Leading U.S. Health Care Cloud Provider Releases Exclusive Health Care IT Study

Leading U.S. Health Care Cloud Provider Releases Exclusive Health Care IT Study

Peak 10 has released its 2nd National IT Trends in Health Care study that revealed health care CIOs are under pressure to keep up with rapid advancements in interoperability, big data, and security challenges. Peak 10, which published its inaugural National IT Trends in Health care study last year, surveyed another 157 C-level executives and information technology professionals across the U.S. again this year. The study delivers unique insights based on data that illustrate industry challenges and provides a window into the future of the health care industry. Among these, the study shows that hospital groups are moving to outsource IT functions; adopt SaaS and cloud-based solutions; implement telemedicine portals; and rely on analytics and big data to accommodate the rapidly growing analyst-based workforce.

“Technology is changing at a rapid rate and while it is making patient’s lives easier, it is also increasing the amount of information that is at risk of falling into the wrong hands,” says David Kidd, VP of governance, risk and compliance at Peak 10. “Although health care organizations have been cautious about moving to the cloud, they are now recognizing the benefits and security in the cloud. This allows for more time to be spent on patients and the organization’s core mission.”

Additional findings from the study include:

  • Now more than ever hospitals are seeing the benefits and efficiencies of moving towards outsourcing and trusting the cloud, cited by up to 50% increase in cloud services (IaaS)
  • Data privacy and security are still primary concerns due to recent ransomware attacks on hospitals according to 59% of respondents
  • IT budgets are expected to increase in the next 12 months according to 67% of health care IT leaders
  • Some of the top initiatives that CIOs and IT leaders at health care organizations are concerned with, include hardware and software upgrades, EHR systems, analytics and big data initiatives, patient portals and leveraging IT to manage their population health initiatives
  • The main challenges they face are system interoperability issues, meeting security and compliance, and balancing their human capital resources to meet regulatory and business requirements

As the role of information technology in health care rapidly evolves, sound technology infrastructures allow organizations to become more efficient but also recognize the barriers they face in protecting patient data and meeting government regulations. In addition to other health care IT content and resources from Peak 10, the complete, complimentary research findings from The Peak 10 2nd National IT Trends in Health care study can be downloaded exclusively here.

“It’s important to Peak 10 to stay ahead of the trends in the Health care IT industry and be able to support where needed,” says Christina Kyriazi, product marketing and analytics manager at Peak 10. “By researching and completing studies, such as the National IT Trends in Health care study, we are gaining insights to provide the best service for our customers and their staff.”

Source: CloudStrategyMag

TIBCO Launches Cloud Services Solution

TIBCO Launches Cloud Services Solution

TIBCO Software Inc. has announced the launch of TIBCO® Cloud Services, a comprehensive toolset for enterprises leveraging the cloud in pursuit of digital transformation. With the massive growth in big data, cloud, the Internet of Things, and mobile technologies, enterprises today must be equipped to quickly discover and leverage emerging business opportunities in a hyper-connected world. TIBCO provides the connective tissue for this type of digital business transformation through cloud services that enable DevOps-ready, container-based architectures and scalable, persuasive integration. TIBCO Cloud Services are customizable by design, allowing organizations to create bespoke usage solutions depending on the workflow and needs of a particular operations model or division. Developers can create, publish, and consume APIs and use packaged connectors or create their own integrations. Line-of-business users can connect SaaS applications to run only the business processes necessary for the operation of their domain. Industrious digital citizens are enabled to connect existing SaaS services and new sources of data together to streamline their work. To facilitate these capabilities, the core of TIBCO Cloud Services proffers three key solutions: TIBCO® Cloud Integration, TIBCO BusinessWorks™ Container Edition, and TIBCO Simplr™.

“The cloud is now the key resource for providing enterprises with the ability to extend access to and understand data, and to draw meaningful insights from that information to grow their businesses,” said Matt Quinn, executive vice president of products & technology and chief technology officer, TIBCO. “TIBCO Cloud Services make up a comprehensive platform to enable organizations to achieve their digital transformation, letting users connect everything and augment their intelligence with data.”

Source: CloudStrategyMag

The Sixth Flag Named A 2016 Gartner Cool Vendor In Endpoint Computing

The Sixth Flag Named A 2016 Gartner Cool Vendor In Endpoint Computing

The Sixth Flag, Inc. has announced that the company has been included in the “Cool Vendors in Endpoint Computing, 2016” report by Gartner for its Desktop-as-a-Service solution. This report examines innovators in endpoint computing. Companies recognized in the report were selected because their technologies or solutions are innovative, impactful and intriguing.

Each year, Gartner identifies new “Cool Vendors” in key technology areas. Cool Vendors are reviewed in a series of research reports evaluating their products and services. The Sixth Flag was specifically recognized for its Desktop-as-a-Service as a true cloud- based solution. The Gartner report states “products that require no special software on the endpoint and are OS-neutral are especially better in that they can enable CYOD and BYOD — and effectively allow users to pick the device of their choice.” By using standard web browsers, The Sixth Flag (TSF) actively supports growing organizational mandates for BYOD. Furthermore, TSF’s patent-pending watermarking technology known as dewdrop.tsf offers strong protection for organizations concerned about the loss of intellectual property.

“We are honored to be selected by Gartner as a 2016 Cool Vendor for Endpoint Computing. We believe it validates our vision of delivering a true cloud orchestrated and delivered Desktop-as-a-Service,” said Pete Kofod, founder and CEO of The Sixth Flag. “We will continue to raise the bar by adding groundbreaking capabilities to our offering, extending a solution that is simple, secure, easy to manage and that won’t break the bank.”

The ability to securely deliver Windows™-based applications to a distributed and dynamic work force continues to challenge technology leaders. According to Gartner, technology leaders should “plan to provide Win32 applications virtually or remotely in a container to users, or as part of DaaS to enable more agile management and diversity for user endpoint devices.” Pete Kofod agrees with this assertion and states, “the ability to confidently and securely deliver legacy applications to remote users is a recurring problem facing our customers.”

Gartner points out, “Desktop-as-a-Service (DaaS) is maturing; I&O leaders can now run DaaS in HTML5 browsers without additional software and there are now options to purchase short-term DaaS services leveraging pay per use and accelerated speed of deployment for temporary or seasonal needs.” From its inception, The Sixth Flag has recognized this need. Darren Witmer, Vice President of Business Strategy, concurs. “We are seeing requests for short term and dynamic pricing in DaaS solicitations, particularly from mid-market and enterprise customers. We believe that The Sixth Flag is uniquely well suited to meet such demands.”

Since its debut, The Sixth Flag has been transforming DaaS with its award-winning solution. Easy to integrate and deploy, the company’s clients have reported great results in delivering legacy applications to remote users where uncompromised performance, global availability and ground-breaking security is paramount.

Reference: Gartner Cool Vendor Endpoint Computing, May 11, 2016

Source: CloudStrategyMag

FBI Subpoenas Tor Developer to Testify in Criminal Hacking Investigation

FBI Subpoenas Tor Developer to Testify in Criminal Hacking Investigation

Tor developer Isis Agora Lovecruft has traveled from the US to Germany to avoid an FBI subpoena, fearing the agency will attempt to coerce her into helping them crack the anonymity network.

The FBI reportedly seeks the testimony of Lovecruft (which is an alias) in a criminal hacking investigation, but details are scant beyond those provided by Lovecruft in a blog post, and the Electronic Frontier Foundation has taken her case.

“The FBI needs to open up and tell Isis what it is they want before she can decide if she will meet with them,” EFF Senior Staff Attorney Nate Cardozo told Sputnik. “They’ve said she isn’t under investigation, but there are still too many unanswered questions. Isis has a right to know what’s going on instead of playing this strange guessing game as she’s pursued by federal agents.”

The “strange guessing game” began last Thanksgiving, according to Lovecruft’s blog, when an FBI agent left a business card with an additional phone number and a note to call him written on it at the home of Lovecruft’s parents in California. Her family contacted technology and surveillance law attorney Ben Rosenfeld, who called the FBI agent. The agent reportedly expressed skepticism that Rosenfeld was Lovecruft’s legal representative, and said “but… if we happen to run into her on the street, we’re gonna be asking her some questions without you present.”

Soon after, Lovecruft left the US, planning to complete a previously planned migration to Germany.

“I was worried they’d ask me to do something that hurts innocent people — and prevent me from telling people it’s happening,” Lovecruft told CNN.

A subsequent phone call between a different FBI agent and Lovecruft’s lawyer revealed that FBI teams in Los Angeles, San Francisco, Chicago, New York, and Atlanta were looking for her, and that the FBI would prefer a meeting in person to a phone call, so that Lovecruft could share her opinion on documents the agency held. Another phone call indicated that the matter of the documents had been resolved, but the FBI was still hoping to meet with Lovecruft.

Lovecruft’s blog includes speculation about the FBI’s motivation and intentions in seeking a meeting. It also suggests harassment on the part of the FBI, and contains provisions (such as a warrant canary) for communicating as much as possible about the situation in the event that a sealed subpoena or National Security Letter is served.

The FBI has previously subpoenaed Carnegie Mellon University researchers to hack the Tor network, and possibly delivered malware to the network to identify its users.

Source: TheWHIR

OK computer: When pop music meets machine learning

OK computer: When pop music meets machine learning

It’s Moogfest season here in Durham, so there’s been a lot of the discussion in the office around music, data lakes, and the heat map we’re building for the festival. But the conversation took a different turn, thanks to a tweet.

Many months ago when I was at IBM Insight, I tweeted a snide remark about computer-generated jokes. Fast-forward to this week, when former “Monk” and Letterman writer Joe Toplyn responded with a link “proving” that computers could generate jokes that were funny … at least to the easily amused. Amid the discussion, someone drove by playing crappy autotune pop music.

This got me thinking about whether you could generate hit pop songs. Most of the popular songs are written by two middle-aged guys from Sweden anyhow. Plus, there are algorithms that can detect which songs are likely to be a hit. While the current hit song generator is simply song titles with performers, we also have an algorithm that can generate tweets for the presumptive Republican presidential nominee. It seems like a short trip to get from hit detector to factory songwriting to neural net for political speech to full-on pop song generator!

We’d need parameters like a genre (pop, hip-hop, dance) and probably gender, as well as whether it’s a party track, a love song, happy, sad, angry, and so on. Then maybe we’d train a neural net on the corpus of songs by the two Swedes. Add that to an adaptation of the hit detection algorithm and you should have not a great song, but at the very least a popular one.

Google: AlphaGo Powered by Custom AI Chip

Google: AlphaGo Powered by Custom AI Chip

datacenterknowledgelogoBrought to you by Data Center Knowledge

Last October, a computer system beat a professional human player at the ancient Chinese board game Go. The AI system, AlphaGo, was built by Google and trained using machine learning techniques.

Google built the hardware that powered AlphaGo in-house, as it does with most of its infrastructure components. At the core of that hardware is the Tensor Processing Unit, or TPU, a chip Google designed specifically for its AI hardware, the company’s CEO, Sundar Pichai, said from stage this morning during the opening Google I/O conference keynote next to Google headquarters in Mountain View, California.

This is the first time Google has shared any information about the hardware backend that powers its AI, which will play a central role in the company’srevamped cloud services strategy, announced earlier this year. TPUs will be part of the infrastructure that supports its cloud services.

Related: Google to Build and Lease Data Centers in Big Cloud Expansion

Pichai shared little detail about the TPU, saying only that its performance per watt was “orders of magnitude higher” than any commercially available CPU or GPU (Graphics Processing Unit):

Pichai TPU slide GoogleIO

Google CEO Sundar Pichai on stage at Google I/O 2016 (Source: Google I/O live stream)

“Tensor Processing Unit (TPU) is a custom ASIC for machine learning that fits in the same footprint of a hard drive, and was the secret sauce for AlphaGo in Korea,” Google said in an emailed statement.

TPU gets its name from TensorFlow, the software library for machine intelligence that powers Google Search and other services, such as speech recognition, Gmail, and Photos. The company open sourced TensorFlow in November of last year.

Original article appeared here: Google: AlphaGo Powered by Custom AI Chip

Source: TheWHIR

VentraIP Grabs 4,000 Hosting Customers as Part of Servers Australia Deal

VentraIP Grabs 4,000 Hosting Customers as Part of Servers Australia Deal

Servers Australia has agreed to sell its shared hosting customers to VentraIP, and the companies will work together as part of a deal to streamline the focus of each within the Australian web hosting market. While financial details were not released in the Tuesday announcement, it appears that VentraIP will send back an undisclosed amount of cash, as well as close its dedicated servers business, and will instead market Servers Australia’s dedicated line to its customers.

Nearly 4,000 shared hosting customers will be migrated from Servers Australia to VentraIP’s hosting platform, and VentraIP will market Server Australia’s dedicated hosting to its own customers when they outgrow VentraIP’s shared or virtual servers.

SEE ALSO: Australian Cloud Provider Zettagrid Acquires Hosting Firm Conexim

“In an industry which lacks leadership and teamwork we are very pleased to be able to work with Jared and the team at Servers Australia to allow us to both deliver a higher level of service to our respective customers,” said VentraIP Australia Chief Executive Officer, Angelo Giuffrida.

Servers Australia Chief Executive Officer Jared Hirst said the move would streamline the company’s internal processes ahead of another “major announcement in the coming weeks,” according to a release. Giuffrida also hinted at an upcoming announcement from VentraIP.

“Dedicated servers are our bread and butter, and we are very excited to be able to put our full attention on extending our product range while chasing new opportunities in the market, with the added benefit of VentraIP Australia referring their customers who require dedicated servers our way,” said Hirst. “I am very confident that Angelo and the team at VentraIP Australia will take great care of our shared hosting customers and be able to offer them a whole new suite of additional products and services to continue to grow their businesses.”

CRN reports that Servers Australia made $5.7 million (AUD) in revenue in 2015, while VentraIP made $6.5 million.

VentraIP has been growing rapidly, and was up to 125,000 customers before the deal with Servers Australia, according to CRN. VentraIP also picked up over 15,000 customers when it acquired Aussie host Intaserve in July.

Source: TheWHIR

Cloud-Based Security Solutions Encourage Faster Deployment: Report

Cloud-Based Security Solutions Encourage Faster Deployment: Report

Nearly half of all information security professionals said faster deployment is the top driver of cloud-based security solutions, according to a report released Tuesday by CloudPassage. The 2016 LinkedIn Cloud Security Spotlight Report shows industry professionals are concerned about public cloud security, and not convinced that traditional security tools work adequately with cloud infrastructure.

More than 2,200 information security professionals from among the 300,000 members of LinkedIn’s Information Security Community were surveyed for the second annual report. It shows that the top barriers to cloud adoption are growing security concerns, with an increased number of professionals citing general cloud security (from 45 to 53 percent)and legal and regulatory compliance concerns (29 to 42 percent).

SEE ALSO: Organizations Feel More Confident in their Security Than a Year Ago: Report

“As organizations adopt agile IT delivery models in order to continuously innovate and differentiate themselves, security becomes either a business inhibitor or a business enabler,” said Ram Krishnan, CloudPassage Chief Product Officer. “What’s needed to enable this transformation is on-demand, automated security that delivers a comprehensive set of controls right at the workload, no matter where it lives, in any combination of infrastructure models, at any scale. CISOs now have the opportunity to help their businesses leapfrog their competition.”

Respondents were divided between being “moderately” or “very” concerned about public cloud security, but over nine out of ten report concern. Forty-eight percent saying traditional network security tools are somewhat ineffective when applied to cloud infrastructure, 11 percent saying they are completely ineffective, and a further 25 percent saying their effectiveness cannot be measured in cloud environments. The fallout of this situation is that almost half of those surveyed said security slows down continuous development methods like DevOps, and another 15 percent said security is completely ignored in the process.

As the need for agile development outpaces security tools and practices, it is hardly surprising that verifying security policies, visibility, and compliance are the top three headaches for companies adopting cloud infrastructure, according to the survey.

Encryption is considered the best cloud security technology, for data at rest (65 percent) and in motion (57 percent), followed by intrusion detection and prevention (48 percent) and access controls (45 percent).

Survey results released by ScienceLogic in November showed similar concerns about organization visibility into and control over public clouds, and a survey earlier in 2015 from Vanson Bourne and Tata Communications showed security concerns slowing cloud adoption, and confining much of it to private clouds.

Source: TheWHIR

Media Temple Unveils New Managed WordPress Plans for Enterprises, Agencies

Media Temple Unveils New Managed WordPress Plans for Enterprises, Agencies

Media Temple is expanding its portfolio of managed WordPress hosting solutions for enterprises. The company announced Tuesday that it will offer two new plans for enterprises and agencies, featuring its new round-the-clock white glove account management service (mt) One and hosted on the AWS cloud.

Media Temple began offering WordPress hosting specifically designed for enterprises as one of four categories released in an update of its managed WordPress hosting portfolio in early 2015. It has now split the enterprise category into two different offerings: Enterprise WordPress and Enterprise WordPress Max Performance.

SEE ALSO: Agencies Plan to Spend More Time and Money on WordPress Projects in 2016

“Based on the feedback we collected from the WordPress community and our pilot program, we know that enterprises take WordPress very seriously. They also want to partner with experts who can unleash the power of the cloud for them and help increase their overall business efficiency,” said Brendan Fortune, Senior Director of Product Management at Media Temple. “With our highly available managed WordPress solutions, we are bringing them the sophistication of the world’s most popular web and app platform, uniquely combined with high- end, 24/7 support and account management, as well as the reliability of AWS.”

Both new Media Temple plans includes 5 sites and migrations, developer tools, a staging environment, (mt) One, CloudTech Premier support, redundant web, db, and file servers, and scalability. The basic plan starts at 1TB of storage and 1.5TB of Amazon CloudFront bandwidth, with up to 10 EC2 instances, using Docker Containers, and runs an Amazon RDS MySQL database for $2,500 a month. The “Max Performance” version offers four times the bandwidth, double the scaling capacity, and an Amazon Aurora MySQL database.

READ MORE: Media Temple Updates and Expands Grid Managed Shared Hosting Platform

“Many enterprise-level customers consider the level of service and support just as critical as the quality of the WordPress hosting solution itself,” said Deb Shea, Director of Strategy and Operations at Media Temple. “They want real-timeliness and account managers who can advocate for them throughout the business, which is exactly what our new WordPress plans are offering.”

The company is also offering 30 percent off the first year of WordPress hosting for new customers in celebration of the open-source CMS’s 13th birthday.

Media Temple launched managed services on AWS in July, so moving its updated enterprise WordPress services over was just a matter of time.

Source: TheWHIR

SAP seeks to simplify IT with a beefier new version of Hana

SAP seeks to simplify IT with a beefier new version of Hana

SAP has updated its flagship Hana in-memory computing platform with a raft of new features designed to make IT simpler while giving organizations a better handle on their data.

The updates, announced Tuesday at the company’s annual Sapphire Now conference in Florida, include a new hybrid data management service in the cloud and a new version of the company’s Hana Edge edition for SMBs.

“We’ve taken an already rock solid platform and further hardened security, enhanced availability, unified the development and administration experience, and expanded advanced analytic capabilities,” Michael Eacrett, vice president of product management for SAP, wrote in a blog post detailing the new release.

Launched more than five years ago, Hana forms the basis for S/4Hana, the enterprise suite SAP released in early 2015.