McAfee will discuss how traditional security models need to change in order to secure data center and private cloud environments at the VMworld 2011 Conference.
Businesses have evolved from needing to secure “things” like endpoints, networks, services, and devices, to securing the cloud, where boundaries are no longer physical, they are contextual. The power of virtualization is dynamic, providing opportunities to manage beyond traditional boundaries. Data and information are connected everywhere; security needs to achieve the same ubiquity.
Berkery Noyes, the independent investment bank specializing in the information content and technology industries, today released its Half Year Mergers and Acquisitions Trends Report for the Online & Mobile Industry.
The report analyzes merger and acquisition activity in the segment across 1st Half 2011 and compares it with activity for the four previous sixth-month periods from 2009-2010.
According to Berkery Noyes research, the Online & Mobile Industry’s robust growth over the past two and a half years continued across the last six months. Total volume in 1st Half 2011 increased by 23 percent over the previous six-month period, from 643 transactions to
Survey of ‘Trends in Technology’ Finds the Information Explosion Challenging Government Agencies to Adapt or Be OverwhelmedJuly 1, 2011 | Vahid Razavi 2
Research surveyed latest technology developments and public sector CFO responses
A recently released survey, Trends in Technology 2011: The Information Explosion, conducted by the Association of Government Accountants, concluded that governments must reexamine business processes to take best advantage of the deluge of data available while managing new threats. Failure to do so means governments can become overwhelmed and lose opportunities of great significance.
Both software tools and human judgment are needed to make effective and efficient use of the data, made possible by an ecosystem of technologies built around the Internet, communication systems and storage capacities. Technologies mentioned in the study hold the promise of great progress—the ability to create a smarter planet, use resources more efficiently, avert disasters and confront some of our greatest challenges. On the other hand, they create new vulnerabilities to our age-old weaknesses for destruction, fraud and abuse.
Nimble organizations in the private sector will use these technologies to gain competitive advantage and provide better value to shareholders. For them, it is one of the imperatives of survival. It is even more so for government agencies. Governments at all levels are the generators and users of huge amounts of data, they are the fiduciary agents for trillions of dollars of spending, and they are the proposers and enforcers of regulations. In each of those functions, the discerning use of technology can make for huge social gains at every level. The challenge of managing change within government organizations to embrace such technologies will be a key factor for success.
While the study covers much ground on emerging trends in hardware and software development, greening of computers, cloud computing, smarter planet, social networking, mobile apps and new vulnerabilities, it hones in on the Information Explosion as the central theme of latter day technology development. As the world becomes more interconnected, instrumented and intelligent, the digital universe of information is exploding:
- In 2010, the digital universe set a record. It grew by 62 percent to nearly 800,000 petabytes. A petabyte is a million gigabytes.
- In 2011, the digital universe is expected to grow almost as fast to 1.2 million petabytes, or 1.2 zettabytes.
- This rapid pace of growth means that by 2020, our digital universe will be 44 times