Tag Archive for Cloud

BYOD Obsoletes PBX

BYOD Obsoletes PBXFierceMobileIT noted a new study from RingCentral, a provider of cloud business communications systems, which claims BYOD is now threatening the traditional business phone systems. The survey of 309 professionals within organizations who make purchasing decisions on phone systems found that personal mobile devices are so prevalent in the workplace that they are rendering traditional business phone systems obsolete.

cloud business communications systemsAccording to FierceMobileIT, the survey’s key findings:

  • Half of the respondents use mobile phones even while sitting at their desk, with a traditional desk phone in front of them
  • 88 percent of employees use their mobile phones for work purposes while on personal time, including evenings, breaks, weekends, and vacations
  • 70 percent of respondents believe office phones will eventually be replaced by mobile phones – Millennial workers are especially likely to believe this is true

RingCentral President David Berman told the author he believes that the new wave of employee-owned mobile devices is better than a premise-based phone system.

Mobile devices are turning into true business tools and are transforming the workplace as a whole, from shifting traditional business hours to changing how employees interact via voice, video, text and other business applications. We believe that all these changes are making legacy on-premise phone systems obsolete as they do not meet modern business needs

Praful Shah, RingCentral’s VP of strategy, told FierceMobileIT that his firm has seen a “tremendous behavior change going on with BYOD.” Asked what stood out in the research to him, he says it was the degree to which employees are using their personal devices to do work. He assumed the practice to be popular, but not to the degree the survey revealed. VP Shah noted;

Eighty-eight percent of employees are using mobile phones in their personal time for work. That is a phenomenally high percentage

The result is a shift in what physical telephones organizations will need to purchase. But it will also impact the need to provide applications that enable the employee to use multiple email and telephone accounts on the device, to keep private life and professional life separate when necessary.

rb-

This study is from a firm that sells a competitive product to on-premise PBX, so they are spreading FUD for their benefit. Firms considering cloud-based services should do due diligence and question how these cloud-based service providers are going to protect their data from government spying or it disappearing with little or no notice.

Additionally firm needs to protect its own data. They need a way to protect their data on an employee’s phone. That could include the ability to completely wipe the firms and the user’s data from the phone.  I wrote about how BYOD can land an employee in jail here.

 

Workforce Mobility infographic RingCentral

 

Related articles
  • The Top 5 Business PBX Providers for Q4 2013, as Ranked by Voip-Info.org (virtual-strategy.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Your Data Safe From Gen Y?

Is Your Data Safe From Gen Y?Fortinet (FTNT) released a new study that says that most Gen Y staff members are thwarting their employers’ Bring Your Own Device programs. Fortinet surveyed 3,200 employees between the ages of 21 and 32 on their attitudes and practices around BYOD and found that 51 percent of respondents said they would ignore formal BYOD policies at their organization.  “It’s worrying to see policy contravention so high …” Fortinet VP of Marketing John Maddison said in the study report.

Gen Y staff

Gen YThe same Fortinet survey revealed that 55 percent said they have been the victims of cyberattacks on their desktops or laptops. The respondents noted that those attacks had affected their productivity and potentially cost them corporate or personal data.

FierceCIO provides another example of staff’s cavalier attitude towards data security from Symantec. According to the Mountain View, CA-based Symantec (SYMC) when it comes to corporate data, employees who feel like they live in a “finder’s keepers” environment, Robert Hamilton, Symantec director of information risk management said. The firm surveyed workers in the U.S. about taking corporate data outside of the workplace if they would use company information in another job and their views on whether that constituted stealing. FierceCIO reports the results of the survey, were not encouraging to IT security professionals and IT management.

Finder’s keepers

  • Data theft40% of employees download work files to personal devices,
  • 40% of employees plan to use old company information in a new job role,
  • 56% of employees do not believe it is a crime to use a competitor’s trade secrets,
  • 68% of employees say their company doesn’t take proper steps to protect sensitive information.

Mr. Hamilton summarized, “The attitude is that ownership lies with the person that created it, not with the company that employs them.” He says companies need to do a better job of safeguarding data from employees, especially with the growing popularity of BYOD. Symantec noted,

Only 38 percent of employees say their managers view data protection as a business priority, and 51 percent think it is acceptable to take corporate data because their company does not strictly enforce policies

File sharingA survey by mobile file-sharing app provider Workshare provides more evidence of how employees flaunt IT policies by using free file-sharing services to store and share corporate documents from their mobile devices. FierceMobileIT reports that the firm’s survey revealed that 81% of employees access work documents from their mobile devices. A disturbing 72% of workers are using free file-sharing services without authorization from their IT departments.

Fiberlink recently conducted a survey of its customers about what apps they are blacklisting and whitelisting. DropBox appeared at the top of the blacklisted apps lists for both Android and iOS devices. Commenting on the results, Fiberlink CEO Christopher Clark told FierceMobileIT: “I think there are other ways besides DropBox or Box to do apps and content management.”

personal USB devicesWork documents on personal devices

Another survey, conducted by Ipsos MORI for Huddle found that 91% of U.S. office workers store work documents on personal devices, such as USB drives, and 38% store documents on consumer file-sharing services.

FierceMobileIT reports that Dropbox is the most used consumer file-sharing service for work document storage and sharing.

Patrice Perche, Fortinet’s senior Fred Donovan VP for international sales and support, said in the report:

This year’s research reveals the issues faced by organizations when attempting to enforce policies around BYOD, cloud application usage, and soon the adoption of new connected technologies. The study highlights the greater challenge IT managers face when it comes to knowing where corporate data resides and how it is being accessed.

FierceMobileIT’s Fred Donovan warns that enterprises need to educate their employees to combat the security risks of using consumer file-sharing services. He also says that employers need to offer enterprise-sanctioned file-sharing alternatives. Otherwise, employees will continue to bypass IT policies and put corporate data at risk. Symantec’s Hamilton told FierceCIO that firms need to undergo a cultural shift if they are going to win the battle of protecting their assets from their own staff.

rb-
Sharon Nelson at Ride the Lighting sums up my thoughts on the BYOD thing.

I have never understood the arrogance of this attitude or the failure to appreciate that employers have a duty to impose rules to protect client/customer/proprietary data./proprietary data.

It is common for each succeeding generation to despair of the generation that follows it, but I confess to a certain amount of despair for a generation that is so tied to their mobile devices that they cannot balance their desire to use their devices with the duty owed to the employer to keep work data secure. In a world where young folks cannot seem to keep from checking their phones at weddings and funerals, I guess it is no wonder that they see nothing wrong with willfully disobeying rules imposed at work.

What do you think? Is your data safe from Gen Y staff?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

6LoWPAN ?

6LoWPAN ?BYOD, BYON, IoT, IPv6, SaaS, SDN, MDM, M2M, TCP/IP, IEEE, EIEIO, IMHO, tech is drowning in drowning in acronyms. And now Stacey Higginbotham at GigaOM explains 6LoWPAN.  6LoWPAN stands for IPv6 over Low-Power Wireless Personal Area Networks. 6LoWPAN is the lightweight version of traditional internet protocol (IP) designed for the internet of things.

Misco reports that Internet-connected devices will number 9.6 billion by the end of 2013 and the figure will jump to 28 billion by 2020. Currently, the 9.6 billion Internet-connected devices connect to another device, a phone, or a corporate gateway. In order for a true internet of things to emerge, these devices should have the ability to connect directly to a web service.

Device to cloud

IPv6Instead of device-to-device, it’s device to cloud. The article surmises that since most of today’s devices use IP to connect to the web, engineers would like to use IP to connect devices to the web as well. The only problem is that IP is a heavy, energy-intensive beast. This is one that reason, the Internet’s standard’s setting organization, the IETF, proposed 6LoWPAN in 2004.

The numeral 6 in the standard, is short for IPv6. Ms.Higginbotham explains that if you’re envisioning tens of billions of connected sensors then IPv6 is the way to go. However, supporting the 128-bit numbering system required by IPv6 also takes computing and memory overhead that tiny sensors don’t have. It also requires longer packet headers and such that can clog low bit-rate networks. Since the 6 is IPv6 and the Lo references the low-power aspect of the protocol.

Internet of ThingaThe WPAN or Wireless Personal Area Network is a nod to the wireless mesh network that the protocol supports. Because this isn’t directly analogous to the traditional network stacks, it’s hard to limit the technology to a particular layer in the network.

Sensors in a connected network can run the gamut from a video camera that’s plugged into a wall to a battery-powered water sensor hiding under the washing machine. GigaOM says the standard is flexible enough that some nodes might be able to do more than just send information. Others can be designed to sleep until an event wakes them for a data transmission. In short, it’s complicated, which makes defining a network stack or standards for the internet of things tough.

6LoWPAN will use multiple radio protocols

WirelessThe WPAN in 6LoWPAN will use multiple radio protocols. It can work over several radio networks that use the IEEE 802.15.4 standard, the most popular being ZigBee. The IETF is also working with the Bluetooth Special Interest Group to build 6LoWPAN support for the Bluetooth protocol.

GigaOM notes that the Bluetooth SIG already has taken steps to cut power consumption to meet the demands of the internet of things, so it clearly is also aware of the need for the IPv6 addressing scheme if every bra, door lock, or porta-potty is going to hop on the InterTubes without a phone or computer.

ZigBeeCharles McLellan at ZDNet explains that IBM (IBM) has teamed up with wireless sensor network specialist Libelium to deliver a wireless sensor platform starter kit comprising IBM’s Mote Runner SDK and Libelium’s Waspmote sensor platform, Waspmote Mote Runner development platform allows researchers to explore the benefits of 6LoWPAN.

Tech titans betting on 6LoWPAN

Ms. Higginbotham says that IBM getting behind the standard with this announcement is just one more big-name betting on 6LoWPAN as the communications protocol for the internet of things. She says a few months ago ARM purchased Sensinode, a company that has literally written the book (MP4) about 6LoWPAN. Cisco (CSCO) has an investment in 6LoWPAN with its 2010 purchase of Arch Rock, for its smart grid initiative.

Platforms such as Electric Imp, Ayla Networks, and ThingSquare, all of which offer modules and services to connect devices directly to the internet, are also gaining ground with test programs and early adopters, helping make the case for 6LoWPAN. So as devices start going directly to the cloud and bypassing phones and computers, having a protocol that supports modern addressing at relatively low power and low overhead will become more important. And that’s what this terribly awkward acronym provides.

 rb-

6LoWPAN is what will drive the rapid growth of the IoT. The Business Insider says that IoT grows from 1.9 billion devices today, to 9 billion by 2018. To put that in perspective, BI claims that by 2018 IoT will be roughly equal to the number of smartphones, smart TVs, tablets, wearable computers, and PCs combined.

You can insert your own joke about the feds collecting data from a porta-potty.

What do you think? Is 6LoWPAN the best way to connect IoT devices to the cloud?

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Activity Tracker For Dogs

Activity Tracker For DogsFitbark is one of a small number of startups working to support and even improve the health of dogs. Business Insider reports that Fitbark just raised $80,000 on Kickstarter from 697 backers — more than double the amount it was seeking to support its product and mission of fun and responsible dog parenting.

Fitbark logoWe looked around and realized there’s a black hole in the way we track the health and activity of our dogs throughout time,” Fitbark co-founder Davide Rossi tells Business Insider. “If you cannot measure it, you can’t improve it.”

Daily goals dogs

New York-based FitBark recommends daily goals for your dog based on breed, weight, size, and age. From there, a dog owner can tweak those recommendations. The article says FitBark aims to provide rich information with actionable insights for dog owners. That way, owners can quickly gauge what kind of day their dog is having, even if they’re away from him or her. They can also use that data to share with the veterinarian at their dog’s next check-up.

Kickstarter logoFitBark’s “Bark charts” let owners know if their dog is moving less than normal, which could mean the dog is sick. Owners can also gain better insight into how their dog acts around different people. The author says the data can be used to suggest that their dog is more active with one pet sitter than the other. Or maybe one boarding home makes their dog exercise more than the other.

BI reports that if FitBark notices that a dog is nowhere close to hitting his or her daily goal, the owner may get a notification suggesting to take their dog on a walk. But if the dog is with a pet sitter, the owner could call and check-in.

How it works

collects data on the dog's activity levels 24/7The FitBark device attaches to a collar and collects data on the dog’s activity levels 24/7 and sends the information it collects to FitBark servers when the wearable device is within range of an authorized smartphone or a FitBark base station. Once this occurs, the dog’s data is analyzed and sent back to the owner’s phone. Owners can then compare his or her dog’s actual activities levels to the dog’s daily fitness goals.

Down the road, Fitbark envisions trainers or even veterinarians tapping into its API to help carry out a custom exercise plan. “Trainers will complain that they prescribe or recommend a program for dogs and owners, but there’s no way to monitor compliance,” Rossi says.

lifestyle recommendations for your dogAnother application could be for lifestyle recommendations. So a developer could make an app to suggest certain types of pet foods, sync that up with Fitbark, and see if there are any noticeable changes in activity.

GigaOm points out that Fitbark pulled an earlier attempt at crowdfunding the device to rethink the business model, scrapping the monthly subscription fee and opting for a fixed price tag of $69 via Kickstarter or $99 for general retail.

Wearable tech market

Broadcom (AVGO) CEO Scott McGregor has announced its entry into the wearable tech market with the company’s low-cost, low-power Wireless Internet Connectivity for Embedded Devices (WICED) hardware platform for connected mobile devices. PCMag reports that Broadcom sees a lot of potential for simple, inexpensive, purpose-built products that use one or more connectivity technologies like FitBark.

rb-

Ithe NSA can spy on U.S. dogs covered a similar product called Tagg back in 2012 here. A lot of things have changed since then. Machine to Machine communications and the Internet of Things is all the rage. The Cloud is a viable business model. Big-data analytics is allowing the NSA to spy on the world. And now all of that has come together, M2M dog tags run thru big-data analytics stored in the public cloud so the NSA can spy on U.S. dogs. What a country!

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Cloud Exit Plan

Cloud Exit PlanAnother cloud services provider seems to have closed up shop. NetworkWorld reports that MegaCloud.com, a consumer cloud storage provider has been inaccessible. Users started complaining on social media that they have not had access to their data since at least October 30th. (rb- there is likely lots of enterprise data as well. FierceMobileIT reports that 72 percent of workers are using free file-sharing services without authorization.)

Cloud computingMegaCloud had offered customers up to 8GB of free cloud storage, with another 8GB of free backup storage. That 16GB of free cloud storage was one of the largest giveaways of cloud storage from a consumer cloud provider. MegaCloud offered a desktop client, as well as mobile apps for Apple (AAPL) iOS, Google (GOOG) Android, and Microsoft (MSFT) Windows phones.

At the end of September, San José, CA-based Nirvanix cloud provider gave their mostly business customers 2-weeks notice to get their files back before they went dark, taking all the data with them. There are reports that Nirvanix hosted around 40 petabytes of data. Getting their data out in time must have challenged Nirvanix customers.

Moving data from cloud to cloudCharles Babcock at InformationWeek explained in an intriguing article that data movements in the cloud are dependent on the speed with which the service provider can write data to an external source and the amount of bandwidth made available to do so. He cited tests by Nirvanix competitor, Nasuni, which found that moving 12 TB of data from one Amazon (AMZN) S3 bucket to another took four hours. Moving the same amount from Amazon S3 to Microsoft Azure took 40 hours, and from S3 to Rackspace (RAX), just under one week. Moving data from Rackspace into Amazon took only five hours.

In a Data Center Knowledge article, Gartner (IT) analyst Kyle Hilgendorf reinforces my point that cloud meltdowns should prompt cloud users to get serious about contingency planning. Gartner’s Hilgendorf wrote in a blog post:

Exit plan“Cloud exits are not nearly as sexy as cloud deployments – they are an afterthought …  It’s analogous to disaster recovery and other mundane IT risk mitigation responsibilities. These functions rarely receive the attention they deserve in IT, except for immediately following major events like Hurricane Sandy or 9/11.”

“If you are a customer of any other cloud service (that is basically all of us) – take some time and build a cloud exit strategy/plan for every service you depend upon,” he added. “Cloud providers will continue to go out of business. It may not be a frequent occurrence, but it will happen. ”

Nicos Vekiarides, co-founder and CEO of Natick, MA-based cloud storage provider TwinStrata told NetWorkWorld that in the long-term, the economic draw of the cloud should overcome the fear and hesitancy of many businesses considering cloud storage solutions He predicts that the shut-downs will drive businesses toward larger, better-known cloud storage brands instead of to smaller, newer providers. He says:

Afraid of cloudsThe storage needs of businesses haven’t gone away. Organizations’ data storage requirements still are growing at 40 percent to 60 percent a year … What will change is how CIOs shop for and deploy cloud services, in that everyone still wants choice, but they’ll be much more wary. There’s always the need for choice among a number of vendors, and CIOs will want the best of breed. That might mean they will gravitate toward more established vendors.”

rb-

These events may put a few firms off the cloud, but not all. These events should point out the need for due diligence when planning what to do with their data.

Barb Darrow at GigaOM said it most Data centerpoetically, “cloud storage offerings have multiplied like rabbits over the past year, and the notion that you could entrust business data to a company that appears to be well-funded only to see it shutting its doors could be more paranoia-inducing than the NSA spooks.”

IMHO, continuity plans need to account for data in the cloud. Cloud providers can offer better availability and redundancy, but still pose risks. But do they guarantee your data?  Continuity plans need to protect complete business services, including parts that may rely on a cloud piece.  Some of the questions I would ask:

  • Does it make sense to have all data in the cloud?
  • Is the firm’s data categorized so that when another cloud provider folds, IT can spend any time they have moving data to another provider? Mr. Babcock demonstrated that move would not be instantaneous.
  • Can the data even be brought back in-house? Did you throw out your old SAN when the data was moved to the cloud?
  • What format is the data in? You did check your contract right?
  • Will a firm going under even worry about contractual obligations?
  • Can IT and legal get together to make a deal with another cloud provider fast enough?

Does your Business Continuity Plan cover cloud melt-downs?

View Results

Loading ... Loading ...
Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.