August 12, 2013
Volume XLIV, Issue 11
Tech Giants Meet with Obama to Save Cloud Computing
Excerpted from USA Today Report by Byron Achido
Edward Snowden's whistle-blowing escapades could seriously undermine the growth of cloud computing and thus stifle the growth models for America's biggest tech companies.
And that appears to be the reason why Apple CEO Tim Cook, AT&T CEO Randall Stephenson, Google computer scientist Vint Cerf and other tech executives met behind closed doors with President Obama Thursday.
"The meeting appears to be for a variety of reasons, but basically the companies want to understand exactly what the government is doing with their systems as they try to assuage a lot of concerns from a lot of different stakeholders," says Brian Henchey a privacy and information tech attorney at Baker Botts.
A group called the Information Technology and Innovation Foundation on Tuesday issued a report asserting that Google, Microsoft, Yahoo, Facebook and Apple stood to lose as much as $35 billion over the next three years as Europeans shy away from cloud services with suspect privacy safeguards.
European privacy laws are all about safeguarding the data within a nation's geographical borders. Unfortunately, that doesn't work for Apple, Google, Facebook and other cloud services providers who manufacture efficiencies by scattering data in far-flung data centers.
Snowden's disclosures threw kerosene on simmering fears about the extent to which the US Patriot Act can compel the tech giants to break their promise to keep consumer data sacrosanct.
"Many people have known the extent of data collection by the NSA and other US authorities, but it hasn't been laid bare in this kind of spotlight before," says Wendy Nather, a research director at 451 Research."
We may have known the potential amount of data, but it's another thing entirely to know the actual amount. This is the kind of exposure that brings public discussion, makes it concrete in a way that applies to everybody, and hopefully prompts some adjustments in the law.
"Right now, US-based cloud providers are caught in the crossfire," Nather says.
Any backlash — assuming one does materialize — is likely to be tempered at least somewhat by the availability of encryption services from fast-growing US tech start-ups like CipherCloud, AlephCloud, and HighCloud.
For a couple of years now encryption vendors have been pitching the notion that large organizations ought to be more extensively classifying data and encrypting sensitive information before sending it up into the Internet cloud.
Privacy stipulations in the 1996 Health Insurance Portability and Accountability Act provided the initial impetus. And state-level data loss disclosure laws have come along to force companies to notify consumers whose data they lose.
Typically, these rules exempt companies from paying steep fines or having to make embarrassing disclosures about a network breach if the stolen data was encrypted and the organization retained the decryption keys, says Pravin Kothari, founder & CEO of CipherCloud
"Whether you're using the cloud or not, encryption is becoming a best practice that is increasingly recognized by regulators in many jurisdictions," Pravin says.
Even so, rising use of encryption won't immediately temper complex backlash from regulators and privacy advocates.
The EU regulators are working on updating their laws and regulations for protection of people's electronic data, even if the data is held outside the EU. This includes almost everything a person might post to the web, including photos and blog postings.
"The conflict is that the EU may strengthen their regulations to a level that will be extremely difficult and expensive for companies to adhere to," says Jieming Zhu, CEO of encryption vendor AlephCloud. "Currently there is an agreement in place that US companies can voluntarily sign up for which determines what sort of protection they need to provide. That agreement could be replaced by much more stringent requirements, though they will not take effect before 2016."
The Snowden disclosures reignited the debate in the EU regarding the US government's power to access EU data. However, instead of the US government requiring US companies to provide access under the Patriot Act, the information leaked by Snowden suggested that the US government may not need service provider cooperation at all.
"As they did during the Patriot Act controversy, members of the European Parliament have publicly objected to the ability of the US government to override EU data protection laws," says Henchey.
The Snowden revelations "strongly suggest" that the U.S. tech giants "won't actually be able to meet the EU standards because they are required to cooperate with US government agencies in the collection of personal data," says Zhu. "The US legal data protections apply to US citizens but not to foreigner's data, and in any case the scale of data collection may be so vast that this distinction is moot much of the time."
Report from CEO Marty Lafferty
Early participation has now been confirmed for CLOUD COMPUTING WEST 2013 (CCW:2013) by industry leading representatives of entertainment, mobile cloud computing, big data, and related interests, including cloud security.
CCW:2013 is the Cloud Computing Association's (CCA) and Distributed Computing Industry Association's (DCIA) business strategy summit taking place October 27th-29th at The Cosmopolitan in Las Vegas, NV.
Leaders from the following organizations, among others, have already made plans to attend:
Amazon Web Services (AWS), AT&T Mobility, Comcast, Dell, IBM, Microsoft, MP3 TechSupport, NBC Universal, Netflix, Rackspace, Sony Pictures Entertainment, Sprint Nextel, Toshiba, Trend Micro, Warner Bros., A10 Networks, ABI Research, Appalachian State University, Aspera, Citrix, DataDirect Networks (DDN), Dell SecureWorks,, eGistics, GenosTV, Intertrust Technologies Corporation, Las Vegas Sands Corporation, The PADEM Group, Rafelson Media, SoftServe, and the author of 21st Century Television: The Players, The Viewers, The Money.
Join them. This year's CCW:2013 themes are "Revolutionizing Entertainment & Media" and "The Impact of Mobile Cloud Computing & Big Data."
There's no question that advances in cloud computing are having enormous effects on the creation, storage, distribution, and consumption of diverse genres of content.
And most profound among these effects are those involving the increased proliferation of portable playback systems and the accompanying generation of unprecedented amounts of viewership, listenership, and usage information from audiences globally.
The ubiquity and widespread acceptance of user interfaces that reflect the dynamic interactivity exemplified by smart-phone applications is rapidly replacing the flat linearity of traditional TV channel line-ups and changing expectations for a new generation of consumers.
Cloud-based information and entertainment-of-all-kinds accessible everywhere always on each connected device will become the new norm.
Perfect data related to consumer behaviors associated with discovering and consuming this content will displace metering and ratings technologies based solely on statistical sampling.
Two CCW:2013 conference tracks will zero in on the latest advances in applying cloud-based solutions to all aspects of high-value entertainment production and storage, as well as media delivery and analysis options; along with the growing impact of mobile cloud computing on this sector, and the related expansion of big data opportunities and challenges.
DCINFO readers are encouraged to get involved in CCA's & DCIA's CCW:2013 as exhibitors, sponsors, and speakers.
The CCA is handling exhibits and sponsorships. Please click here for more information.
The DCIA's role is to provide keynotes, panelists, and case-study presenters to participate in our comprehensive agenda of sessions in ENTERTAINMENT & MEDIA and MOBILE CLOUD & BIG DATA.
Please click here to apply to speak at CCW:2013. Share wisely, and take care.
Fears of NSA Surveillance Hurt US Cloud Computing Industry
Excerpted from Raw Story Report by Charles Arthur
American technology businesses fear they could lose between $21.5 and $35 billion in cloud computing contracts worldwide over the next three years, as part of the fallout from the NSA revelations.
Some US companies said they have already lost business, while UK rivals said that UK and European businesses are increasingly wary of trusting their data to American organizations, which might have to turn it over secretly to the National Security Agency, its government surveillance organization.
One British executive, Simon Wardley at the Leading Edge Forum thinktank, celebrated the publication of the information about the NSA's spying and its Prism data collection program: "Do I like Prism? Yes, and God bless America and the NSA for handing this golden opportunity to us," he wrote on his blog.
"Do I think we should be prepared to go the whole hog, ban US services and create a 100 billion euro investment fund for small tech start-ups in Europe to boost the market? Oh yes, without hesitation."
A survey by the US-based Information Technology & Innovation Foundation (ITIF) found that American companies which offer file storage and computing in cloud systems — so they can be stored and accessed anywhere in the world — are gloomy about the effects of the Guardian's revelations of the extent of US government snooping and data gathering through projects such as Prism and Xkeyscore.
Daniel Castro, author of the ITIF survey, said that it seemed reasonable to suggest that US cloud businesses could lose between 10% and 20% of the overseas market to rivals.
The effect has already been felt, Castro said. The ITIF survey found that of those outside the US, 10% had canceled a project with a US-based cloud computing provider, and 56% would be "less likely" to use a US-based cloud computing service.
Of those surveyed inside the US, 36% said that the NSA leaks had "made it more difficult" for them to do business outside the US.
Scott Fletcher, Chairman of UK-based ANS Group, said, "People in the UK have been reticent for a while about putting data into the US because of the Patriot Act, which means the government there can pretty much get access to everything. Prism has put into peoples' minds that there might be co-operation in the UK with that."
The Guardian revealed the extent to which the UK spy center GCHQ and the NSA swap data earlier in August.
"People talk to us and want their own private cloud service, because they know we don't have that sort of relationship with the government," Fletcher said. "They want all the services to be based in the UK, rather than using Google or Amazon Web Services."
The US government has struggled to respond to the series of revelations in the Guardian about the extent of the NSA's oversight of data, which travels into the US. Prism allows it to target details about individuals residing outside the US; the NSA claims that it has "direct access" to data from Google and Microsoft, among others, who are both also major cloud computing providers. (The two companies have denied that the NSA has direct access but said that they allow "lawful" transmission of data to it.) Xkeyscore allows the NSA to drill down to details about individuals almost anywhere on the Internet.
The potential size of the cloud computing market globally is estimated at $207 billion by 2016, of which more than half will be outside the US.
But not every cloud provider in the UK has benefited. Gary Smith, 33, the founder of London-based Prism Total IT Solutions, said gloomily: "We will never get to number one on a Google search for Prism again. Ten years ago we were. But after this — no."
DEA Program "More Troubling" Than NSA
Excerpted from Slashdot Report Posted by Samzenpus
Rambo Tribble writes, "Reuters is reporting on a secret effort by the Drug Enforcement Agency to collect data from wiretaps, informants, and other sources.
Considered most troubling is a systematic campaign to hide this program from the courts, denying defendants their right to know how evidence against them was obtained. This agenda targets US citizens directly, as it is mainly focused on drug trafficking.
From the article: 'Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges."
"The undated documents show that federal agents are trained to 'recreate' the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial."
"If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.'"
Boosting Productivity & Inspiring Innovation through the Cloud
Excerpted from Phys.Org Report
An EU-funded project that aims to demonstrate the importance of mobile cloud computing to EU business was presented recently at the Future Network and Mobile Summit in Lisbon, Portugal.
Through the launch of a European cloud platform for business apps, the project hopes to put Europe at the cutting edge of this emerging technology.
In particular, MO-BIZZ ("fostering mobile business through enhanced cloud solutions") seeks to encourage SMEs to deliver innovative business solutions that fully exploit this exciting new technology. It is expected that the three-year project, launched in January this year, will provide invaluable assistance to app developers trying to develop and deploy new products.
MO-BIZZ will also help businesses wishing to access mobile network assets, such as user billing, short-messaging service (SMS) and user location. Larger industries eager to adopt mobility as a way to enhance productivity stand to benefit, too.
Mobile cloud computing has huge business potential. The concept combines mobile computing (using mobile devices such as smart phones), cloud computing (where data is saved in the "cloud," such as in an email attachment), and wireless networks. Taken together, these three key computing innovations can enhance the capabilities of mobile devices and provide a much richer user experience.
MO-BIZZ believes that by leveraging the resources of various clouds and network technologies, unrestricted functionality, storage, and mobility can be achieved capable of serving mobile devices anywhere at any time.
Over the next three years, MO-BIZZ will develop several pilot projects to showcase the potential of mobile cloud computing as a productivity booster for EU companies. In addition to launching a cloud platform for business apps, the project will build a strategic global approach to the mobile cloud and develop international cooperation in order to create a vibrant community of developers.
Two key user communities stand to be the main beneficiaries. The first group includes app developers and IT providers who want to be able to easily deploy their business apps and access mobile network assets, with minimal effort. This will add value to the services they provide to their customers.
The second group includes companies from key industries interested in understanding how to make the most of mobile cloud applications as productivity boosters. Furthermore, mobility has been identified as a key means of enhancing competitiveness.
The project is being funded by the Commission under the Competitiveness and Innovation Framework Program (CIP) and brings together ten partners from seven Member States.
Open Collaborative Development is the Future of Cloud
Excerpted from Smarter Planet Report by Tom Rosamilia
Cloud computing offers businesses and individuals another way to do important work — on computers that they don't always own or manage. The cloud transforms computing into a utility, like electricity or water. It's all about speed and convenience.
Many organizations are operating large cloud data centers packed with hundreds of thousands of server computers, and their technologists are looking for ways to differentiate their services from their competitors while reducing complexity. Today, many of them use technologies that originated in the personal computing era to power their data centers. It's a one-size-fits-all approach that's out of sync with the demands of the cloud era. In addition, these organizations still face critical issues like system utilization and management complexity. The ideal approach is a "lights out" model and technologies that support that model.
In an effort to progress cloud computing, IBM is announcing, today, the OpenPOWER Consortium — a new initiative aimed at expanding the technology choices available to modern IT developers. This is a big step for us—and for the tech industry. We hope it will usher in a new wave of innovation that will deliver great benefits to businesses and other users of cloud services.
Under the OpenPOWER initiative, IBM will license the core intellectual property for our POWER technologies to other companies for use in designing servers employed in cloud data centers. Up until now, IBM primarily used the POWER design in its own servers. This new initiative makes it possible for cloud services and their technology providers to redesign the chips and circuit boards where computing is done—optimizing the interactions of microprocessors, memory, networking, data storage and other components. As a result, they can get servers that are custom-tuned for their applications. Think of it as a license to innovate—delivering more choice, control and flexibility to developers of cloud data centers.
The initiative is "open" in three ways. First, we are licensing the microprocessor technology to other companies openly—meaning they get to look at the blueprints for the processor and the software that goes with it so they can take full advantage of its capabilities. The cloud service providers will be able to hire IBM or other companies to manufacture the processors and other related chips.
Second, the OpenPOWER Consortium will harness the open-collaboration business model. Companies that join will share innovations with one another and collaborate on specific technology development projects. The initial members of the consortium are Google, the search giant; Mellanox, a data center, storage and networking company; TYAN, a computer motherboard supplier; and NVIDIA, a maker of graphics accelerator chips for computers and mobile devices. The goal is to create an ecosystem of hardware and software developers to drive innovation in cloud computing.
Lastly, the initiative takes advantage of the open-source Linux operating system, which has become the operating system of choice in cloud data centers.
Why would a cloud service provider want to design its own servers? The answer comes down to differentiation and economics. In this highly competitive technology marketplace, companies want to be able to provide capabilities such as big data analytics and targeted advertising at the highest performance levels and at the most competitive prices. If a company is only using a few thousand servers, it doesn't pay for them to invest in hardware R&D to achieve a competitive advantage. But if they're buying hundreds of thousands or even millions of servers, the balance might tip in favor of hardware innovation.
IBM learned a crucial lesson about the power of collaboration when we threw our weight behind Linux in 1999. We helped legitimize Linux as a reasonable alternate operating system. And it paid off for IBM and the Linux community, alike. With IBM's endorsement, Linux quickly became an additional standard technology for large banks, government agencies and other intensive users of computing. It became another common operating system that runs across multiple hardware platforms. In fact, even the mainframe with its zOS operating system ships almost half of its capacity running Linux. The lesson we learned: It's sometimes better to share with others in the development of foundational technologies—then innovate around them.
I expect the same sort of outcome in cloud computing. If IBM and its consortium partners can create a healthy business ecosystem around a core of shared technologies, the possibilities are endless. IBM is excited to help drive this opportunity. In fact, this announcement shows our commitment to aggressive investment in our POWER processors and servers. Other innovations will come from our partners. The outpouring of creativity will ultimately benefit the thousands of businesses and millions of people who rely on the potential value of cloud computing every day.
OpenStack 101: The Cloud Is Now in Session (Online!)
Excerpted from PistonCloud Report by Rob Williams
Over the last year, Piston has been training users on the setup, administration and management of OpenStack from our home city of San Francisco, CA. This two-day course has been a great way for us to share our expertise and hear about how companies are using OpenStack inside their organizations, but holding it here in San Francisco meant that access was limited to those with the time and budget to travel.
I'm happy to announce that Piston's training program is now available online, and our first course, "OpenStack 101," is scheduled for August 28th. We're accepting registrations now. This three-hour interactive instructor-led course will cover everything from the basics of cloud computing to a comprehensive look at the components of OpenStack. Students will have hands-on access to OpenStack clouds powered by our software, Piston OpenStack.
Topics include:
What is cloud? We get past the buzzwords and look at what defines a true *-as-a-service cloud.
The Components of OpenStack: An Overview.
Nova: Dive into OpenStack Compute and orchestrate all the things!
Cinder: Create, attach, and detach volumes with OpenStack Volumes.
Neutron: The virtual networking that everyone has been talking about.
Glance: Solving image management for OpenStack clouds.
Keystone: Authentication, authorization, and identification for the OpenStack nation.
Swift: Object Storage — at the speed of cloud.
Register now and let your friends know about this opportunity.
Cloud Computing — The Tipping Point for Distribution?
Excerpted from Channel Pro Report by Adam Davison
For decades the IT industry has operated effectively on a well-understood two tier system comprising distributors and resellers, with each having clearly-defined roles and responsibilities. However, cloud-based technology is fundamentally changing the distribution landscape, not just for the distributors and resellers, but for vendors and end-users too.
According to the Cloud Industry Forum, by the end of 2013, more than 75 percent of UK businesses will be using at least one type of cloud service. The Forum has also forecast that, of existing cloud users, 80 percent will increase their spending on cloud computing during the same period. Moreover, research firm Gartner predicts that by the end of 2013 the size of the cloud computing market worldwide will be $150bn. So it's fair to say that it's more than a passing fad. It's here to stay and it's having a fundamental impact on the way organisations select, architect and deploy their IT.
As a distributor of next-generation cloud-based technologies, I must confess to having a vested interest in the positive evolution of an industry model that has remained largely unchanged for years.
From the vendor's perspective, the increasingly widespread acceptance of technology solutions developed for the cloud has opened up the market. Historically the domain of the big IT brands with massive marketing muscle and deep pockets have dominated the market, but this new world of distribution is not concerned with, or constrained by, infrastructure and physical bits of tin. Next-generation, agile, start-up vendors now have a real shot at success. For these cloud-based technologies, the barriers to entry are well and truly shattered.
From the reseller's point of view, cloud-based technology solutions are delivering shorter, less complex sales cycles with solutions that are easy to install and immediately available. The days of on-premise solutions with lengthy and costly implementation periods are over.
From the distributor's point of view, more than ever in the current economy, there is a need to be truly 'value-add'. Resellers need a distributor that can add value to them by assisting in creating new revenue opportunities from both products and services. Distributors need to find these new, innovative and disruptive technologies that their reseller community can take to market quickly and efficiently whilst retaining high margins and differentiating themselves from their competition.
The potential fly in the ointment is that the very issue that makes cloud computing so appealing is also what makes it so disruptive to the traditional delivery of hardware and software technologies, because it changes both the supply and consumption side of the distributor model. After all, if you look at it from the vendor's point of view, cloud-based IT solutions tend to be less complex, relatively easier to sell than on-premise solutions, and don't require massive up-front investment. So why not sell directly to the customer and cut out the distributor and reseller all together?
As the old adage goes, if you do what you always do, you'll get what you always get. Distributors and resellers are waking up to the fact that they need to radically change their approach to avoid their roles becoming redundant.
The cloud aggregation model promoted by some distributors is a good example of how things are changing. Effectively they are offering platforms that allow their resellers to aggregate cloud services from multiple vendors on a single billing platform. The 'solution stack' approach is another great example. Here the distributor 'groups' complementary technologies together which can be sold stand-alone, bundled or sold as a partner branded managed service, enabling resellers to create their own, bespoke solution that meets the needs of their end-users.
However, to my mind there's an even bigger opportunity in the shape of today's next-generation technologies that offer a combination of cloud-based solutions with hardware, virtualised offerings or simply a pure cloud hosted option. This 'hybrid middle ground' is where the next big opportunity lies for distributors and the landscape is changing from box shifter, to one of offering managed services and cloud services.
By tapping into this 'hybrid middle ground' distributors can offer solutions that have a very low operating cost versus traditional on-premise solutions with a high capital expenditure cost. And by adopting a business model that's built around managed and cloud-based services, distributors can create an 'annuities' model, where subscription effectively becomes the new maintenance. Selling batches of products or one-time services is so 'yesterday'. This new model means distributors can sell monthly services either fixed-fee or utility-based. Now that's real value-add.
I'd offer a note of caution here though, because although the annuities model represents a solid business opportunity for some distributors, it won't work for all. These exciting hybrid offerings need a 'new breed' of distributor — one that's nimble and agile, and can adapt to an ever changing market landscape. Having the ability to help these next-generation vendors carve out a market position (and cut through the noise of competitive offerings) is vital. As is the business know-how to commercialise them with wrap-around services delivered via the subscription-based model. And the final piece of the puzzle is the marketing muscle needed to stimulate demand and help build a solid, qualified pipeline. These three factors will determine which distributors will succeed in the hybrid middle ground, and those that will fall by the way side.
Whichever business model is chosen, the underlying offering has to be about real value-add on both sides of the distribution model, whether that's helping a next-generation vendor to break into the UK market, or it's helping a reseller create and deliver a branded managed service to their customers. Take a look at your business model. Are you doing all you can to maximise the cloud opportunity?
Biometrics & Cloud Computing Modernize Industry
Excerpted from Construction Digital Report by Ollie McGovern
With the prolonged economic downturn squeezing margins across the construction industry, firms looking to stay competitive are seeking means to streamline their operations and drive efficiency. This process is stalling however, due to a lack of transparency up and down the management chain.
One area of the business that poses a particular challenge is onsite time and attendance reporting. Conventional systems are only adding to the confusion, and in a climate where clarity and efficiency can make the difference to a construction firm's bottom line, it's high time they were reassessed.
Current methods of tracking time and attendance are outdated and inefficient. The traditional paper-based approach is still used widely, despite the fact that the underlying process is time-consuming and ineffective.
Records can be lost easily and inaccurate data is often submitted — either due to error or deliberately. More up-to-date alternatives, such as keycards, have been introduced, but they share many of these faults.
A majority of these systems only have the capability to capture the data locally on the site, so each project's data is effectively isolated from the other and businesses cannot get a company wide perspective, which is now an essential for future success.
For example, although they can be used to gather quantities of accurate data, it is often stored in a proprietary database and cannot be accessed quickly or easily. The informationis predominantly locally stored on the site and can also be manipulated without too much difficulty, making these systems insecure.
Applying technology as the solution may yet be the correct course of action, however. Advances in the field of biometrics and cloud-based platforms mean that, for the first time, users can gather large amounts of accurate time and attendance data across a multitude of sites and store it securely.
Not only can this make site management easier, but when collected data is mined effectively, it can reveal patterns and anomalies that can impact future business decisions.
Up until recently, biometrics was the preserve of science fiction and, to some extent, the devices and applications of today's technology are indeed straight out of a '60's sci-fi show.
Despite the futuristic feel of the concept, biometric technology is in reality simple to use and cost-effective, and when integrated with a cloud-based software solution it can deliver an excellent ROI.
A fingerprint or alternative biometric hardware can be used to collect the data and send it to a hub via a secure network for storage and analysis. In the context of a building site, the software needed to process and present this data can be integrated with existing hardware and installed at points of site entry and exit, or on handheld wireless devices.
It can also be integrated with an organisation's management business processes and software. For example, when used to track time and attendance, users can build definitive reports detailing all workers' actual hours on a single site or multiple sites. This data can then be integrated with the payroll system to automate the process and improve accuracy.
The data collected via devices equipped with biometrics can be accessed via a web interface at any time, with customised reports showing live, up-to-the-minute data, including hours logged, absences, qualifications and lateness sorted by individual, team, contractor or site. It can also be secured and stored centrally in the cloud.
Not only is the data secure, but it can be accessed by the user and stakeholders via a secure web interface.
Another advantage of cloud storage is that once a worker is registered at one site, their data will be stored centrally. If they then move to another, their data can be accessed quickly and easily by the site manager at the new site.
Crucially, cloud-based software is extremely scalable; it can be used across any construction site regardless of size, scope or duration. For example, it could be used by a contractor for just one construction site or by a subcontractor wishing to track time and attendance across a number of different projects.
As the capital expenditure is minimal it is an extremely attractive proposition to firms of all sizes as they only have to pay for what they need so the Return On Investment (ROI) is immediately recoverable.
The benefits of installing biometrics with time and attendance software can be felt not only in the office, but also onsite. Accurate time and attendance tracking can lead to better communication on the ground. For example, as all workers have to gather round a fixed point at a set time, site managers have a guarantee that they can speak to the whole work force at least twice a day.
In addition, as biometric data is processed and delivered to users in real time, those signing in and out of a site must communicate their desire to leave early or arrive late in advance. It is also possible for managers to have notifications sent to their mobile phones when a worker arrives late or has left the site before the end of the agreed working day.
Improved visibility of attendance also makes it much easier for site managers to prove the worth of the teams they employ. Those working onsite must keep to deadlines and work efficiently if projects are to be a success.
A team of workers who show up on time and work the agreed times can be invaluable to contractors and subcontractors. With biometric data, it is possible to prove beyond doubt that your team is the right one for the job.
The data can also be used to protect workers. If a client disputes the time it took to complete a project, site managers have a large amount of accurate data they can give as evidence of who was on site and for how long.
When one contractor replaced its traditional paper-based timesheets with a software-based system, it found that 26 percent of contracted hours were in fact inaccurate, resulting in unnecessary costs. Independent studies have also found that 74 percent of employers experience payroll losses due to 'buddy punching', or falsely signing in for another person.
This is a system of time theft that cannot be performed through a biometric system. For subcontractors working onsite and managing a large number of contracted workers from various suppliers, this type of system can provide peace of mind. Also, as the data comes from biological characteristics, it cannot be forged, meaning only authorised workers can access a site.
Perhaps the most exciting aspect of the application of biometrics to time and attendance tracking is that the potential of the data goes far beyond the creation of reliable time sheets.
When a large quantity of employee data is mined and analysed, it can reveal the story of your business over time. Trends and anomalies can signpost areas that need attention, or where efficiencies can be realised and ultimately, money can be saved.
Recently, one of our clients was able to use the data collected by biometrics to settle final accounts with their subcontractors. There was a slight dispute with one particular contractor concerning the man-hours they were putting in on site.
Historical data suggested that workers were travelling to and from the site during work hours on a Monday morning and Friday afternoon, as the workers lived a considerable distance from the project. The managing company was grateful for the information, and our client also used the experience to assess its supply chain and took the decision to use more local suppliers for future projects.
Accurate time and attendance data can also be invaluable when it comes to pitching for new business. Proof of an effective reporting system and reliable data on the number of people you employ and the time they spend on site can significantly enhance your bidder profile because you can demonstrate efficient project controls.
For a construction firm to be successful today it needs to do more than undercut its rivals. Firms need to closely manage their projects to ensure employees are delivering on time and to budget. Key to achieving this is clear communication of accurate data. Although time and attendance is only a small piece of the puzzle, it is undoubtedly a critical element and is currently an area where money is being lost due to inefficiency and the use of outmoded technology.
Biometric solutions present construction firms with an unprecedented opportunity to make these issues a thing of a past, while offering business owners a unique insight into the day-to-day running of their firm — and the business intelligence to improve the bottom line.
Verizon Terremark Lands Mobile Marketing
Excerpted from Light Reading Report
To support the rapid growth of Near Field Communications (NFC) media technology, Thinaire has selected Verizon Terremark's Enterprise Cloud, which allows for seamless scaling based upon traffic, need and demand.
Such capabilities are critical for Thinaire when powering mobile marketing campaigns for customers, including News America Marketing whose SmartSource with NFC initiative has the capability to deliver in-store information and offers from thousands of retailers directly from the shelves to the mobile devices of millions of consumers.
"The reliability, performance and security of Verizon Terremark's cloud infrastructure allows us to run mobile brand marketing campaigns with confidence," said Mark Goodstadt, CEO of Thinaire. "Further, Verizon Terremark's global presence translates into NFC-powered shopper marketing programs on an even greater scale than was previously possible."
Verizon Terremark, a pioneer in cloud computing, provides large companies and government agencies with powerful, reliable and secure cloud-based IT infrastructure solutions. Through its network of over 50 strategically-located data centers around the world, including a dedicated cloud infrastructure in San Paulo, Brazil, Verizon Terremark is also well positioned to serve emerging markets such as Latin America.
Taking BitTorrent to Windows RT
Excerpted from TechRepublic Report by Tony McSherry
There are many BitTorrent clients available on Windows and other operating systems, but none were previously available for Windows RT.
The BitTorrent protocol and peer-to-peer (P2P) file sharing are usually reported in the context of downloading of films, TV, and music. However, the protocol itself is used by many IT and entertainment companies for the distribution of large files.
It's used by Twitter and Facebook for server updates, for open source and the legal distribution of files without copyright restrictions, and by game companies distributing games and updates. For example, Blizzard uses an inbuilt BitTorrent client for distributing World of Warcraft, StarCraft, and Diablo games and patches. BitTorrent allows anyone to distribute large files across the Internet without the need for a dedicated file server or large bandwidth. A torrent file is created that acts as a descriptor to the original content to be distributed. Other users with BitTorrent clients usually gain access to the torrent file through the web on torrent tracker sites, and once they download the torrent, their BitTorrent client will begin downloading the various pieces of the file.
At the same time, those downloaded pieces may be uploading to other users requesting the same file. Multiple users create a "swarm" of hosts that download and upload from each other simultaneously.
There are many BitTorrent clients available on Windows and other operating systems, but none were previously available for Windows RT. Torrex Beta, available from the Windows Store, is the first of the clients to make the jump to the new WinRT development environment, and as well as working on standard Windows 8 PCs, it also works on Windows RT.
Like all torrent clients, the interface is rather sparse, aimed at showing you a list of your downloading torrents. Torrex will let you open local torrent files from a URL, or allow you to search for any content. This essentially opens the browser and sends your request plus the word "torrent" to a search engine. Surprisingly, this uses Google; I would have expected Bing.
The common use of torrent clients is to act as an associated application when you click on a torrent file link in your web browser. I went to clear-bits.net, which is a torrent tracker for Open Licensed Digital Media and covers a range of content. I selected Done the Impossible — a documentary on the short-lived Firefly TV show — and clicked the Torrent file link. After confirming that I wanted to open the file, Torrex started automatically and displayed the file details. I selected Start to begin downloading.
Selecting Preferences from the Settings charm will give you access to the usual properties for a Torrent Tracker. One limitation of Torrex is that it won't run in the background, so you'll need to have it full screen or in a split screen with another application. It will automatically be suspended if you move to another app.
It's good to see some "legacy" Windows applications reappearing for Windows RT as developers move to the WinRT API and reproduce them with the new UI. I look forward to seeing some more.
Cloud Computing, the Next Generation: 5 Shifts to Look For
Excerpted from Report by Drew Hendricks
Cloud computing has revolutionized the use of technology — from the individual consumer who stores personal media and files that can be accessed from any device, to the corporation whose storage and application needs went into the cloud.
Today's applications took years to evolve and develop, but you should be aware that the next iteration of the cloud is here. What does this translate to?
Traditionally, companies purchased not only the computers, but also invested in software suites to provide the necessary applications to get work done. By moving to a web-based service that hosts all a company's needed programs, only one application needs to be loaded onto the machine.
Machines hosted (owned) by another company run everything to accomplish the necessary work tasks: word processing, email, even data analysis.
In recent years, the benefit of adopting cloud technology has been to alleviate demands on in-house hardware. Running applications? Done on the hosted service's hardware and infrastructure.
Both the hardware and software demands decrease on the end user's side. If the end user's computer is able to run the interface software (often a web browser), the cloud is able to shoulder the rest of the workload.
With that said, the corporate sector has been rocked by the implications of cloud computing, as well as virtualization and hosting options that affect spending, infrastructure, and a number of other business functions. Watch for these top five changes in the cloud landscape that will shape attitudes, spending, and applications into the future.
1. Disaster recovery
The dependability, cost, and security of disaster recovery are all weighed in a company's planning. In previous years, it has been less expensive to back up with traditional disaster recovery storage compared to the cloud-based alternative. Virtualization is in large part to thank for this.
Leveraging resources in a smarter manner and replicating the VM data to a multi-tenanted cloud platform equals cost savings and faster recovery times. Plus, with pay-per-use cost models available, the large capital investments required to build a secondary backup site for disaster recovery is an unnecessary expenditure that ties up capital.
2. One cloud doesn't fit all
Many adopters of cloud technology took an all-or-nothing approach when they made the decision to integrate it into their business model and operations. Procurement teams' and IT buyers' understanding of the available technology means purchasers have a more sophisticated grasp of their options and where the cloud's strengths and weaknesses lie.
Companies will make investments in hiring in-house developers that can provide even greater guidance on how to to use cloud platforms most effectively, as well as hosting environments and virtual infrastructures.
3. Enterprise apps
The great unknowns of the public cloud have long made infrastructure and operations teams nervous. When presented with the idea of using the public cloud to develop enterprise apps, "no" was a common response. The shift to accepting and giving the blessing to develop these applications on the public cloud gives companies greater oversight and the opportunity to give developers guidance on how to use the public cloud securely.
4. Marriage of cloud and mobile
It used to be that a consumer's device was the be-all and end-all. Computer crash? Didn't back it up on a zip drive? Some serious hard drive recovery magic would be required.
Today, the love affair with devices (smartphones, tablets, PCs, etc.) has to do with personalization and integration with our lives. The documents, pictures, and all other media consumed on these devices are expected to be accessible pretty much anywhere, any time, on any device. Google Drive, iCloud, and Amazon Web all make this a reality.
Another reality is the high demand of mobile clients. It has driven the popular practice of cloud-based back-end services that connect with mobile applications, since it has the flexibility to respond to such demand. Another advantage? The security risks and usage load are taken off a business's data centers, because mobile traffic is routed to the cloud.
According to Forrester analyst Glenn O'Donnell, "cloud plus mobile is a classic more-than-the-sum-of-its-parts combination." Where this may not be true is in the health care industry, where security and privacy are very high priorities. "We've found that mobile devices and cloud computing are the two greatest sources of health care CIOs' fear," the Ponemon Institute reports.
"It's an environment that's ripe with potential problems and vulnerabilities. But at the same time, a lot of these devices aren't necessarily designed to be secure. The purpose of the paper was to explain that compliance requirements really don't address mobile devices."
5. Shifting understanding
Misconceptions about "the cloud" are common. Defining it and all its forms is truly a challenge. But the misunderstandings and misconceptions will have to be addressed moving forward.
Infrastructure and operations teams will learn that a virtual environment is not the equivalent of a private cloud. Very few virtualized environments offer what is expected of a private cloud: fully-automated provisioning, cost transparency, standardized services, or self-service to developers.
A truer picture of most virtual environments is that workload consolidation is done there, recovery times are faster, and companies realize operational efficiencies. The infrastructure and operations arm of companies will shift their understanding of definition and functionality, and recognize where each has a place in the organization.
The other side of the coin falls on developers. Gone are the excuses that development isn't different in the cloud. The majority of frameworks, development methodologies, and languages used in traditional enterprise development are also applied when developing in the cloud.
Looking forward
The intricacies and nuances of web hosting, virtualization, and the decision to work within a public or private cloud will continue to evolve moving forward. As new pricing models emerge and technologies develop to boost the efficiencies of one platform over another, companies will shift to make the most of existing hardware, infrastructure, and policies while also minding the bottom line.
Employees and individual decision makers will also offer substantive input on future developments. This has been seen on many occasions, most markedly in the health care industry. There may be no clear path ahead, but with an ear to the ground, we can make an educated guess at what will come next.
Coming Events of Interest
First China International Cloud Computing Expo - August 15th-18th in Hohhot, Inner Mongolia. The business forum during the expo will focus on exploring trends for the development of the cloud computing industry, especially its application in the post-disaster reconstruction and protecting data.
NordiCloud 2013 - September 1st-3rd in Oslo, Norway. The Nordic Symposium on Cloud Computing & Internet Technologies (NordiCloud) aims at providing an industrial and scientific forum for enhancing collaboration between industry and academic communities from Nordic and Baltic countries in the area of Cloud Computing and Internet Technologies.
P2P 2013: IEEE International Conference on Peer-to-Peer Computing - September 9th-11th in Trento, Italy. The IEEE P2P Conference is a forum to present and discuss all aspects of mostly decentralized, large-scale distributed systems and applications. This forum furthers the state-of-the-art in the design and analysis of large-scale distributed applications and systems.
CLOUD COMPUTING WEST 2013 - October 27th-29th in Las Vegas, NV. Two major conference tracks will zero in on the latest advances in applying cloud-based solutions to all aspects of high-value entertainment content production, storage, and delivery; and the impact of mobile cloud computing and Big Data analytics in this space.
International CES - January 7th-10th in Las Vegas, NV. The International CES is the global stage for innovation reaching across global markets, connecting the industry and enabling CE innovations to grow and thrive. The International CES is owned and produced by the Consumer Electronics Association (CEA), the preeminent trade association promoting growth in the $209 billion US consumer electronics industry.
CONNECTING TO THE CLOUD - January 8th in Las Vegas, NV. This DCIA Conference within CES will highlight the very latest advancements in cloud-based solutions that are now revolutionizing the consumer electronics (CE) sector. Special attention will be given to the impact on consumers, telecom industries, the media, and CE manufacturers of accessing and interacting with cloud-based services using connected devices.
CCISA 2013 – February 12th–14th in Turin, Italy. The second international special session on Cloud computing and Infrastructure as a Service (IaaS) and its Applications within the 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing.
|