and cameras that support
interchangeable lenses. Whether youre
a digital photography novice or a professional, Samsung offers cameras with
a wide range of features that support
your specific expectations.
On the point and shoot side,
Samsung offers cameras with builtin Wi-Fi for easy sharing, as well as
models with dual-view LCD screens so
you can see what youre shooting from
the front of the camera as well as behind
it. And for the savvier photographer,
Samsung offers high-end NX system
cameras that offer multiple lens options,
so you can fine-tune your configuration
for the best possible image regardless of
distance or lighting conditions.
17
Networking Solutions
18
Samsungs Videowall displays can be arranged in various configurations in order to make the most spectacular impression.
Telephony, Unified
Communications & More
Samsungs telephony and UC (unified communications) services for
enterprises include the Samsung WE
VoIP applications for smartphones
and Samsungs other CTI applications,
which combine to ensure employees
and customers can communicate regardless of where they are. The WE
VoIP solution is particularly helpful
because employees can use it as they
travel to stay in touch with colleagues
back at the office or with customers at
any location. You can even start a conversation at the office and then transition it to your smartphone as you
leave.
In order to use these features, however, you need to have a strong PBX
foundation in your company. SCM
(Samsung Communication Manager)
supports up to 3,000 users and offers
enterprises a powerful phone system
for use in a UC-focused environment. In addition to the SCM solution,
Samsung offers a line of IP (Internetbased) phones that are built to take
advantage of Samsungs VoIP features.
Its these products that integrate with
Marketing Solutions
Given the companys history in televisions and displays, it makes sense
that Samsung would create unique
ways of using those technologies to interact with potential customers. This is
where Samsungs SSP (SMART Signage
Platform) comes in. Perhaps youve
noticed those backlit signs in airport
concourses or in the shopping mall.
Samsungs SSP displays appear similar,
but allow people to fully interact with
the display, and companies can create
custom content for them. Imagine
being able to deliver an interactive advertisement to potential customers in
high traffic areas and actually get them
to stop and interact with your brand.
SSP makes this possible.
You can also take this a step further with Samsung Videowall displays,
which enable the display to become
part of a rooms architecture. The
Videowall comprises separate HD displays that can either be used to show
19
KEY POINTS
In 2014, 56% of all Web traffic
came from bots, and 29% of the
traffic were bad bots. Of the bad
bots, 22% were impersonators,
which are bots that look like real
traffic at first glance.
You might be paying for click
and ad impressions that come from
bot activity, essentially wasting
those dollars.
Digital advertising and marketing
efforts can be tough to track. Youll
want to find a marketer that can
provide you with verifiable results.
To determine the actual traffic
for visitors to your website, youll
need some hardware that can sort
the bad bots from the good ones.
20
What Is A Bot?
If youre a regular CyberTrend
reader, youre likely familiar with bots
Digital advertising presents a whole new set of challenges compared to broadcast, which is protected by the
trifecta of inventory scarcity, visibility, and standardized
controls. Digital has the opposite trifecta in play: near
infinite inventory, difficult visibility and hundreds of different standards for reporting and controlswhich have
made the space both ripe with opportunity and a breeding
ground for fraud to grow unchecked.
JARED BELSKY
President : 360i
True Numbers
So how do you go about finding
real, human digital traffic? Belsky says,
Marketers invest millions of dollars in
advertisingfrom banner ads to video,
websites, and morebut often spend far
less on accurate measurement of those
assets. Additionally, advertisers also
need to ensure the media investments
are driving real value. Belsky notes,
Advertisers need to take better care to
21
ADWARE
Adware is a type of spyware that
can boost clicks by running videos or
ads in the background of an infected
PC. Adware-enabled activity may not
be classified under bot fraud, because
adware does not use bots to create the
additional traffic. The impressions are
still fraudulent, but the adware traffic
doesnt typically appear on users PCs.
Instead, it will run in the background.
For example, a pop-up video may appear thats showing a video ad. The
user will close the ad, but the adware
will loop in the background with silenced audio. Because the ad is always
hidden, youre seeing no viable impressions from the traffic.
make marketers know that their investments are safe, real and tangible, and
that their digital dollars arent going up
in fraudulent smoke.
When working with an advertiser,
youll want to make sure that they can
verify audience measurement. The advertising industry must provide more
proof and better metrics that both
CHRIS RODRIGUEZ
Network Senior Industry Analyst : Frost & Sullivan
22
Website Traffic
When it comes to figuring out the
actual amount of traffic for your business website, youll need some hardware
STAY AHEAD
OF THE CURVE
www.cybertrend.com to get up
to speed on the latest technology news and information about
products for your company.
KEY POINTS
Adopting cloud-based storage
can mean immediate cost savings,
but many companies experience
unforeseen long-term complexities
and costs.
Rather than for cost savings,
organizations are increasingly
adopting cloud storage for speed
and agility reasons.
To see a long-term cloud
storage payoff, begin by pinpointing what the organization
specifically hopes to achieve from
cloud storage.
SLAs (service-level agreements), cloud storage model, and
migrating to another provider can
all generate unexpected costs.
24
are not necessarily tied to costs savings. Whats key is knowing what an
organization should ask of itself and
of potential cloud storage providers to
determine how the organization can
benefit and ensure it gets what it requires from a provider. The following
explores these issues and others in
order to forge a cloud storage strategy
that makes getting a payoff from cloud
storage possible.
survey youre going to read thats associated with IT and IT directors who
dont have visibility into the big picture.
Specifically, Baig says, while its
possible for IT to deliver on-premises storage below the cost of cloud if
done efficiently, cost benefits arent
the primary goal when CIOs choose
cloud storage. Its always, always the
agility. Thats because hardware procurement-to-deployment times can run
into the months before completed, he
says. Conversely, procuring needed
storage via the cloud can literally take
minutes. I live and breathe cloud
storage every day, Baig says. To me,
thats the biggest misconceptionthat
cloud is all about economics. Cloud is
actually all about agility.
The Payoff
While some organizations do use
cloud providers for primary storage
needs, various data and experts point
to cloud storage as more commonly
being used as good options for disaster
recovery, backup, and archiving purposes. In other words, cloud storage is
good for data that needs to be accessed
easily but infrequently, if at all. King
says cloud is also seen as offering the
means to efficiently and cost-effectively
address continuing storage growth
25
Control Costs
A notable problem with cloud
storage providers is that people dont
realize there are so many complex
pricing models out there, Baig says.
26
SPEED OF CHANGE
You use CyberTrend
to keep tabs on the latest
.COM
Get the latest issue right now
online at www.processor.com
or on your iPad via the iTunes Store.
28
Among the more compelling developments in this sector is the testing that inflight Wi-Fi provider Gogo is conducting
involving a satellite-based Wi-Fi system that
reportedly will enable connections reaching
70Mbps. Thats described as enough to
download a 2-hour HD movie in roughly
four minutes, though real-world results will
likely be slower as passengers share bandwidth.
Arguably even more compelling are
Google and Facebook projects involving satellites, drones, and balloons. While some
naysayers deem the companies efforts risky
due to potential regulatory challenges and
costs reaching into the billions, for both companies theres the promise of adding millions
of new users to their customer bases.
By most estimates, roughly half the
worlds population remains offline, sometimes due to difficulties and costs associated
with building traditional network infrastructure in rugged and underdeveloped regions.
There are definitely large percentages of
the worlds population, mainly in emerging
The Projects
Whatever the motivation, Google's and
Facebooks projects are intriguing. Google
and Fidelity, for example, recently provided
$1 billion in funding to SpaceX, the rocket
and spacecraft company led by CEO and
CTO Elon Musk. The result for each company was a roughly a 10% stake in SpaceX,
which reportedly will use the funds to assist
in spreading Internet access globally via 4,000
low-Earth satellites.
Previously, Google had launched its own
wireless connectivity projects, including
a satellite effort that took a hit when Greg
Wyler departed his leadership role to start
OneWeb. That company is seeking to launch
roughly 650 low-orbit, light-weight satellites
to provide wireless access. OneWeb counts
Virgin and Qualcomm as backers. Unlike
SpaceX, OneWeb already owns rights to
radio spectrum for transmitting data.
Outside of satellites, Google also has
Project Loon, a project that aims to spread
wireless connectivity via high-altitude balloons floating in the stratosphere, or twice
29
30
Security Considerations
As we mentioned before, due to their
open source nature, some operating systems are vulnerable to security threats
than others, but that doesnt mean that any
one OS is 100% out of harms way. After
all, if a device is jailbroken, or modified
by the user to add otherwise unavailable
functionality to the device, then it doesnt
matter what OS its running.
Even the newest version of iOS could
cause potential issues with the amount of
inter-application data-sharing. One of the
big things with iOS 8 is that it enables a
greater level of data sharing between applications, says Crook. From a consumer
point of view and a usability point of view,
thats great. But from a security point of
view, thats problematic because Im making
it even easier for data to escape its safe parameters.
To help overcome these issues, companies are either using fully featured enterprise
mobility management solutions or going
with more granular security approaches.
For example, Crook says, some companies
are using VPN (virtual private network)
solutions that enable you to pinpoint specific corporate applications on a device and
permit only those applications to access internal company resources. Companies can
also use containerization to completely separate corporate and consumer applications
and make sure no sensitive data is shared
between them.
Network Issues
In addition to affecting ITs security
strategy, the sheer number of mobile devices
out there is making it harder to offer safe
and reliable wireless coverage to all employees. Rapoza says users can sometimes
struggle just to connect their new device
to the network in first place, which often
causes them to go to a guest network or use
4G and sidestep the main corporate network altogether. And there are some situations where a companys campus has spotty
network connectivity in certain areas or the
system forces employees to disconnect from
one network and connect another as they
move around.
To help solve these issues, Rapoza says,
IT needs to design their wireless networks
with mobility in mind. For example, BYOD
onboarding is one kind of tool that organizations are using to obtain a greater amount
of information about any device that's connecting to the network. Additionally, this
type of tool automatically determines the
security clearance level a given device has
within the organization. This makes the authentication process faster and practically
invisible to the end user. Companies can
also incorporate geolocation-based functions into their networks to track mobile
devices regardless of their location on the
campus, know when a device is off-campus,
and then disconnect it from the network.
Rapoza adds that some businesses are in
the process of implementing virtual LAN
and SDN (software-defined networking)
solutions as well. With approaches such as
these, employees essentially have their own
individual networks and cant actually see
any others. This makes it much easier to
segment employees into different groups
and control what parts of the network they
are allowed to access.
the more secure something is, the less usable it tends to be. One way companies
are doing this, according to Crook, is to
either add custom security capabilities to
native applications or build entirely new
applications for employees to use that are
even better than native alternatives. This
makes it so companies can fine-tune the
user experience of each individual application while still maintaining the necessary
security and management functions.
Crook adds that some companies use
EMM (enterprise mobility management)
solutions to improve the user experience
through more automation. Single signon is another capability thats end userfocused to make the end users life easier so
they can sign into one app and not have to
sign into every single other app, which in
a mobile context, can be frustrating, she
says. Biometrics-based systems allow users
to sign into devices and applications with
a fingerprint scan rather than having to
manage dozens of passwords.
On the networking side, Rapoza once
again stresses the importance of changing
the way you design your network altogether. If youre going to build your network to mainly be good for laptops and
desktops and [you] dont care about how
well mobile connects, youre going to be
in big trouble, he says. If its within your
policy, whether you have full BYOD or are
using CYOD, you want the users to be able
to log in easily, stay connected, and have a
good experience, because any time a user
cant get to a key business app or cant connect to a client, youre losing productivity
and potentially losing clients.
31
KEY POINTS
It is believed that people can find
patterns and trends more easily in
visually presented data than they can
in number-filled reports.
Some BI (business intelligence) and
analytics solutions include tools that
are capable of automatically recommending the best visualization type for
a given set of data.
Many experts believe adopting
data visualization tools is no longer an
optional frill, but rather a necessity in
order to remain competitive.
Todays data visualization tools
arent perfect. Many are wary of flaws
such as lack of governance and data
management capabilities, so watch for
positive developments in this area.
32
Visualizing Data
Rouda describes visualization in general as an approach that assists in understanding data and models more readily,
often at a glance. Though not all analytics
tools possess visualization abilities and not
all data lends itself to visualization, DV is
considered important to sharing insights
after analysis, he says.
Howson draws a distinction between
a simple visualization and what the BI
market segment of visual data discovery
entails. Generally, she says, when data is
presented graphically, we retain that information better than when its presented as
a dense page of numbers. Sometimes, she
says, you need the precise number, and
sometimes you want more of the pattern,
support professionals to make prompt decisions and view trends over time. PC-Doctor
uses real-time data collection and reporting
to quickly alert customers to increased failure
events, system crashes, and blue screens,
says Zaretsky. In a recent case, a corrupted
firmware update caused a spike in SSD [solid
state drive] failures. PC-Doctor identified the
problem and sent a targeted message to those
with affected systems via IMS (Intelligent
Messaging Service), a cloud-based service
that delivers timely, contextual messaging to
end users directly from the OEM. This rapid
and effective action saved countless dollars
in support and warranty costs, and reduced
downtime for the end users.
Visualization Advances
Ko goes as far as viewing DV as almost
an industrial revolution in a BI context.
Users must understand and make sense of
data before they can take action on it, he
says. Data visualization is plugging that
gap by allowing users to consume data.
Visualization widgets, like maps and heat
maps, are so intuitive, they allow average
business users to get something from the
data, he says.
Increasingly, DV is associated with selfservice analytics and assisting employees
who are business-savvy but not necessarily
tech-savvy to dive into big data and drive
decisions. Ko says DV and self-service analytics go hand in hand. Users can interact
with the data and make sense from it, he
says. Traditional reporting and BI push
33
34
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
Fortunately, many
researchers,
manufacturers,
and businesses
are working to
create solutions
that will keep us
productive while
reducing energy
demands to lessen our impact on
the environment.
Here, we examine some of the
newest green
initiatives.
Lucid Energy worked with the city of Portland to install large pipes containing turbines into some sections of the
city's water system. Flowing water spins the turbines, which in turn generate electrical power for consumers.
36
37
Managed IT Services
BRIGHT PROMISES & CAUTIONARY TALES
KEY POINTS
Organizations typically seek a
managed service provider to obtain
an ongoing service delivered at a
high quality that meets required
service levels.
Using a managed IT service can
be attractive when theres a need for
a service that isnt currently provided
internally or if a service isnt being
performed adequately.
Many companies are attracted to
managed IT services by the potential
to reduce costs and the daily IT management responsibilities for internal
IT teams.
Over time, many industry experts
believe that managed IT services will
transform or evolve into cloud computing solutions.
38
The Basics
Essentially, managed IT services
is just another form of outsourcing.
Why Do It
Many organizations use managed
IT services because they lack the time
and expertise needed to manage hardware, software, networks, etc., whereas
an MSP can deliver the abilities while
meeting required service levels and security, privacy, and governance policies
often at a lower cost. Kusnetzky says
that as organizations face more requirements to reduce costs while offering
more and better IT services, managed
services (along with cloud computing)
will look increasingly attractive.
Another driver is when theres a need
for a service that IT doesnt currently
provide. Although building the service
internally is possible, it could take considerable time and the quality of results
may be uncertain, Woyzbun says. In
other cases, IT might provide a service
thats viewed as inadequate. A common
example has to do with consistently applying patches, updates, and other support to a software package. You screw
39
40
The Market
Among some experts, theres a belief
that managed services will eventually
41
Unlike the U.S., where privacy laws are federal, statespecific, or industry-specific, all EU states use the same
directive as the basis for their national laws.
CARSTEN CASPER
Managing Vice President, Privacy & Digital Workplace Security
Gartner Europe
42
Privacys Influence
the form of, If you export personal information from our country, you must only
send it to places that have equivalent data
protections, he says.
In general, Iannopollo says EU citizens
view privacy as a fundamental right and
part of their culture. History itself has
shaped this relation with privacy, she says,
making Europeans different than citizens in other geographies. As customers,
Europeans are increasingly aware companies are seeking out their data because
of its value, thus they expect companies
to protect their data as one would protect
valuable assets, she explains.
Iannopollo says for any company
dealing with EU customer data, complying with rules means mitigating risk
of fines but more importantly, having
the opportunity to build a trustworthy
relationship with their customers, a
stronger reputation for their brand, and
ultimately a competitive differentiator
for their business.
The Future
Nebuloni says most U.S. executives he
speaks with are cognizant of the great
regulatory and psychological problems
existing in Europe, particularly executives
involved with companies that offer cloud
products. Ultimately, Nebuloni believes,
larger U.S. companies will partner with
local providers to address privacy issues.
Casper, meanwhile, says the need to
operate data centers in Europe is unlikely to go away soon. How demand will
change, however, will largely depend on
the legislative initiatives on privacy in
the U.S., in the European Union, and the
privacy discussions between the two parties, he says.
Similarly, Iannopollo says privacy and
data protection arent merely 2015 trends.
Theyre really here to stay and to change
businesses culture and modus operandi
as necessary, she says. She expects more
non-EU companies will open European
data centers and fully comply with EU
data protection rules. Moving forward,
we also expect them to truly understand
and operate against the cultural background of their European customers,
partners, and employees, she says.
Reduce Latency
No onenot customers, not employeeslikes to wait for technology to
work. A chief benefit of NVMe is the reduction in latency, enabling systems of
Increase Bandwidth
When considering the overall performance of your organizations database,
Web, and other mission-critical systems,
another important factor is bandwidth. In
benchmarking tests, Supermicros NVMe
servers exhibited improvements up to 5.93
times greater than servers using SATA3.
These improvements in latency and bandwidth translate directly into more work
done in less time, for greater ROI.
First To Market
Ease of use and ease of maintenance
also contribute to greater ROI. With
its SuperServer NVMe-capable servers,
Supermicro is first to market with NVMe
hot-plug capability, which means IT personnel can upgrade drives, add capacity,
or replace failed drives without shutting down their systems. This prevents
down-time. Factor in improved power
optimization features, and the value of
Supermicros NVMe servers becomes
more considerable.
Learn More
There are now over 30 Supermicro
SuperServer NVMe systems in addition
to the SYS-6028R-TDWNR model shown
above, and the number is growing rapidly. Contact Supermicro to find out more
about pricing and availability.
43
KEY POINTS
Mobile devices have changed
networking requirements and VPN
is evolving along with it.
The cloud has forced companies
to decide how they want to use VPN
in the future and whether they need
third-party VPN solutions.
The future of VPN depends on
how well it interacts with MDM
(mobile device management) and
UTM (unified threat management)
security solutions and how its
unique capabilities can supplement
those solutions.
Whether you actually use VPN
onsite ultimately depends on the
size and age of your company as
well as your infrastructure needs.
44
45
46
Better Authentication
DOUBLE DOWN ON YOUR ONLINE SECURITY
Multi-Factor Passwords
Most online services that offer multifactor authentication use an OTP (onetime password) in conjunction with the
tried-and-true username and password.
Arguably the most popular OTP delivery method is a simple text message.
47
48
The big benefit of the TOTP app, compared with an SMS message, is that it
works even if your smartphone doesnt
have a data or cellular connection.
an option to remember
that particular computer.
This way, you wont have
to deal with re-entering a
new verification code, but
youll still be protected
against hackers trying to
access your account from
another PC.
Googles default options
for two-step authentication
are SMS (Short Message
Service) or voice call.
To use Google
Authenticator instead, access your Google account
settings and select the
Security tab. Then, click
the Settings option next to
2-Step Verification. Click
the Switch To App button.
You will receive a prompt
to use your phones
camera to scan the onscreen QR code, which
will produce the 6-digit
verification code in Google
Authenticator. Enter the
code on the Google account Web page to enroll
your mobile device with
the Google Authenticator
app and youre all set.
and password with a code thats delivered to your smartphone is rapidly becoming the standard combination, says
McCloskey.
We found that some banks offer
customers a hardware token, but there
are some challenges involved with
using hardware tokens with online services. McCloskey explains, Practically
speaking, the hardware tokens arent
something that will take off, because
youd have a token for every online
service that youre working with.
Therefore, most online services will continue to send passcodes via SMS or work
with a soft token app in the near future.
Biometrics
With fingerprint readers and highresolution cameras now available on
smartphones and tablets, you would
think that biometrics would be an upand-coming method for multi-factor
authentication. Unfortunately, there are
some major obstacles to overcome when
it comes to biometrics as an extra layer
of authentication. It really becomes a
privacy issue, says McCloskey.
For example, you can always change
your password, but if a cybercriminal
were to steal your thumbprint or voice
Multi-Factor Authentication
Setup
Although a variety of online services
now offer multi-factor authentication,
its almost always optional. And you
must register and configure multi-factor
authentication before securing your accounts. Many of todays most popular online services, including Google, Microsoft,
Facebook, PayPal, Dropbox, Apple,
Evernote, Yahoo!, and LinkedIn offer some
type of two-factor authentication.
If you havent already made the move,
we recommend that you consider the additional security of two-factor authentication for any online service that stores
your personal information. Most online
services offer a way to save a device as a
trusted source, so the process isnt too
time-consuming after the initial setup. In
the digital security arms race, its nice to
have any option that puts us in more control of our account security.
49
50
Dont Wait
Rodriguez suggests that now is the
best time to come up with a DDoS mitigation strategy. Investing in preventive
measures will cost significantly less than
paying for the emergency attack mitigation services that many vendors offer.
Likely, a DDoS service provider will
be able to offer a standby option that is
more cost effective than an emergency
response service, he says. Your preemptive steps will also prove to be more
effective in the long term, unlike emergency procedures, which provide more
limited immediate benefits. Make sure to
have escalating response plans. Evaluate
the options early, whose responsibility
51
Fog Computing
PROVIDING A BRIDGE BETWEEN END USERS & THE CLOUD
KEY POINTS
Fog computing is a developing
model for connecting devices lower to
the ground as a complement to cloud
computing.
Fog computing would offload
processing, storage, and networking
workloads occurring in cloud services
and place them at the edge of the network in distributed local resources.
Reduced latency would be a primary benefit, which will be vital when
factoring in billions of connected devices the Internet of Things entails.
Fog computing would put real-time
data closer to users, providing an opportunity for users to perform more
relevant, time-sensitive analysis and
make intelligent business adjustments.
52
53
54
just waiting to be harvested for analysis, and fog computing can actually
bring you much closer to these realtime data collection opportunities,
Hill says. Theoretically, the fresher the
data, the more relevant it would be
to an organizations analytical goals.
The closer the organization is to the
data, the quicker it could adjust to current conditions.
Matt Hatton, Machina Research
founder and CEO, believes that while
theres a benefit to a fog computinglike approach of processing data on
edge devices vs. sending every bit of
55
56
Common Challenges
To better communicate with and engage customers, companies are adding
more video and personalized content
to Web pages. A challenge here, says
Jim Davis, 451 Research senior analyst,
is preparing that video content for delivery by a CDN. The process for managing video assets and encoding video
in various formats at a proper quality
level are specific stumbling blocks.
Positively, Rayburn says, CDNs are
agnostic, so theyll deliver video in any
type of protocol you want. Most of the
industry has already started to standardize on HTTP protocols for video
delivery, he says.
devices are moving in and out of coverage and changing connection speeds in
real time.
Philipp Karcher, Forrester Research
senior analyst, says whatever the content,
CDNs compress or deliver the right size
or quality format to optimize the mobile device experience given the network
connection. Part of that is based on the
traditional CDN technology of storage
and delivering the content closer to the
mobile device, and part of it is actually
transforming the content itself, which is
more of a newer capability for CDNs,
he says. Companies arent taking advantage of this much yet, but Forrester
believes they will because mobile is increasingly becoming a tremendous priority, Karcher says.
Grannan dubs mobile absolutely
imperative for commerce and says
it should be a critical priority for any
marketer or digital media company
putting video on the Web. In terms of
bounce and conversion rates, Web performance on mobile devices correlates
directly with revenue growth, he says.
Elsewhere, cloud-based services consumed on workers mobile devices can
benefit from CDNs. Maintaining performance of cloud services for end users
is a tough nut to crack because latency
over the wireless network can be highly
variable, Davis says. Numerous CDN
providers offer Web performance optimization services to enhance application
performance on devices, he says.
Provider Traits
To determine which CDN provider is
appropriate, understanding that CDNs
have different strengths for different services is key. One may excel in streaming
video, while another has more advanced
mobile content optimization or dynamic
site acceleration services. Selecting a provider should entail marketing and IT
teams first deciding how much video
theyll be producing, how frequently the
sites content is being changed, and to
what degree the audience will be viewing
content on mobile devices, Davis says.
If looking for a commodity provider,
Rayburn says, theres little difference
among major CDNs. Many large enterprises, in fact, split their traffic among two
providers, he says. Providers attempt to
distinguish themselves through value-add
services (security, commerce, advertising
networks, etc.). One major provider, for
example, offers full-scale enterprise DDoS
(distributed denial of service) attack support, Grannan says.
All CDN vendors are at least talking
about security, Karcher says, whether
making acquisitions in the space or not.
Part of the new value proposition around
security is the fact that CDNs have inherently always mitigated some security
concerns by distributing the load and
adding capacity and scalability in case
of DDoS attacks, he says. Acquisitions
are helping CDNs better monitor and
How To Choose
When eyeing vendors, ask what content the organization wants to deliver,
Rayburn says. If it isnt new content,
ask how its delivered currently. If already using a CDN, ask if there are problems that require a move. Additionally,
ask whom the content must reach, on
what devices, and in what regions. Also
understand how the vendor works with
its customers and what verticals its customers address. Many large organizations change CDN providers every 18 to
24 months, Rayburn says, for price or
performance reasons or to move half of
their traffic to another provider.
57
58
Portable Lightning
For Your iPhone
WWW.PNY.COM
Your iPhone 5 or 6 might pack more of a charge
than its predecessors, but that doesn't guarantee
your battery won't run low right when you need
it most. The PowerPack L3000 ($49.99) from
PNY features a retractable Apple Lightning connector and holds enough juice to deliver up to
two full charges, depending on the iPhone model.
The L3000 itself is charged using a Micro-USB
cable (included) and sports an LED battery level
indicator so you always know where you stand.
The device uses the same 5-volt, 1-amp flow for
both input and output, and charges one iPhone
at a time. The PowerPack L3000 is pocket-sized
for easy carrying and comes with a three-year
warranty. And as long as Apple continues using
the Lightning connector, the L3000 will work with
future iPhones, as well.
59
Smartphone Tips
ORGANIZE CONTACTS & GET SOCIAL
BLACKBERRY
60
ANDROID
Automatically & Manually Merge
Contacts
Android users can make short work
of merging contacts, or combining the
multiple duplicate entries for a single
person that commonly occurs when you
import contacts from multiple sources.
To automatically combine contacts, log
into your Gmail account on a PC, click
Contacts, click the More Actions button
at the top of the screen, and then select
Find & Merge Duplicates. When the action has been completed, Gmail provides you with a report of how many
contacts were added and how many of
the contacts were merged. Typically, a
handful of contacts will not be merged,
but you can manually link these from
your Android device. Start by tapping
the Contacts icon on the Home Screen,
tap a contact you want to manually
merge with another, press the Menu key,
tap Link Contact, begin typing the name
of the second contact and then scroll
to and tap the appropriate entry from
the screen. Repeat this process for each
of the remaining contacts you need to
manually link.
61
I OS
62
WINDOWS PHONE
Set Up New Email Accounts
Windows Phone 8 does a great job of collecting all of your contacts into one
place so theyre easy to search for. If you find you have multiple instances of
the same contact, however, drawn in from various email and social media accounts, you can use the Link feature to combine them on your smartphone.
Find one of the contact instances, tap the Link icon, and then either select
another contact instance to connect it to or tap Choose A Contact to find the
correct contact to link.
Transfer Contact
& Calendar Info
Get Audible Email
Notifications
Waiting for a phone call, but dont
want to keep looking at your phone?
One alternative that Windows Phone 8
provides is the option to set a specific
sound that will play when an email
arrives. To set this up, access Settings,
tap Ringtones + Sounds, and tap Sound
in the New Email section. Then simply
select the notification sound you want
to attach to incoming emails.
63
Rootkit Attacks
WHAT TO DO TO FIGHT BACK
What Is A Rootkit?
A rootkit is software that infects and
gains privileged access to a computer.
This means it can perform administratorlevel type tasks, says Michela Menting,
practice director with ABI Research. The
primary feature is that it can hide itself in
the system and remain undetected.
One way to think of how a rootkit
wreaks havoc, says Jim OGorman, an
instructor of offensive security measures, is to envision that you are driving
64
NOT ALL ROOTKITS ARE MALICIOUS, HOWEVER, ABI RESEARCH'S MICHELA MENTING
SAYS THEY ARE EXTREMELY POPULAR WITH
MALICIOUS HACKERS AND CYBER CRIMINALS,
WHICH IS WHY THEY HAVE SUCH A NEGATIVE
CONNOTATION.
Unfortunately, the likelihood of being hacked or unwittingly downloading malware on a computer is extremely
high. Especially in the network-connected environment
of a company, even if you take all precautions necessary
someone else may not have and you get a virus from
them internally.
MICHELA MENTING
Practice Director : ABI Research
What To Do
For typical users, arguably the worst
news concerning rootkits is that getting
rid of one can be beyond their scope.
Olds says, in fact, most users should
probably seek an experts help if they
suspect a rootkit infection. Though some
security programs can detect and remove
specific rootkits, Menting says, there are
so many variants that it can be impossible
to detect and remove them all. Often,
she says, getting rid of a rootkit requires
a radical solution.
If a user suspects a rootkit, he should
first disconnect the system from the
Internet to cut off possible remote access
and prevent data from leaking, Menting
says. Next, remove data from the infected
computer and scan it for malware on another device. (Menting notes that if the
data contains unknown [or zero-day]
65
up data can include camera roll images, documents, audio, and settings,
depending on the options you choose.
Android users can manage incremental backups for apps and device
settings by signing into the associated
Google Account from their smartphones or tablets. The Android Auto
Sync feature routinely syncs in the
background; how and what it syncs
partly depends on the options you
choose, but by default the feature backs
up OS data, contact information, documents, and select app data (such as
Facebook and Twitter).
If you have a device running one of
the latest versions of Windows Phone,
you can sync documents stored on your
device with Microsofts OneDrive cloud
66
Dont Forget
Your App Data
App data encompasses a broad
range of digital information, but in
our context it means third-party apps
and the content you create using those
apps. Consider, for instance, notetaking services that exist as both cloud
services (where all of the information
that is associated with those services
is stored in the cloud) and applications
(where your app-related information
is stored locally). As you take notes
with the app, it stores those notes locally and in the cloud simultaneously
and in real-time. Such an app-service
combination is different from a notetaking app that does not have an associated cloud service; with this type
of app, everything you add is stored
only in the device and is therefore
vulnerable to loss. Make sure you know
how your apps work so you dont get
caught unawares.
Also keep in mind that some apps
are more flexible than others. Apples
Be Careful
When Traveling
If you travel frequently, you probably have quite a few travel-related
routines. When it comes to keeping
all of your data intact, though, its important to remember that travel disrupts the routines youve established
at the office. For example, if you regularly sync your tablet and smartphone
with your computer but typically leave
the computer behind when traveling,
the backup that otherwise occurs with
every physical sync wont take place
during your travels. If you keep that
sort of thing in mind while traveling,
you will remain aware of what data resides in the danger zone (i.e., stored
on your device, but not backed up anywhere else) in the event your device
gets lost or stolen.
Physical Backup
Finally, you cant sync a certain
amount of valuable device data to the
cloud (or to your main computer via
the cloud), so be sure to back up that
data as often as possible to a second
device (such as a laptop) or storage solution (such as a microSD card or portable hard drive).
You can customize which apps are backed up in iCloud by toggling the
ON/OFF button next to each app. Be sure to activate the Find My iPad feature
in case you need to locate a lost iOS device.
67
68
Collaboration is accomplished on an
international level these days, which
means that face-to-face conversations
With a cloud service such as Microsoft Office 365, you can co-author Word documents, Excel sheets, and other files with
colleagues. Unlike traditional Office products, you dont have to save a separate version for yourself or wait until another
person closes the file.
If youre a Windows Phone user, you can easily access Office 365 apps from your device. Specifically, you can start a
new OneNote page, create a new Office document, or edit files saved in SharePoint.
Print Documents
data, you can do so using a file-sharing
service. Most file-sharing services let
you securely upload and store a limited number of gigabytes (2 to 5GB is
common) of data. Some services also
give you the tools to organize your files.
Sharing from your mobile device makes
on-the-go collaboration convenient, so
its beneficial to check out file-sharing
apps appropriate for your device.
Consider Online
Productivity Tools
A plethora of Web apps fall under
the umbrella of productivity, but in
no way is that a bad thing because there
is an app for practically every task, priority, project, and goal. For instance,
you can use project management tools
to juggle deadlines, manage to-do lists,
track workflows, and more. Adding to
Use Whiteboards
When you cant meet in person,
members of your virtual team can interact and brainstorm on full-featured
online whiteboards. Browser-based
whiteboards typically let you invite
meeting participants to create and
sketch on the same board. A number of
whiteboard apps also support real-time
collaboration in which everyone in the
session is an equal participant. This is
a good tool for tablet users who want
to share ideas on the go but need input
from others.
69
PowerPoint Tips
ADD CHARTS & GRAPHS TO YOUR PRESENTATION
70
Highlight Important
Data In A Chart
Whether youre presenting numerous
charts or need to add emphasis to specific data within a chart, sometimes its
Insert A Chart
Linked To Excel
If youre used to working in Excel and
prefer to construct the skeleton of your
chart first, you can use Excel to compile data and create a chart for use in
PowerPoint. Start by entering values in
an Excel workbook. Highlight all necessary data cells, click Insert, and apply a
preferred chart style in the Charts pane.
Next, select the newly created chart and
click Copy in the Home tab. Open a current or new PowerPoint slide and find
the Clipboard pane on the Home tab.
Modify Data
In An Existing Chart
Add Animation
If you want to emphasize a particular
data group, you can add animations to
a graph or chart. Under the Animations
tab, the Animation pane has a variety
of animations you can apply to a chart.
Explore extra effects
by expanding the pane
and clicking More
Entrance Effects,
More Emphasis Effects, or More Exit
Effects at the bottom
of the menu. To stagger the animation of
individual objects,
click Effect Options
in the Animations
pane and select one
of the following
functions: As One
Object, By Series, By
Category, Be Element
In Series, or By Element In Category.
71
Certied Piedmontese beef tastes great: lean and tender, juicy and delicious.
But theres more to it than just avor. Certied Piedmontese is also low in fat
and calories. At the same time, its protein-rich with robust avor and premium
tenderness. Incredibly lean, unbelievably tender: Its the best of both worlds.
piedmontese.com