• Mar 29
    2016
    It's clear that the cloud is taking over. For the next five years, observers expect an annual growth rate of 44% for workload in the public cloud while "on-premise" computing workloads will grow only at 8.9%. Right now, an organization on average uses 545 cloud services! IBM created a great infographic of the five reasons businesses are adopting cloud computing technology: It offers better insight and visibility. It makes collaboration ...
  • Mar 22
    2016
    Imagine you work in a Human Resources office, and you receive an email message from your company's CEO asking you to send the W-2 forms for every employee who worked at the company last year. You're conscientious, so you quickly gather all the files, attach them to a reply message, and hit "Send." Now imagine that the CEO’s email message had been spoofed, and what you had responded to was ...
  • Mar 15
    2016
    From where I sit, the cyber security training business appears to be growing very fast. But the Global Economic Crime Survey 2016 published by PwC (née PricewaterhouseCoopers) suggests that it still isn't growing fast enough. The survey, which is based on 6,337 executives worldwide, covers all economic crime. This year cyber crime was the second most commonly reported type of crime, up from fourth in the previous (2014) report. Cyber ...
  • Mar 10
    2016
    Microsoft, Apple, Google, and Amazon, as well as IBM, Oracle, Hewlett-Packard, and Cisco all are involved in the cloud technology space. According to Wikipedia, there are at least 95 cloud computing platforms. Every cloud provider takes advantage of cloud technology in their own way, and until now, the only way to learn about cloud computing was to learn about a particular platform. But cloud computing isn’t a product, it’s a ...
  • Mar 01
    2016
    In the old days, the way you took care of your car was to bring it to the dealership on a regular schedule for an oil change and inspection of its various systems. These days, you still have to bring the car in for oil changes (although they are far less frequent than they used to be), but the inspections have been largely supplanted by electronic diagnostics. The dealership technician ...
  • Feb 23
    2016
    When I access my Amazon.com account, after I enter my email address and password, Amazon's software texts a six-digit number to my mobile phone. I need to enter this number in a subsequent screen before Amazon allows me into my account. This is multi-factor authentication. Texting a unique number to a mobile device is probably the most common way that commercial websites implement multi-factor authentication. But it’s not the only ...
  • Feb 16
    2016
    Since the days of B. F. Skinner's teaching machine, researchers have understood the power of reinforcement in training. Some early researchers tried to turn the quest for reliable and perfectly timed reinforcement into a means of training learners without human intervention. And so we had computer-based training programs that posed problems to students who were rewarded with “attaboys” when they successfully overcame the problems. The reinforcement effect is what makes ...
  • Feb 09
    2016
    About a year ago, I compared cybersecurity to the siege of Helm's Deep (an episode in the Lord of the Rings saga): "a small group of stalwarts defend a thoughtful and well-designed position (and everything they hold dear) against an unlimited number of orcs. The orcs aren't particularly competent, but they don’t have to be. From time to time, their efforts are enhanced by explosives and siege technology. But their ...