BizTech Magazine - Technology Solutions That Drive Business en Review: NetApp AFF A700s Is a Scalable Storage Solution for Growing Businesses <span>Review: NetApp AFF A700s Is a Scalable Storage Solution for Growing Businesses</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Thu, 02/14/2019 - 10:19</span> <div><p>When it comes to storage, scalability is king. Every business wants to grow — usually, the faster the better — and that means an organization’s storage needs to grow too. Yet few vendors can deliver a storage system that can scale from a handful of users to thousands.</p> <p>Enter the <a href=" " target="_blank">NetApp AFF A700s</a>, which retains the simplicity of a small system while scaling to a multinode cluster that can support thousands of users.</p> <p>The four-unit rack-mount chassis accommodates dual controllers,<strong> 24 solid-state drives </strong>and eight PCIe expansion slots for additional network ports. It can support <strong>8-, 16- and 32-gigabit-per-second Fibre Channel</strong>, 40 Gigabit Ethernet, and both storage area network (SAN) and network-attached storage (NAS) functionality.</p> <p>The included ONTAP data management software makes it simple to start with one system and add as many as 24 in a cluster, then expand with cloud-based storage for cheaper replication targets and offsite fault tolerance or to support workloads that migrate from the data center to the cloud.</p> <p>NetApp specifies as many as 7 million input/output operations per second and an effective capacity of up to <strong>155 petabytes</strong>, with a maximum raw capacity of <strong>39PB</strong> in NAS configuration, or <strong>19.8PB raw and 77.8PB effective</strong> in SAN configuration. Of course, effective capacity depends on both compression and deduplication, which can boost results exponentially — up to five or six times raw capacity, depending on the type of data being stored. A single node can hit <strong>600,000 IOPS</strong>, with an effective capacity of up to <strong>13PB</strong>.</p> <p>The configuration of a single A700s is simple, and <strong>adding it to an existing cluster is straightforward</strong>, given the large number of options. The installation wizard makes the initial configuration easy for any administrator familiar with data storage concepts, even without NetApp training or support. Both are available online or over the phone.</p> <p><a href="" target="_blank"><em><strong>MORE FROM HEALTHTECH:</strong> Could your business use a chief data officer?</em></a></p> <h2 id="toc_0">Intuitive User Interface Simplifies Storage</h2> <p>Creating volumes and setting up replication was very intuitive, with a <strong>well-developed user interface</strong>. The same can be said about enabling compression and deduplication, and enabling SAN protocols over Fibre Channel or iSCSI, or NAS protocols using NFS or CIFS/SMB.</p> <p><img alt="NetApp AFF A700s" data-entity-type="" data-entity-uuid="" src="/sites/" /></p> <p>A clustered system adds both <strong>resiliency and performance</strong>: The failure of any one node will not result in downtime, and performance increases with each node.</p> <h2 id="toc_1">The AFF A700s Offers Hybrid Storage that Scales</h2> <p>The AFF A700s easily scales to <strong>24 nodes</strong> to deliver fault-tolerant, high-performance and high-capacity storage that can be administered from a single dashboard.</p> <p>When demand calls for even more storage, the system adds cloud capacity from multiple vendors as well as legacy hard drive-based storage systems in the data center.</p> <p>ONTAP data management software can <strong>automatically move data between tiers to maximize performance</strong> for the most active data. (Data that hasn’t been used for a while can be moved to a less expensive storage tier.) The software also migrates data to keep it with the server instance that needs it.</p> <p>As workloads move from one virtual machine to another on a server in the data center or in the cloud, keeping the data with the app becomes more complex. NetApp’s software simplifies that process, allowing a new snapshot of the existing data to be created for a new version of the app, or for the existing data to migrate from one storage volume to another.</p> <p>Within a system where an app may need to shift from one data center to another, such<strong> flexibility becomes even more important</strong>.</p> <h3 id="toc_2">The NetApp AFF A700s</h3> <p>Max Drives: 24 SSDs<br /> Max Capacity: 39PB<br /> Max IP Routes: 20,000 IPv4; 6,000 IPv6<br /> Rack-Mount Size: 4U<br /> Ports: 8 Fibre Channel, 12 40GbE, 24 10GbE, 8 SAS<br /> Storage Networking: FC, iSCSI, NFS, CIFS/SMB</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Modern-Workforce_the-office.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></p> </div> <div> <div class="field-author"><a href="/author/logan-g-harbaugh" hreflang="en">Logan G. Harbaugh</a></div> </div> Thu, 14 Feb 2019 15:19:58 +0000 juliet.vanwagenen_22746 43216 at 3 Reasons Companies Turn to ‘as a Service’ Models to Achieve Sustainability <span>3 Reasons Companies Turn to ‘as a Service’ Models to Achieve Sustainability</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Wed, 02/13/2019 - 11:07</span> <div><p>Sustainability is becoming important to both consumers and the companies that serve them. In fact, sustainability has begun driving revenue decisions for businesses, according to a new study from <a href="" target="_blank">ING</a>. The study found that 39 percent of the <strong>200 executives</strong> polled believe revenue growth was the No. 1 factor behind sustainability initiatives, and <strong>48 percent</strong> noted that sustainability is, at the very least, influencing growth decisions.</p> <p>In fact, in the past six months, the number of companies that had set or committed to set a <a href="" target="_blank">science-based target</a> — targets that are in line with the level of decarbonization required to keep the global temperature increase below <strong>2 degrees Celsius</strong> compared to preindustrial temperatures — nearly <strong>doubled from 250</strong> to <a href="" target="_blank">497 companies</a>. Further, regulatory pressures, such as the European Union’s <a href=";;sdata=gSVs8NN7OllmslHxaExwc6o%2FlJMTFe2veTk3R5tTU1I%3D&amp;reserved=0" target="_blank">Circular Economy Package</a>, which requires companies operating in the European Union to ensure their products can be recycled, are also furthering sustainability initiatives.</p> <p>In addition to the social and environmental impact, the business benefits of embracing the circular economy are driving companies to seek new ways to implement sustainable practices, and one key way to do this is by tapping managed services. From Device as a Service to Infrastructure as a Service, systems-based thinking can help to deliver immediate and significant benefits to companies while decreasing environmental impact.</p> <p>Here are three ways that “as a service” practices deliver on this sustainability for businesses.</p> <p><a href="" target="_blank"><em><strong>MORE FROM BIZTECH: </strong>Check out how the XaaS movement could help businesses strategize, cut costs and improve security.</em></a></p> <h2>1. Services Shrink Equipment Needs for Companies</h2> <p>By reducing the amount of equipment a company has on-premises, managed services help <strong>facilitate the move to a smaller, greener footprint</strong>.</p> <p>Instead of buying, storing, maintaining, disposing of and replacing expensive equipment, businesses can <strong>purchase services as they need them from third parties</strong>. This means that for companies that embrace models such as Infrastructure as a Service, energy-intensive tasks, like cooling server rooms, are a thing of the past. Moreover, since less physical space is necessary to house and manage the equipment, associated energy usage and costs can drop as well.</p> <h2>2. Managed Services Reduce Businesses’ Energy Use</h2> <p>Think about old and unused office equipment that is still plugged in: Just like home appliances, these devices are still consuming energy. But some services can help <strong>cut unnecessary energy costs</strong> for devices that businesses have on-premises by enabling the ability to <strong>automatically manage fleets of devices</strong>, such as laptops and tablets. For instance, businesses can deploy energy-saving protocols, such as automatic shut-off and scheduling sleep and wake-up modes across the entire fleet to reduce energy consumption. The Device as a Service model also allows companies to use the most up-to-date and energy-efficient devices.</p> <p>But not all advantages are on-premises. Managed service models also help to cut back or consolidate the number of individual shipments, reducing aggregate supply chain emissions.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <h2>3. Services Help to Eliminate Waste</h2> <p>With the economy moving toward a “<strong>recover, recycle, reuse</strong>” circular strategy, managed services can play a role by allowing companies to track wasteful employee behaviors. These behaviors can include single-sided versus two-sided printing, color volume, or even the employee-per-device ratio. With this information at hand, companies can then deploy and scale a cloud-based solution to help curtail such behaviors across the entire fleet.</p> <p>Some services can enable proactive maintenance for devices, which can help to increase product longevity and reduce waste. For instance, ensuring toner is completely used up before it is changed can result in significant cost savings for a company with thousands of printers.</p> <p>With the world’s population close to <strong>8 billion</strong>, there is not a moment to lose when it comes to being more effective stewards of our resources. Today, sustainability in business is becoming mandatory. One of the best ways to <strong>enable and accelerate an effective sustainability agenda</strong> is to jettison the old ownership model and reinvent IT with “as a service.” Your customers, employees and kids will thank you.</p> </div> <div> <div class="field-author"><a href="/taxonomy/term/11926" hreflang="en">Grad Rosenbaum</a></div> </div> Wed, 13 Feb 2019 16:07:28 +0000 juliet.vanwagenen_22746 43211 at What Is a Chief Data Officer? <span>What Is a Chief Data Officer?</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Tue, 02/12/2019 - 16:24</span> <div><p>These days, enterprise data is a company’s most crucial resource. Effectively gathering, analyzing and applying that data will be<strong> vital in helping businesses improve operations and deliver on customer expectations</strong>. But as data becomes ever more ingrained in how companies forge a path forward, businesses have begun to set up leadership roles specific to managing data effectively and keeping data use in compliance with constantly evolving regulations.</p> <p>Enter the chief data officer, also known as the chief analytics officer, a role that heads up a company’s data analytics operations, transforming data into business value and driving data-related business change. </p> <p><em><a href="" target="_blank"><strong>VIDEO:</strong> See how retailers are capturing data to make customer personalization a reality.</a></em></p> <h2>What Does a Chief Data Officer Do?</h2> <p>Traditionally, the responsibility to oversee data collection, organization and use has fallen to the CIO. But as data use grows in volume and importance, the chief data officer position has emerged. </p> <p>The CDO is responsible for <strong>governing data across the enterprise</strong> and overseeing data-related functions, which can include managing data, building a data strategy and ensuring robustness and quality of data. The CDO also manages analytics and champions the use of data across an enterprise to bring about cultural and operational change.</p> <p>In practice, the CDO must possess both technical know-how and effective communication skills. Project Open Data<a href="" target="_blank"> describes the CDO as</a> “part data strategist and adviser, part steward for improving data quality, part evangelist for data sharing, part technologist, and part developer of new data products.”</p> <p>The duties of a CDO should not overlap with those of the CIO or chief privacy officer, despite some similarities in how the positions appear to function. Instead, a CDO should <strong>work in concert with others in the C-suite</strong> to ensure the effective and compliant use of data.</p> <p><em><a href="" target="_blank"><strong>DOWNLOAD: </strong>What do finance firms need to know about GDPR? </a></em></p> <h2>The Main Responsibilities of a Chief Data Officer</h2> <p>The <strong>duties that fall to the CDO will differ depending on the organization</strong>, but in general, they include:</p> <ul><li>Ensuring compliance with data security and privacy regulations</li> <li>Overseeing the data lifecycle</li> <li>Managing data quality</li> <li>Developing an overall data and analytics strategy</li> <li>Coordinating and leading data initiatives</li> <li>Creating business value from data assets</li> </ul><p>The CDO should also work closely with the CIO and IT team to ensure that enterprise data is readily available and actionable for the organization.</p> <p>It should be noted, however, that as initiatives such as customer personalization and real-time engagement begin to take hold, the role of the CDO is changing.</p> <p>According to a<a href="" target="_blank"> recent report from Deloitte</a>, <strong>CDO roles are expanding as businesses move to digital</strong>. Now more than ever, CDOs are asked to serve as data champions and drive change, improve the value of data as a strategic asset and explore the uses of artificial intelligence, all with the aim of improving operational efficiencies and controlling costs.</p> <p><em><a href="" target="_blank"><strong>MORE FROM BIZTECH: </strong>What does it take to tackle data privacy in the Big Data era?</a></em></p> <h2>What Education and Skills Do Chief Data Officers Need?</h2> <p>Because the CDO’s role varies from company to company, so do the expectations companies have for them. Companies seeking to hire a CDO might list the following <a href="" target="_blank">requirements:</a></p> <p><strong>Education: </strong>A Ph.D. in a data-related field, such as data science, computer science, management information systems, statistics or analytics</p> <p><strong>Experience: </strong>Ten or more years of experience in a senior data analytics or data science position within an organization, as well as experience in building and leading data science initiatives and advocating for analytics</p> <p><strong>Skills:</strong> Solid interpersonal and leadership skills, commensurate with a C-suite position, plus the ability to effectively communicate and collaborate with other departments in order to drive the most value from data</p> <p><em><a href="" target="_blank"><strong>SEE MORE: </strong>Can Analytics as a Service help your small business turn data </a></em><a href=""><em>into action</em></a><em><a href="">?</a></em></p> <h2>What Chief Data Officers Can Offer Businesses</h2> <p>The CDO role has grown in popularity among businesses in recent years, with nearly two-thirds of firms reporting that they have a CDO, according to a<a href="" target="_blank"> 2018 survey from New Vantage Points</a>. This number represents a huge upswing from six years earlier, when just <strong>12 percent</strong> of companies reported having a CDO.</p> <p>No doubt, the number of CDOs is growing as the amount of data available to businesses expands. By 2020, the number of connected devices will reach <strong>20.4 billion</strong>,<a href="" target="_blank"> according to Gartner</a>. Without effective oversight, much of the data these devices create will sit in silos and never produce meaningful insights.  </p> <p>This is where the CDO steps in: He or she can work with teams and tools to get a full view of an organization’s data and then put it to work to solve customer and operational challenges and improve business operations.</p> <p>The CDO’s expertise is <strong>especially important when determining how data should be </strong><strong>handled</strong>, because not all data should be handled the same way: “Some data, we just need to bring it in and store it. Other data, we need to know where it lives and how it’s changing. Other data, we just need to keep it for a short time,” Anthony Scriffignano, chief data scientist at Dun &amp; Bradstreet,<a href="" target="_blank"> tells CIO</a>.</p> <p>Moreover, with the advent of<a href=""> data privacy</a> legislation, such as Europe’s <a href="" target="_blank">General Data Protection Regulation</a> (GDPR), appointing a leader to<a href=""> understand and control how data is managed within an organization</a> could be more crucial than ever.</p> <p><em><a href="" target="_blank"><strong>MORE FROM BIZTECH: </strong>Surveillance data could be the key to optimizing in-store retail operations.</a></em></p> <h2>Challenges Facing Chief Data Officers</h2> <p>It’s important for businesses to <strong>understand exactly what they want from a CDO</strong> and to provide the person in that role with the tools and access they need to reach realistic goals. In fact, one of the greatest issues in hiring and keeping CDOs is that companies have very different ideas of what the role can deliver.</p> <p>“One of the biggest mistakes is not understanding what it will take to succeed, in terms of expectations,” Guy Gomis, partner at the recruiting company BrainWorks, tells CIO. “If you look at a lot of the people who have had the title of chief data officer and chief analytics officer over the last three years, there’s a<a href=""> tremendous amount of turnover</a> … It turns out that the expectation of the company and the candidates were not aligned.”</p> <p>Other challenges for the CDO persist; among them, a <strong>cultural</strong><strong> resistance to change </strong>that holds back progress for data-driven initiatives, according to the New Vantage Points report. To overcome this, companies should work to support the CDO in furthering a culture across the business that seeks to gather and use data efficiently.</p> <div class="sidebar_wide"> <h3>Recommended Data Science Tools</h3> <p>The CDO and the CDO’s team work with technologies and tools that gather, synthesize and analyze data in hand, including:</p> <ul><li><strong>Data visualization tools </strong>— Just having data isn’t enough; to effect meaningful change in operations, all members of an organization need to be able to access and understand the data. Data visualization tools, such as <a href="" target="_blank">Tableau</a>, have helped organizations like <a href="">Home Depot and Chick-fil-A better understand in-store operations</a>.</li> <li><strong>Data lakes </strong>— With so much data being created, it can easily get lost or siloed. This is where data lakes — <a href="" target="_blank">vast repositories of raw data</a> — can come in handy. Once the data has been filtered and structured for its specific purpose, it’s crucial not to let it float off to the wayside, but to store it in a data warehouse.</li> <li><strong>Automation</strong> — One of the advantages of data collection is that it can inform artificial intelligence-backed technologies that are used to improve workflow. This can prove especially helpful for businesses with limited manpower. Technologies such as <a href="">robotic process automation</a> can tap this data to <a href="">perform many of the routine, tedious tasks humans don’t enjoy</a> — freeing up staff to take on more innovative and business-critical work.</li> </ul></div> </div> <div> <div class="field-author"><a href="/author/juliet-van-wagenen" hreflang="en">Juliet Van Wagenen</a></div> </div> Tue, 12 Feb 2019 21:24:27 +0000 juliet.vanwagenen_22746 43206 at How Small Businesses Can Shorten Breach Detection Time <span>How Small Businesses Can Shorten Breach Detection Time</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Mon, 02/11/2019 - 11:32</span> <div><p>We’ve all heard stories of how one click can lead to a lockdown of hundreds of company computers, but recognizing a cybersecurity attack isn’t always that easy.</p> <p>In fact, one of the most pernicious aspects of a cybersecurity breach is the length of time threat actors often lurk on a network before the victim discovers the breach. According to <a href="" target="_blank">FireEye</a>’s <a href="">Mandiant 2018 M-Trends report</a>, this so-called<strong> dwell time averaged 101 days</strong> — more than three months — in 2017. That’s more than enough time for hackers to do almost any damage they wish.</p> <p>Often, breaches can take even longer to detect. Lord &amp; Taylor and Saks Fifth Avenue, for instance, <a href="" target="_blank">detected a breach in March 2018</a> that was likely initiated in May 2017, giving the bad actors almost a year to siphon data. But the consequences of undetected breaches can go even further for businesses, <a href="" target="_blank">shaking consumer and investor confidence</a> as well.</p> <p>With this in mind, what can businesses do to help prevent these attacks? Enter the latest generation of <strong>endpoint detection and response</strong> (EDR) technology. Paired with <a href="" target="_blank">security best practices</a>, these tools can help detect a breach early and limit damage from attacks lurking inside your system.</p> <p><em><a href=""><strong>MORE FROM BIZTECH:</strong> Can a security assessment benefit your small business?</a></em></p> <h2>Endpoint Detection and Response Beefs Up Security</h2> <p>As the threat landscape expands and companies are hit with more types of malicious threats every day — in particular, those directed at users via printers, laptops, phones and other endpoints — EDR has proved to be a key part of a business’s defense toolbox.</p> <p>“<strong>EDR monitors endpoints to detect suspicious activities</strong> and capture data for forensic and security investigations, focusing on each stage of an attack — often referred to as the ‘kill chain,’” <a href="">explains</a> Sherry De La Torres, a CDW security solution architect.</p> <p>In their arsenal, hackers have a variety of tools to help them avoid detection. EDR can offer more visibility into the attack itself, which can offer an IT team the information it needs to more quickly understand and remediate an attack.</p> <p>“Until the advent of EDR, the traditional approach of collecting forensic data from endpoints has been on a reactive basis, where a forensics tool would be deployed to <strong>target post-event endpoints</strong> and the data collected would depend on what the operating system logged,” <a href=";ct=190110&amp;st=sb">explains a recent report by Gartner</a>. Now, with EDR, IT teams have access to “deep granular endpoint data” that’s traditionally been provided by network and perimeter security solutions.</p> <p><em><a href="" target="_blank"><strong>LEARN MORE:</strong> See how AI-backed EDR can improve breach detection time.</a></em></p> <p>This means that, with EDR, organizations have the means to search out endpoint-related activity, whether it be malicious software or simply information that can help inform operations, like patching or application use.</p> <p>But EDR solutions aren’t just set-it-and-forget-it technologies. Understanding what an alert or activity means requires expertise, and so companies should take care to <strong>invest in security talent and training for EDR solutions</strong>.</p> <p>“EDR provides very rich and very complex data that requires advanced knowledge, understanding and experience to analyze and understand,” the Gartner report notes.</p> <p>For this reason, it’s often prudent for small businesses to seek out <a href="" target="_blank">managed security services</a> for help in managing and using EDR effectively.</p> <p>As the threat landscape expands, what was once just a printer could now be a hacker’s point of entry into a company’s systems. Those IT teams that can clearly see every device on the network will likely be the best positioned to take on attacks.</p> <p><em>This article is part of </em>BizTech<em>'s <a href="">AgilITy blog series</a>. Please join the discussion on Twitter <em>by</em></em><em> using the <a href=";src=typd">#SmallBizIT </a>hashtag</em>.</p> <p><a data-entity-type="" data-entity-uuid="" href=""><img alt="Agility_Logo_sized.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <p> </p> </div> <div> <div class="field-author"><a href="/taxonomy/term/11721" hreflang="en">Michael Sorokin </a></div> </div> Mon, 11 Feb 2019 16:32:38 +0000 juliet.vanwagenen_22746 43201 at 3 Best Practices to Boost Endpoint Security <span>3 Best Practices to Boost Endpoint Security</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Wed, 02/06/2019 - 12:13</span> <div><p>Conventional wisdom tells us that a penny saved is as good as a penny earned. While that might be true when buying paper towels at a warehouse store, blind adherence to that rule in other areas can create unanticipated risk — especially when it comes to purchasing technology.</p> <p>For a procurement team, that might be considering a bulk purchase of printers or laptops for the lowest per-unit price possible. Achieving <strong>20 percent savings </strong>on the deal is a great win for the company — until it isn’t. Those savings might become costly if one of those printers or laptops is used as a gateway for hackers to launch malware, steal customer data or intellectual property or create denial of service. </p> <p>Cybercrime is rampant and is on track to cost businesses more than <strong>$6 trillion annually by 2021</strong>, according to the “<a href="" target="_blank">2017 Official Annual Cybercrime Report,” by global information security advisory firm Herjavec Group</a>. That cost doesn’t even consider the impact on brand reputation. <a href="" target="_blank">A 2017 Centrify study</a> revealed that when a company’s data breach is disclosed, there is an average of a seven percent loss of customers and an average drop in stock price of five percent. Further, the company must also reckon with investigative, legal and public relations expenses and costs associated with rehabilitating its image.</p> <p>To make matters worse, the possibility of being hacked is increasing dramatically: A <a href=";;sdata=CQSA0SW1%2BRQlTcT5ZUixWm8bzp22Hy3AJCe%2Bppth50s%3D&amp;reserved=0">recent report</a> finds that during the first half of 2018, there were <strong>668 data breaches</strong> in the U.S., representing more than <strong>22 million records exposed</strong>. While all companies are at risk, some industries are at higher risk than others, including healthcare, manufacturing, retail and banking. In fact, the latest “<a href="" target="_blank">Thales Data Threat Report,” retail edition</a>, shows that U.S. retail data breaches more than doubled, from <strong>19 percent in 2017 to 50 percent in 2018</strong>.</p> <p><a href="" target="_blank"><em><strong>MORE FROM BIZTECH: </strong>Beware of these three cybersecurity threats in the new year.</em></a></p> <h2>Endpoints Prove Security Vulnerabilities for Companies</h2> <p>Endpoint devices — PCs, printers, scanners, Voice over Internet Protocol phones and smart meters, among others — are increasingly preyed upon by cybercriminals to gain access to sensitive and private</p> <p>information. <strong>Embedded endpoint security</strong> helps businesses restore data during cyberattacks and enables organizations to take control of their information. It also reduces exposure to legal and financial risk with early case threat assessment. </p> <p>Organizations need endpoint protection for assurance when the endpoint devices are lost, stolen, or experience irrecoverable hardware or software failure. Yet, in many cases, endpoint security is not seen as a primary requirement for IT procurement contracts.</p> <p>Businesses need to move quickly to secure their endpoints, but also do so thoroughly. Here are <strong>three best practices to properly secure a business’s endpoints</strong>, and ultimately a brand’s reputation.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <h2>1. Enlist IT Professionals in the Process, Not Just the Procurement Team </h2> <p>When every device purchase comes with potential vulnerability, no decision is too small.</p> <p>IT procurement must include conversations beyond just the price of the technology. Security should be a deliberate and well-considered criterion. That means that professionals from the IT team and security team (if there is one) must be active participants in the evaluation and selection criteria for new technology that aligns with the company’s security policies.</p> <p>These employees are also able to identify how to best leverage existing IT investments and plan for future growth needs with service or application integration points.</p> <p>Finally, IT professionals can <strong>assess security features to enhance organizational productivity</strong> with end-user benefits without compromising business assurance requirements. They will be in a position to understand employees’ behaviors and which security features are best suited to their users. </p> <p><em><a href=""><strong>DOWNLOAD:</strong> How can retailers </a></em><a href=""><em>can</em></a><em><a href=""> deal with the new reality of GDPR?</a></em></p> <h2>2. Invest in First-Rate Endpoint Security </h2> <p>Laptops, desktops, smartphones, printers, copiers, VoIP phones and Internet of Things devices: Companies have thousands of endpoints, and <strong>protecting the perimeter is not enough</strong> when each device represents a potential weak link. In fact, <a href="" target="_blank">71 percent of data breaches</a> target endpoints. Still, most companies don’t spend enough on security. </p> <p>“Security has been an under-spend area for decades. You’re spending about <strong>3 percent</strong> of your capex (capital expenditures) that’s focused on IT on security. That’s relatively low,” Rob Owens, senior research analyst for security and infrastructure software at Pacific Crest Securities, <a href="">said in a press</a> release. </p> <p>But security value isn’t just about investing dollars, it’s about ensuring that those dollars are well-spent. IT leaders should look for best-in-class features such as behavior-based malware detection, multifactor authentication and automatic runtime intrusion detection.</p> <p>Further, security fleet management solutions check for and fix device security settings in a reboot, which is another important consideration in protecting endpoints. Remember to <strong>incorporate physical security measures too</strong>, such as privacy screens, in order to thwart visual hackers.</p> <h2>3. Call in Security Experts to Help Shore Up Defenses</h2> <p>Endpoint security is critical to the health of any business, so outsourcing the responsibility is the prudent path for many companies. A <a href="" target="_blank">recent survey</a> reveals that only <strong>16 percent of enterprise IT decision-makers</strong> consider printers a high-risk target for a security breach — creating a huge vulnerability that cybercriminals are eager to exploit. </p> <p>Partnering with a security expert can give organizations peace of mind by <strong>providing specialized security tools</strong> as well as the resources needed to do the job right. In fact, a recent <a href="" target="_blank">CIO, CSO and Computerworld survey</a> found that <strong>56 percent</strong> of respondents said their organizations are engaging consultants to develop an information security strategy, and <strong>40 percent </strong>are moving to a managed security service provider.</p> </div> <div> <div class="field-author"><a href="/taxonomy/term/12036" hreflang="en">Christoph Ruef</a></div> </div> Wed, 06 Feb 2019 17:13:16 +0000 juliet.vanwagenen_22746 43196 at Small Businesses Get Larger Tax Breaks for Tech Purchases <span>Small Businesses Get Larger Tax Breaks for Tech Purchases</span> <span><span lang="" about="/dashboard/bobkeaveneyu64t" typeof="schema:Person" property="schema:name" datatype="">Bob.Keaveney_u64t</span></span> <span>Tue, 02/05/2019 - 10:27</span> <div><p>Companies that are preparing to file their 2018 taxes and planning for 2019 will see some big changes in the new tax law, including much larger tax deductions for technology purchases.</p> <p>The <a href="" target="_blank">Tax Cuts and Jobs Act</a>, which took effect in the 2018 tax year, was <strong>the first major tax reform in 31 years.</strong> For businesses, other favorable changes include lowering the corporate tax rate from 35 percent to 21 percent, and a potential 20 percent deduction in qualified business income for small businesses that are S corporations, LLCs, partnerships and sole proprietorships.   </p> <p>But the new tax law also <strong>eliminated some popular business deductions</strong>, such as entertainment expenses and transportation fringe benefits, which allowed employers to deduct the costs of providing employees funds for parking and transit passes.</p> <p>“There’s good news and bad news,” says Paul Herman, a CPA and owner of <a href="" target="_blank">Herman and Company,</a> an accounting firm in White Plains, N.Y.</p> <p>From an IT standpoint, <strong>one major change is to the Section 179 deduction and bonus depreciation</strong>, which allows companies the option to write off all their technology and equipment spending in one year, rather than use the normal depreciation schedule, which for hardware is typically five years.</p> <p>The amount of the Section 179 <strong>deduction doubles from $500,000 to $1 million</strong> for 2018 and beyond. Limits will be indexed for inflation after 2018.</p> <p>“I don’t know if there are many small businesses that will spend that much, but whatever they spend, they can expense it with Section 179, and that’s a good thing,” Herman says.</p> <p>The new tax overhaul also<strong> increases bonus depreciation to 100 percent</strong>, which increases the amount of technology and other equipment that companies can deduct each year. Before the new law, bonus depreciation was scheduled to drop from 50 percent in 2017 to 40 percent in 2018.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <h2>How Section 179 and Bonus Depreciation Works</h2> <p>Technology that qualifies for Section 179 or bonus depreciation includes servers, computers, networking equipment and off-the-shelf software. Office equipment, furniture and some vehicles also qualify.</p> <p>The new tax law also <a href="" target="_blank">expands</a> what is eligible and now includes alarms and security systems, roofing, HVAC systems and fire protection systems.</p> <p>To use Section 179, <strong>companies are allowed to spend up to $2.5 million on technology</strong> and other equipment. Every dollar spent above the limit reduces the deduction by a dollar, says Troy Banker, senior tax manager at <a href="" target="_blank">Geffen Mesher</a>, an accounting firm in Portland, Ore. The deduction is completely phased out once total qualifying additions reach $3.5 million, he says.</p> <p>In contrast, <strong>bonus depreciation has no spending limits. </strong>Under the new law, bonus depreciation is increased to 100 percent for equipment purchased and placed into service between Sept. 27, 2017, and Dec. 31, 2022.</p> <p><em><a href="" target="_blank"><strong>LEARN MORE:</strong> Discover solutions for stretching IT budgets further</a>.</em></p> <p>Historically, Section 179 could be used for new and used equipment, while bonus depreciation could only be used for new equipment. But the new tax overhaul allows companies to use bonus depreciation for used equipment as well.</p> <p>The upshot: For most small businesses,<strong> Section 179 and bonus depreciation gives companies two ways to deduct their technology and equipment purchases all in one year.</strong></p> <p>“For example, if your company has $100,000 in net income, and you purchase $30,000 in qualifying equipment, you can deduct the $30,000 rather than capitalizing it, allowing you to pay less in taxes,” says John W. Reddall, a <a href="" target="_blank">CPA</a> in Las Vegas.</p> <p>There are some differences between Section 179 and bonus depreciation. <strong>Companies can’t use Section 179 to create a loss or if the company is operating at a loss. </strong>But if a business operates at a taxable loss, it can still qualify for bonus depreciation, Banker says.  </p> <p>Business owners may find it advantageous to take bonus depreciation to increase a loss to offset income from other sources, thus lowering taxes in the current year. Also, net operating losses created can be forwarded into the next year, Banker says.</p> <p>“If you carry the loss forward, and if you have a taxable income the next year, the taxpayer may be able to offset the net operating loss carryforward against next year's income, subject to net operating loss rules," he says.</p> <p>Businesses should <strong>consult their accountants on whether to take advantage of Section 179 or bonus depreciation</strong>, Reddall says. It might make more sense to use the normal depreciation schedule. “If you are losing money, you may want to spread the deduction over several years, to when you are potentially more profitable,” he says.</p> </div> <div> <div class="field-author"><a href="/author/wylie-wong" hreflang="en">Wylie Wong</a></div> </div> Tue, 05 Feb 2019 15:27:36 +0000 Bob.Keaveney_u64t 43191 at Step Inside Cisco DNA Spaces for Retail <span>Step Inside Cisco DNA Spaces for Retail</span> <div><p>The platform helps retailers leverage in-store Wi-Fi network technology to gain real-time customer insights, and obtain details that rival data gleaned from ecommerce transactions.</p> <p> </p> </div> <span><span lang="" about="/dashboard/tarabuck" typeof="schema:Person" property="schema:name" datatype="">tara.buck</span></span> <span>Mon, 02/04/2019 - 15:02</span> <div> <div>Tweet text</div> <div>Watch @jwitikko take @BizTechMagazine on a tour of @cisco&#039;s #DNASpaces #RetailTech </div> </div> <div> <div>Video ID</div> <div><p>1575796214</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT30873</p> </div> </div> <div> <div>CDW Segment</div> <div>Retail</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="" data-title="Watch @jwitikko take @BizTechMagazine on a tour of @cisco's #DNASpaces #RetailTech" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>04</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="" data-title="Watch @jwitikko take @BizTechMagazine on a tour of @cisco's #DNASpaces #RetailTech" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="" data-title="Watch @jwitikko take @BizTechMagazine on a tour of @cisco's #DNASpaces #RetailTech" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href=";" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/"> We&#039;re trying to make it super, ultra-convenient for shoppers as well as give the store a lot more notice of intent to buy. </a></p> <img src="/sites/" width="60" height="60" alt="Jeremy Witikko Cisco DNA Spaces Retail" typeof="foaf:Image" /> <p class='speaker'> <span>Jeremy Witikko</span> Global Business Development Manager for Retail, Cisco </p> </div> </div> Mon, 04 Feb 2019 20:02:19 +0000 tara.buck 43186 at A Look at What Cisco’s Fully Integrated Retail Store Can Do <span>A Look at What Cisco’s Fully Integrated Retail Store Can Do</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Mon, 02/04/2019 - 12:20</span> <div><p>What does a digitally enabled in-store retail experience look like? Attendees of the <a href="">National Retail Federation’s Big Show</a> in New York City earlier this year got a glimpse of the possibilities as <a href="" target="_blank">Cisco</a> showcased a connected store that sought to deliver everything the store of the future might do.</p> <p><em><a href="" target="_blank"><strong>MORE FROM BIZTECH:</strong> Check out all of our stories and video from NRF 2019</a><a href="" target="_blank">.</a></em></p> <h2>The Anatomy of a Connected Store</h2> <p>Cisco’s prototype store, <strong>Stop, Shop and Go</strong>, modeled several features that tapped would-be shoppers’ smartphones to deliver a smoother in-store experience, including the ability to make purchases on the store’s mobile app, which then automatically converts to a “<a href="">buy online, pick up in store</a>” order. This capability allows the consumer “to <strong>spend less time in the store</strong>,” explains Jeremy Witikko, global business development manager for retail at Cisco.</p> <p>Moreover, for those who have ever been lost in a grocery store, a wayfinding capability in the store’s app could help customers see where items are located. This means shoppers can find what they need <strong>without having to search through rows of shelves</strong>.</p> <script type="text/javascript" src="//;widget_id=1575796214&amp;width=640&amp;height=360"></script><p>“We’re really trying to make it ultraconvenient for shoppers, as well as give the store associates and staff more notice of what shoppers are planning to come buy so that they can quickly dispatch someone, an associate, to see if the stock’s on the shelf,” says Witikko.</p> <p>Many of these features depend on the consumer downloading the store’s application in advance, but only about 30 percent of customers do this, Witikko notes. The solution? When in-store shoppers log on to guest Wi-Fi, they are immediately sent a text notification with a link to a web version of the app.</p> <p>“You can reach the other <strong>70 percent </strong>who won’t download the app and offer the same digital services through a thin-client experience versus an actual native app,” Witikko notes.</p> <p><em><a href="" target="_blank"><strong>MORE FROM BIZTECH:</strong> See how innovative technology transforms inventory management.</a></em></p> <h2>Associates Benefit from Real-Time Retail Analytics</h2> <p>When it comes to loss prevention, a connected-store setup can not only detect stolen items but also <strong>capture video of shoplifters and stream it live to associates.</strong></p> <p>In this and other ways, connected stores do more than just help customers; they also <strong>empower associates</strong>. Control centers can push real-time data and analytics to store associates and headquarters staff to help them work together to improve operations. Built on Cisco’s indoor location-services platform, DNA Spaces, the analytics leverages Wi-Fi infrastructure to provide actionable, real-time insights to associates.</p> <p>The technology’s capabilities can be broken down into <strong>three categories</strong>:</p> <ul><li><strong>Seeing:</strong> By layering analytics over the store’s Wi-Fi, associates get a real-time view of what customers are doing in the store. This capability also enables automatic features for guests entering the store.</li> <li><strong>Acting:</strong> Once the store has collected and analyzed certain shopper behaviors, the tool “can put in business rules and logic on top of the network and actually act on those behaviors in an automated way with a variety of bots and push-notifications and triggers,” Witikko says.</li> <li><strong>Extending: </strong>The next step for retailers is to extend those actions to the “partner ecosystem,” which allows the retailers themselves to build out “even more feature-rich applications for their associates to use while we’re in our store,” Witikko notes.</li> </ul><p>“DNA Spaces is an evolution of what we can do with wireless and mobility and how we can layer in new actions and new capabilities when customers are inside the store,” he explains.</p> </div> <div> <div class="field-author"><a href="/author/juliet-van-wagenen" hreflang="en">Juliet Van Wagenen</a></div> </div> Mon, 04 Feb 2019 17:20:13 +0000 juliet.vanwagenen_22746 43181 at How Businesses Can Maximize Cisco’s Identity Service Engine <span>How Businesses Can Maximize Cisco’s Identity Service Engine</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Thu, 01/31/2019 - 12:25</span> <div><p>No security program is complete without an effective means of identifying would-be network users and authenticating their credentials. <a href="" target="_blank">Cisco Systems’s Identity Services Engine</a> does just that.</p> <p>Here’s how businesses can efficiently and effectively implement the solution <strong>across wired networks, wireless networks </strong><strong>and</strong><strong> VPNs</strong>.</p> <h2 id="toc_0">Understand What ISE Can (and Can’t) Do</h2> <p>ISE is powerful, but it’s not magic. Businesses must <strong>understand its capabilities before they make the financial and time commitment</strong> to deploy the product. For example, ISE is able to probe systems across the network and identify those that respond to its polling requests, but it does not monitor network traffic for signs of activity.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <h2 id="toc_1">Tap User Authentication for Added Value</h2> <p>ISE can be used to authenticate either devices or users. Many organizations benefit from integrating ISE with other components of their security infrastructure, such as <a href="" target="_blank">Cisco Stealthwatch </a>and <a href="" target="_blank">Firepower</a>. Those integrations are much more powerful when they have access to user data, so pursue user authentication whenever possible.</p> <h2 id="toc_2">Check Network Device Compatibility Far in Advance</h2> <p>Older network equipment may not be compatible with ISE. <strong>Perform hardware compatibility checks</strong> early in the process to identify switches that require firmware upgrades or hardware replacement. Upgrading in advance speeds up ISE deployment, especially in environments where it’s difficult to schedule downtime.</p> <h2 id="toc_3">Tune Alarms to Lower the False-Positive Rate</h2> <p>Out of the box, ISE alerts you to almost every event that takes place, and that’s simply too much information for most security teams. Make sure <strong>only the most important incidents cause alerts</strong>: CPU usage spikes, increases in authentication latency, failed backups, certificate expiration warnings and loss of contact with Active Directory domain controllers.</p> </div> <div> <div class="field-author"><a href="/taxonomy/term/12031" hreflang="en">Paul Haferman</a></div> </div> Thu, 31 Jan 2019 17:25:41 +0000 juliet.vanwagenen_22746 43176 at Edge Computing and IoT Go Hand in Hand <span>Edge Computing and IoT Go Hand in Hand</span> <span><span lang="" about="/dashboard/julietvanwagenen22746" typeof="schema:Person" property="schema:name" datatype="" content="juliet.vanwagenen_22746">juliet.vanwage…</span></span> <span>Wed, 01/30/2019 - 10:14</span> <div><p>The Internet of Things is coming to businesses everywhere and revolutionizing everything from manufacturing to retail.</p> <p>But IoT devices have a huge impact on networks and will require new network infrastructures and devices to make them effective. Enter edge computing, <a href="" target="_blank">which IDC describes</a> as a “mesh network of micro data centers that process or store critical data locally and push all received data to a central data center or cloud storage repository, in a footprint of less than <strong>100 square feet</strong>.” </p> <p>This type of computing can breathe new life into IoT and analytics, offering all industries an opportunity to tap artificial intelligence and machine learning capabilities in real time to improve operations.</p> <p><em><a href=""><strong>MORE FROM BIZTECH: </strong>See how companies have tapped IoT to boost quality and cut costs.</a></em></p> <h2>What Is Edge Computing?</h2> <p>So, what is edge computing exactly?</p> <p><a href="" target="_blank">According to Microsoft</a>, in edge computing, compute resources are “placed closer to information-generation sources to reduce network latency and bandwidth usage generally associated with cloud computing.” This helps to ensure continuity of services and operations even if cloud connections aren’t steady.</p> <p>This moving of compute and storage to the “edge” of the network, away from the data center and closer to the user, cuts down the amount of time it takes to exchange messages compared with traditional centralized cloud computing. Moreover,<a href="" target="_blank"> according to research by IEEE</a>, it can help to <strong>balance network traffic</strong>, extend the life of IoT devices and, ultimately, reduce “response times for real-time IoT applications.”</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <h2>Edge Computing vs. Fog Computing</h2> <p>Edge computing is often mentioned in the same breath as “fog computing,” an architecture framework that determines how edge computing works. <a href="" target="_blank">According to Cisco</a>, which coined the term, fog computing allows businesses to<strong> bring cloud computing processes to the edge</strong>: “It facilitates the operation of compute, storage and networking services between end devices and cloud computing data centers.”</p> <p>Essentially, fog computing helps to enable “<strong>repeatable structure in the edge computing concept</strong>,” which allows enterprises to scale performance accordingly by moving compute away from centralized locations or clouds.</p> <h2>The Potential for Edge Computing and IoT</h2> <p>IoT has already seen benefits from traditional cloud; namely, in that <strong>cloud can offer high computational capacity and vast amounts of storage</strong>. But edge computing takes these benefits one step further, by improving <strong>data transmission, storage </strong><strong>and</strong><strong> computation</strong>.</p> <p>“IoT requires fast response rather than high computational capacity and large storage,” IEEE researchers note. “Edge computing offers a tolerable computational capacity, enough storage space, and fast response time to satisfy IoT application requirements.”</p> <p>Edge computing, in turn, helps to:</p> <ul><li>Cut latency by bringing storage and compute closer to the user</li> <li>Optimize bandwidth by controlling traffic flow</li> <li>Preserve the energy capabilities of IoT devices by incorporating “a flexible task offloading scheme which considers the power resources of each device”</li> <li>Reduce network overhead by aggregating and preprocessing “trivial packets”</li> </ul><p>There’s still much to be explored, however, and interest in improving how businesses can tap the technology is growing.<a href="" target="_blank"> Hewlett-Packard Enterprise</a> recently<a href="" target="_blank"> announced the opening of a new innovation lab</a> aimed at making the most of edge data for enterprises. And last June,<a href="" target="_blank"> Google</a> released its <a href="" target="_blank">Cloud IoT Edge</a> platform, which “extends<a href="" target="_blank"> Google Cloud</a>’s data processing and machine learning to edge devices,”<a href="" target="_blank"> according to Forbes</a>.</p> <h2>Challenges in Embracing an Edge Computing Architecture</h2> <p>Organizations that embrace an edge computing architecture still have many challenges to overcome, however. Security is one, as IoT devices on a network likely come from various vendors, “making it difficult to deploy similar security schemes to ensure the same level of security.”</p> <p>Businesses can take steps to safeguard devices against these security issues by practicing IoT security hygiene. Some <a href="">IoT security best practices include</a>:</p> <ul><li>Building security practices and tools into IoT deployments from the beginning, which includes budgeting for IoT security</li> <li>Testing devices rigorously, both prior to deployment and with ongoing security tests</li> <li>Protecting data during transit, when it’s most vulnerable</li> <li>Managing security directly within the IT team by pushing out updates and patches remotely, as opposed to expecting end users to take charge</li> </ul><p>Moreover, managing the number of IoT-connected devices — from phones to cars — also proves a challenge.</p> <p>“Considering the hundreds of the applications and <strong>millions of end users and devices</strong>, the management of edge computing for IoT will be exceptionally complicated,” IEEE researchers note.</p> <p>A possible solution, according to the researchers, is to<a href=""> implement software-defined networking</a>, which can help to <strong>effectively manage complexity</strong> while also cutting administration costs.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> <div class="sidebar_wide"> <h3>What Is Multiaccess Edge Computing?</h3> <p>Multiaccess edge computing (MEC), formerly known as mobile edge computing, is similar to edge computing in that it enables cloud computing capabilities at the network edge for a cellular network. The technology “promises to usher in an era of scalable and open programmability at the edge,” <a href="">according to a recent white paper by Intel</a>.</p> <p>While MEC is mainly at play for telecommunications networks, it’s also important for businesses to understand how MEC will grow with the advent of 5G networking, which is ideal for IoT devices. The number of connected devices will inevitably grow as these next-generation networks arrive; this, in turn, will spur the need for MEC to help manage networking demands in an environment heavily populated by connected devices, <a href="">according to a recent study</a>.</p> </div> </div> <div> <div class="field-author"><a href="/author/juliet-van-wagenen" hreflang="en">Juliet Van Wagenen</a></div> </div> Wed, 30 Jan 2019 15:14:27 +0000 juliet.vanwagenen_22746 43171 at