Beth Cohen is a cloud strategist for Verizon, helping to develop cutting-edge products for the next generation. Previously, Beth was president of Luth Computer Specialists, an independent consultancy specializing in cloud-focused solutions to help enterprises leverage the efficiencies of cloud architectures and technologies, a senior cloud architect with Cloud Technology Partners, and the director of engineering IT for BBN Corporation, where she was involved with the initial development of the Internet and worked on some of the hottest networking and web technology protocols in their infancy.
Over the past few weeks there have been a spat of announcements related to a new cycle of cloud technology consolidations and mergers. Is this a sign that cloud computing is entering the next great technology revolution cycle, or is it the beginning of the end of cloud innovation?
As OpenStack enters its fifth year, the OpenStack Foundation and its many contributors, big and small, are finally addressing growing concerns regarding sprawling code and inconsistent compatibility among the platform’s components. The DefCore Committee is coming to the rescue.
As the cloud industry matures, it is finally poised for the next generation of cloud architectures based on innovative orchestration tools and service overlays designed to provide organizations more flexibility and more choices than ever before for building cloud applications and infrastructures.
According to the US Department of Justice, approximately 16.6 million people, or 7 percent of all US residents age sixteen or older, were victims of at least one incident of identity theft in 2012. Beth Cohen looks at EMV cards—the next generation of credit card security.
Organizations wanting to deploy OpenStack-based clouds have struggled with the lack of best practices for the many different use cases. To address the well-known gap in architecture design best practices documentation, the OpenStack Architecture Design Guide is now available for download.
Many people have come to the realization that the Internet is so riddled with security holes that they have decided to take a different approach to securing their data. Welcome to darknets—stealth networks for those folks who really do not want to be found.
People seem to have forgotten that we are still heavily dependent on an older, more fragile underlying infrastructure of water, gas, and electric utilities. Can emerging information technologies such as big data, the Internet of Things, and Machine to Machine be applied to modernize utilities?