Superb Internet Facebook Superb Internet Twitter Superb Internet Google Plus Superb Internet printerest Subscribe to Superb Internet's blog RSS feed

Anthem on the Ropes and Seven More Protection Tactics

  • Security


To read Part 1, “Anthem Grossly Negligent: 79 Million Unencrypted Records Stolen”, click HERE.

Step #2 – Use Two-Factor Authentication (2FA)

Most of the major sites – such as Google, Facebook, and Amazon – have 2FA as an optional feature. If you take a couple minutes to activate it in your settings, logging in will get slightly more complicated – which is a good thing.

Example: When you use Google’s version of this technology, you enter your username and password like normal and then enter the dedicated Authenticator app through your phone (regardless of the device you use to enter your username and password). “It’s easy, and worth the peace of mind,” advises Blue.

Step #3 – Consider Your Other Accounts

The email address listed within the Anthem network is now compromised.

Switch your Anthem password to something different, preferably using a random password generator.

You may know that it is important to diversify your passwords and thereby better divide your attack surface. On the other hand, if your Anthem password is also used with other accounts, change those ones as well.

Beyond looking at places where you reused the password, you also want to look at any accounts identified with the same email address. For those accounts, you want a new password; you also want a new email address if it serves as a username.

The problem with complex, individualized passwords is that they are difficult to remember. To simplify the use of dozens of unwieldy passwords, Blue recommends Blur and 1Password.

Acknowledging that the process of changing everything is tedious and time-consuming, she urges irritated customers to direct their frustration at the insurance carrier.

Step #4 – Contact Your Credit Cards

Although the insurer announced that payment data was not exposed, the attackers can destroy your credit and slam your card with fraudulent purchases.

Call the financial institution behind each of your charge accounts and let them know that your personal information was hacked.

“Your credit card’s customer assistance may be idiots in their response to you,” Blue warns, “but you need to get your warning on the record in case anything comes up later.”

Once you have reported the problem, you want to sign up to receive alerts when uncharacteristic charges post.

Maybe twice a week, log into your account to verify that your identity is not being misused.

Step #5 – Avoid Phishing Victimization

It is commonplace for confidential data to be incorporated into sophisticated phishing campaigns. The Symantec Phish-or-No-Phish Challenge, a web marketing award winner, is a quick and interactive way to learn more about this persistent threat. Microsoft also offers a step-by-step protection guide.

Be on the lookout for illegitimate notifications to reset your password or otherwise provide additional credentials to phishers. Ironically, those who know about the hack could be more vulnerable because they are expecting an email from Anthem about the incident. Don’t click any links or give any information. Call Anthem or the relevant organization if you have any doubts.

Step #6 – Thwart the Bypass

The Anthem password change system requires you to enter a member number or email address.

Keep in mind that a cybercriminal particularly wants access to your email. Why? That way they can conceal any real fraud-alert messages. To do so, they simply create a filter so that the alerts are removed from your inbox and show up elsewhere instead. Keep an eye on your trash, spam, and sent folders. If you log into your account one day and everything is missing from your spam box, that’s a good sign that a hacker is destroying evidence. “Change your email password immediately (on the spot),” Blue recommends, “and go into lockdown mode on all of your critical accounts.”

Step #7 – Keep Reset Locations Readily Available

If you ever have personal information stolen, you want to go to all of your major accounts, change passwords, and take a look at the preferences to see if anything has been manipulated.

Are you locked out of any accounts? In that case, you need recovery. Typically a specific process has been developed that allows users whose identities have been stolen to regain control.

PayPal and EBay aren’t known for outstanding support. Nonetheless, you may need to speak directly with a service if you experience a lockout:

  • Google – Recover your account here.
  • PayPal – Call 888-221-1161 from the United States or 402-935-2050 from other locations.
  • EBay – Call 866-961-9253 and respond to the voice prompts with “Account” and “Someone has used my account.”
  • Amazon – Sign in and visit “Contact Us” within the help section.
  • Apple – Change your password here.
  • Facebook – Follow the steps here.
  • Twitter – Follow these instructions.

“Whatever you do, don’t feel overwhelmed or get upset,” Blue cautions. “Be methodical.”

Step #8 – Use a VPN

Beyond the advice offered by Blue, it’s also a good idea to set up a virtual private network (VPN) so that all your Internet use is encrypted. You can actually use a cloud virtual machine for that purpose. Here are a few comments from our many satisfied customers.

By Kent Roberts

Free use image via Wikipedia

Anthem Grossly Negligent: 79 Million Unencrypted Records Stolen

  • Cloud
  • Security

Anthem Blue Cross, Denver

  • Local Grandmother at Risk
  • They Took Everybody’s Digits, But No Risqué Selfies
  • Anthem: Sorry, Protecting Your Data is aHassle
  • Eight Steps You Can Take Since Anthem Can’t Be Trusted
  • Security That Isn’t Pathetic

Local Grandmother at Risk

Hacks are never good news for the individual. Clearly those of us who are spending a lot of time online can be concerned about loss of our passwords, but what’s really critical isn’t the key but what’s inside – all that PII (personally identifiable information). Obviously we’re more at risk if we have our data stored in more online locations, but our information is in the computer networks of the government and our service providers regardless.

Let’s say, for example, that you are a 79-year-old woman who has never set up a web account, preferring to stay up all night quilting, listening to Amos ‘n’ Andy, and making your way through a never-ending supply of groceries that you purchased in 1979. However, you have a Medicare supplemental policy from Anthem.

You are on the grid, and you have just been hacked. Coincidentally, given your age and the sell-by date on all the food you eat, you are actually among 79 million violated users.

They Took Everybody’s Digits, But No Risqué Selfies

According to nonprofit consumer information site Consumerist, Anthem was hammered late February 4 by a breach in which hackers absconded with 100% of their user data: “The purloined personal information includes names, dates of birth, social security numbers, street addresses, e-mail addresses, employment information, and income data.”

The theft doesn’t just impact Anthem customers but its employees as well. Even non-customers had their data stolen in some cases – basically all the accounts and personal data the insurer had on file.

Sadly, it was all just a bunch of boring numbers and words, not one nude celebrity photo.

What else wasn’t taken in the hack?

  • Medical Records
  • Payment Data
  • Recipes for Chicken Pot Pie
  • Videos of cats riding skateboards and wearing sunglasses.

Anthem is the #2 health insurance provider in the United States: 38 million people are covered under its policies, many of them on the Blue Cross Blue Shield label (a brand controlled by the company in 14 states).

Many companies have been embarrassed in recent years when outside parties announced infiltrations publicly, with no prior knowledge by the corporation. Anthem noticed this breach, subsequently contacting the FBI and hiring an outside security firm to assess the damage.

The information that was taken belonged to approximately 65 million clients and employees, essentially everyone who was in their system from 2004 forward. Some information belonged to Blue Cross Blue Shield customers from other states who had used the Anthem network.

Disturbingly, there was also a bunch of random data in there from 14 million people, non-customer data that perhaps had been shared with the insurer. Who are those individuals? Who knows? Anthem doesn’t, at least not as of February 28.

Anthem, caught with its pants down, is offering us roses: two free years of an identity-monitoring plan.

Anthem: Sorry, Protecting Your Data is a Hassle

Hopefully Anthem gets body slammed by federal investigators and lawsuits. Certainly, they did not bother to encrypt their data because that’s a hassle. Translation: Anthem is too busy making money to be bothered with the superfluous concern of security. That news makes it clear that the insurer was grossly negligent and should not have been entrusted with anyone’s information in the first place.

A kind lady who cares about you and your children on behalf of Anthem told the Wall Street Journal that actually the company was incredibly responsible. When your data is stored with them, it isn’t encrypted, sure. However, when they move it around, it is. When the information is at rest, the insurance carrier uses “other measures, including elevated user credentials, to limit access to the data when it is residing in a database.”

That’s comforting. In other words, they have an SSL certificate for their site so data isn’t stolen when it moves around. SSL certificates can be self-signed – a.k.a. free – or purchased for about $9, so the company is sparing no expense. Those other measures mentioned above are critical, too – sounds like two-factor authentication, which many Joe Schmoe’s have on their Facebook accounts.

Eight Steps You Can Take Since Anthem Can’t Be Trusted

Here are a few quick steps you can take, as suggested by Violet Blue of ZDNet:

Step #1 – Credit bureau security freezes & fraud alerts

Note that there are two steps you can take with the credit bureaus – the freeze and the alert. A freeze costs money with each bureau both to freeze and unfreeze your account.

Freeze Links:

Alert Links:

Security That Isn’t Pathetic

Like Anthem, cloud providers often have terrible security. We don’t. Our three datacenters are audited to meet the strict standards of the American Institute of CPAs, through its SSAE 16, Type II standard. Try cloud minus the confusion.

By Kent Roberts

Free Use image via Wikipedia

Cloud Report: Business & Central IT Engage in Legendary Smackdown

  • Cloud
  • General

Cloud Devices

Every year, the RightScale State of the Cloud Survey looks at how the cloud industry is developing worldwide. The 2015 edition was released on February 18. We previously reviewed the analysis of Joe McKendrick of Forbes, who commented that tension was growing between IT leadership and business leadership regarding who should control cloud decisions (and this article overlaps in places with that one).

Today we look directly at the survey data, as described by RightScale VP of Marketing Kim Weins.

Weins noted that the survey was particularly centered on infrastructure-as-a-service (IaaS). More than 900 respondents, all of them IT executives, answered questions related to their company’s use of cloud. The margin of error for the survey, which was intended to gauge the general perspective by including employees of small and large firms from various sectors, is just 3%.

Weins described the poll’s findings as follows:

Hybrid Continues to Become the Dominant Model

More and more, companies are moving to multi-cloud systems – 82%, up from 74% last year.  Of that 82%, the types of clouds being built are:

  • 55% hybrid (public + private)
  • 13% public only
  • 14% private only

Popularity Versus Actual Work

General market penetration looks great for cloud service providers (CSP’s) too: 93% of those surveyed said that their company has deployed or will deploy some type of cloud solution.

If the cloud is a popularity contest, public cloud is a big winner. If it is measured in the true amount of work performed, private is now in the lead. Use among respondents is as follows:

  • Public cloud – 88%
  • Private cloud – 63%
  • Both types – 58%

While public is popular, private performs more workloads. Number of individuals polled who said their company has more than 1000 virtual machines (VM’s) in the two types of clouds are:

  • 13% public
  • 22% private

Weins seemed skeptical about those figures, though: “The private cloud lead in workloads may represent existing virtualized environments that have been enhanced and relabeled as a private cloud.”

Although private is ostensibly leading in terms of workloads, businesses are developing their public infrastructures. By early 2016, the proportion of respondents who think that their company will have more than 1000 public machines is more than twice the current figure: 27%. In other words, by 12 months from now, we may see firms balancing the work more evenly between public and private environments.

Room for Expansion

Use of the cloud is skyrocketing, but the transition from legacy systems will take time. More than two-thirds of companies (68%) use cloud to perform under 20% of their loads. In more than half of cases (55%), though, enterprises said that an additional 20% of their apps were cloud-ready.

Central IT to Serve as Broker

Early adopters of public cloud were typically tech SMB’s and development-focused divisions of large companies. Now, as firms have developed a better understanding of cloud, central IT is maneuvering to have stricter control over how cloud is used. Three in five (62%) of those polled said that central IT was in charge of most cloud buying.

The 2014 State of the Cloud exhibited that business executives and central IT personnel disagreed over the extent to which central IT should filter choices. Although the business and central IT teams have on their professional wrestling outfits and are ready for a legendary smackdown, two in five (40%) business executives said it would make sense for central IT to broker cloud; that’s over twice the 18% of business leaders who said that was reasonable last year.

DevOps Ascending

DevOps has thrived in the cloud since the technology started become more prominent in 2006. “For many companies,” Weins summarized, “the use of cloud infrastructure is a critical pillar to support the continuous integration and delivery cycles and release cycles that DevOps helps to drive.”

This year’s report demonstrated that cloud is increasingly being used for DevOps: 66% of enterprises are now using it for that purpose, versus 62% last year.

Private Cloud Not Quite as Hot

Private cloud appears to be relatively static versus last year, although very slight increases were reflected.

VMware is still the top dog in this arena: 33% of executives said their private cloud was built on vSphere, while another 13% said they used vCloud Director as their foundation. OpenStack is also a top competitor, with 13% of organizations actively using it and another 30% considering it. The first release of Azure Pack allowed Microsoft to secure the private clouds of 7% of companies.

Takeaway: Central IT Brokers Cloud as it Becomes More Prominent

This year’s State of the Cloud reveals that more companies are testing and deploying cloud environments, with the majority of businesses using more than one provider in a hybrid blend of public and private machines. In that climate, central IT is making itself available to suggest ideal solutions and simultaneously keep the infrastructure as cost-effective as possible. “This shift of cloud adoption from shadow IT to a strategic imperative,” Weins concluded, “is a critical step in the move to a cloud-centric future.”

Part of the reason central IT is taking command is that companies are realizing not every cloud is built the same. “I love the support!” our client Louis Gualtieri, Jr., said of us. Learn more now.

By Kent Roberts

How Cloud Computing Could Rip You Apart at the Seams

  • Business Talk
  • Cloud
  • General

Business vs. IT

Computer dude: Allow me to show you the way to the cloud.

Company dude: Nay, we are already there.

Computer dude: Them’s fightin’ words.

Computer dudette: Hey, settle down, everyone.

A just-released poll of more than 900 decision-makers reveals that department heads are shifting toward cloud even when the IT staff is not completely sold on the idea. The researchers who prepared the whitepaper believe that the boiling, no-holds-barred hate-war brewing between the IT department and general leadership is “likely rooted in the business units’ desire for more agility and their concerns that central IT is too cautious in cloud adoption — especially public cloud adoption.”

Nonetheless, the report, called the 2015 RightScale State of the Cloud Survey, also indicates that IT directors are beginning to accept cloud and better grasp the security landscape. Joe McKendrick of Forbes argues that the increasing comfort level among IT executives could motivate them to become experts at cloud development, transitioning from a direct machine-oriented role to that of a consultant. That’s how IT leaders see the situation evolving, says McKendrick.

Let’s look at McKendrick’s full analysis of the survey.

Who Should Make Cloud Decisions?

More and more, the IT leadership has been campaigning for the authority to go out and find the most technologically reliable and economical cloud service providers. Businesses are generally garnering a stronger understanding of cloud, according to the poll.

Fewer technologists are on soapboxes, stark naked, yelling that cloud is the end of the world, with all our data just as exposed as they are: between 2014 and 2015, the percentage of respondents who said that security is a major difficulty dropped from 47 to 41%. Because of that decline, central IT “has increased its focus on public cloud,” McKendrick explains, “with 28 percent of central IT respondents reporting public cloud as the top priority in 2015 up from 18 percent in 2014.”

Now, 3 out of 5 (62% of) decision-makers said that most cloud strategy comes out of central IT. That strategy is now being built into enterprise systems: 2 out of 5 (43% of) IT departments have created environments for general company executives to go in and pick out the cloud plans that they need; an additional 2 out of 5 (41%) are either preparing or currently testing an environment of that type.

Many decision-makers from the business side, though, are throwing Molotov cocktails at their IT departments, wanting IT to accept a simplified role. 59% of IT heads believe public cloud projects are their responsibility, while only 34% of general executives see it that way.

The numbers for other aspects of cloud, which are similar, include the following:

  • Private cloud – 57% IT, 35% general
  • All types of cloud – 55% IT, 39% general
  • Application cloudification (determining what applications are best suited to cloud) – 56% IT, 44% general

Shadow IT of Coud

Easy accessibility of cloud solutions for a wide variety of situations has resulted in a shadow IT that has become more prominent over time, McKendrick argues. Generally executives want to grab something and get started, so they run toward the promised land, throwing grenades at the IT staffers to distract them. Eventually, though, once the dust has settled and IT staffers have prevailed (as they always do), the hybrid cloud era will emerge. Then, McKendrick explains, “IT will play a role as advisor and broker for the business, identifying and procuring needed resources, whether they come from cloud services or enterprises’ own data centers.”

The press and the business world are obsessed with cloud because it has grown so rapidly as an infrastructural preference. However, cloud has only begun to ascend to its ultimate dominion over humankind, acting on behalf of the dolphins. Here are stats on cloud-readiness and hybrid:

  • 55% say a sizable number of their applications are run on traditional systems but are cloud-ready.
  • 93% are trying out the infrastructure-as-a-service (IaaS) model, as provided by virtual machines from hosting services.
  • 82% of respondents are planning to implement a hybrid system (rising from 74% in 2014).

Public cloud systems have been more popular, but private clouds are processing the most data. As a simple indication of that, look at the number of large companies with more than a thousand virtual machines (VMs) of either type:

  • Public – 13%
  • Private – 22%

When respondents were asked if they would have a thousand VMs in place a year from now, champagnes broke out in cloud-land:

  • Public – 27%
  • Private – 31%

A year from today, says McKendrick, large companies will distribute their computing needs “more equally between public clouds and private clouds, while non-cloud virtualized environments remain relatively static.”

While cloud-land rejoices, company dudes and computer dudes and C-level dudettes can sit down, dry their eyes, treat their wounds, sign peace treaties, and talk about synergistic solutions to benefit from the evolution of the IT landscape.

By Kent Roberts

Creepy Man Invents Internet-Of-Things Device to Lure Women into Bed

  • General

  • A Strange Man in a Family Environment
  • The Science of Mood Lighting
  • How to Manipulate Women with Machines
  • Today’s Lightbulb, Same Old Creepiness
  • You Don’t Have to Creep in the Cloud

A Strange Man in a Family Environment

Some men were born to be creepy. One of them was Roger Kay of Forbes.

When Kay was just 24 years old, he purchased a house. It was a financially savvy thing to do: a professor from the University of Chicago, Jim Lorie, recommended buying a house as quickly as possible because the real-estate market was so incredible. Kay greatly respected Lorie, so when he got out of college in 1977, he bought the house, which was located outside of Boston.

Kay hadn’t done too much research on the area, though. He was distraught to learn that he would be living in a wholesome environment, surrounded by families and without any women his age.

Soon after Kay moved into his new home, the Great Blizzard of 1978 struck Massachusetts. The inclement weather, 3 feet of snow, struck so suddenly and so violently that 3500 vehicles became stuck on Route 128. After shoveling his way out of his place, Kay first met his next door neighbor, Mike.

“He was a tinker, and one of his weird little inventions was a small box with AC in and out, two knobs, and a dial,” Kay explains. “The knobs were used to set start and end levels, and the dial set a timer.”

The entire contraption was made out of wiring, tin snips, solder, and a few used parts from Mike’s engineering job at Digital Equipment Corporation.

Kay had an idea for how the device might be used. He borrowed it from Mike and brought it back to his place so that he could use it on women when he brought them home after stuffing them full of Italian food and mediocre wine.

The Science of Mood Lighting

Scientists have ample evidence of a connection between lighting and the emotions – specifically that lighting changes the way emotions are controlled by the nervous and endocrine systems. Examined Existence mentioned one particular study that assessed the current research related to sunlight. The report, compiled by L. Edwards and P. Torcellini for the National Renewable Energy Laboratory, found that sufficient light created joy in participants, while dim light created a sense of negativity.

Now, these findings are conditional to the situation: you won’t feel joyous if you have a bright light in your face while you are trying to sleep. Nonetheless, the research demonstrates how powerful lighting can be. A comment from Examined Existence points out why the Kay project was so effective: “By integrating results from other previous research, the study suggested that different wavelengths and amount of light affect the rate of transmission of action potentials and hormone secretion.”

Hormone secretion – That’s what Kay was going for and what he hopes could be optimized by the internet of things.

How to Manipulate Women with Machines

Kay used the simple electronic device to create what he called the Seducematron. He positioned the two knobs so that the start one was at 100% and the end one was at 10%. He put approximately 45 minutes on the timer and connected the machine to his living room lamp. Now it was time to invite over a lady.

When Kay sat down with a woman on his couch, he would set the timer of the Seducematron, and it worked wonders as an assistive device for his creepiness. “The light gradually dimmed over such a long time that she didn’t actually notice the change at any given moment,” Kay recalled. “The increasingly intimate light set romance in motion.”

Kay explained that the Seducematron could certainly have been improved. It would have benefited from a capacitor to guard against voltage fluctuations. When the refrigerator would start running, the lamp would become exceptionally bright for a moment. So that nothing would ruin the mood created by Kay’s secret machine to manipulate women’s biology with a visual trick, he started unplugging the refrigerator whenever women were around.

Today’s Lightbulb, Same Old Creepiness

Because of his history playing around with lightbulbs to get into women’s pants, Kay was excited by newly released technology that integrates multicolor lightbulbs with a mobile application, through any wireless connection. Smart lighting such as this system created by Qualcomm and LIFX isn’t just good for getting play but could actually serve numerous functions, says Kay:

  • You could make motion-sensor security lights much more ominous by flashing red lights and playing a siren.
  • You could personalize lighting so that it shifts slightly to fit the needs of various individuals, adapting seamlessly when a person enters the room.
  • You could also use the system as entertainment, creating moods for different spaces during a party.

You Don’t Have to Creep in the Cloud

You may not be interested in creating a creep cloud prototype to compete with Kay’s device, but the emergent connected world offers incredible opportunities for development, investment, and entrepreneurship through the internet of things. Get behind the wheel of your own virtual machine today.

By Kent Roberts

All Your Belongings Will Be Powered By Cloud

  • Cloud
  • General
  • Technology

Cloud Devices

  • Cloud Computing as a Backbone
  • Third Platform Overview
  • Integrating All Your Stuff
  • Getting it Right the First Time

Cloud Computing as a Backbone

Technology changes rapidly, with the discussion of technological development keeping pace. Technologists are always trying to see through the façade of various emergent concepts and determine if they are legitimately revolutionary and practically applicable or not. However, writes Nathaniel Borenstein on Gigaom, it’s important to stay abreast of industry developments because the technology could point to a major transition for our businesses and lifestyles.

Borenstein considers the internet of things (IoT) to be today’s most hyped technology, with thorough and continuing press coverage. He is quick to point out that the IoT does not represent a shift away from cloud computing. In fact, this broader web that will incorporate the objects around us will be built on the third platform – which includes cloud along with social networking, mobile computing, and big data.

Cloud has become such a major infrastructural mechanism that it now serves as a backbone of the web, hosting thousands of applications that together have an enormous impact on our lives.

“It is tough to imagine our current lives without cloud computing,” Borenstein notes, “and the cloud is the technology infrastructure (along with electricity itself) that literally keeps the world working, communicating and learning – and therefore, the IoT needs the cloud to reach its full potential.”

Third Platform Overview

Before looking more thoroughly at Borenstein’s thesis, let’s briefly review the third platform, as described by Mark Neistat of US Signal Company. The third platform follows the mainframe computer and the personal computer as the most innovative standard environment in which users and service providers operate.

Mobile access is the most critical aspect of the third platform, argues Neistat, for two main reasons:

  • Users interact with social media, cloud, and data analytics via mobile.
  • Mobile computing optimizes personal choice with “bring your own device” (BYOD) programs that incorporate all brands of smart phones and tablets into a network.

You can see how all these various elements are integrated. Social networks are accelerating in response to the skyrocketing use of mobile access, and that is particularly evident outside the United States, with projected growth rates for international regions as follows:

  • Middle East/Africa – 23%
  • Asia-Pacific (China, India, etc.) – 21%
  • Central and South America – 13%
  • North America – 4%.

Third, the cloud market continues to expand globally. Everything is gradually moving from a physical to a virtual model, with spending on cloud computing expected to exceed $200 billion by 2016.

Big data is the fourth and final pillar of the third platform. This type of data is not helpful by itself because it is simply a massive amount of information collected during the course of normal business. However, big data becomes actionable through sophisticated analytics. Neistat explains, “IT professionals are crunching vast quantities of seemingly chaotic information and discovering patterns that can lead to insightful, life-saving, and profitable predictions.”

Integrating All Your Stuff

Taken individually, connected objects would be extraordinarily difficult to manage and support. Designing the internet of things must not be done as innumerable client-server connections. One device might need to communicate with 5 or 10 online applications, and each application might be trying to communicate with a million different objects at once. That’s a recipe for disaster. Keeping the software of independent objects current sounds so challenging that many people have disregarded the IoT as riddled with security holes.

How do you create consistency for the internet of things so that all users and devices are protected? The cloud can serve as central command.

Every object can have its own software-as-a-service (SaaS) portal to which it submits information and remembers the preferences of its users. Additional services can be integrated with that single point of cloud-based contact.

By moving data processing to cloud, management become simpler. The market also becomes less daunting for developers. But anyone who develops any type of service can draw on the object’s data within the cloud.

Everything can fit seamlessly, says Borenstein: “The part of a smart object that interacts with the cloud can be made extremely generic, and therefore relatively easy and inexpensive to manage.”

Getting it Right the First Time

Everyone says the IoT is on its way, but the only way security and integration will be effective is if data is centralized in a standardized model. Setting the work in the cloud will also improve performance, rather than relying on the computing power of every small connected object.

Borenstein explains that your smart objects don’t really need to be all that smart. If we connect them to centralized cloud servers, they will simply need to be able to send and receive data from the web, where any complex computing will be conducted.

Perhaps the most important gift we will receive from the third platform is a fully realized smart environment. Imagine a world in which everything around you is controlled by technology that often outpaces supercomputers. Get ready by optimizing your third-platform experience today.

By Kent Roberts