Friday, September 22, 2017

Backup Disaster Recovery Solutions for Smart Cities


Roughly 2.3 billion connected devices exist in smart cities like Tokyo, London, and New York, a whopping 42 percent increase from last year. Therefore, disaster recovery solutions are critical. For bolstering economic growth and enhancing the quality of life, companies must have a viable IT disaster recovery plan in place.

The Internet of Things (IoT) reduces energy consumption for things like water flow regulation and street light operation. However, top disaster recovery service providers predict this footprint will exceed 50 billion connected devices by 2020, creating a tremendous challenge. It is imperative that smart cities have an IT disaster recovery plan as protection against natural and man-made incidents that would make it difficult to use accurate data required to function optimally.

In addition to the risk of being on grids for outages, smart cities get targeted for cyber-attacks. To prevent multiple city services from shutting down from a single-entry point, an all-too-real possibility that would threaten the safety and health of the public, Cloud disaster recovery becomes vital.

Along with 162,000 square feet of colocation space at a dedicated Continuity Recovery site, Telehouse New York Teleport boasts ample offices to accommodate personnel should an adverse event occur.

Friday, September 1, 2017

ALGORITHMS: SCARY SMART AND SOMETIMES JUST PLAIN SCARY

Algorithms, complex mathematical equations designed to solve problems or perform a task, automate much of the technology that makes smart cities smart, from intelligent public transportation and traffic management to smart electrical grids and water usage. Algorithms are also a fundamental tool in transforming Big Data, first into useful analytics, and eventually into action. More on that later.


Data centers and colocation facilities, the pillars of smart cities, are replete with examples of the use of algorithms. Data Center Infrastructure Management (DCIM) tools predict cooling issues based on algorithms built from temperature pattern models. There are load balancing algorithms, which play an important role in distributing network or application traffic across servers, thereby dynamically improving the efficiency of computing resources. And there are smart storage algorithms, which process requests for video and other rich media, and hold the promise of reducing energy use for enterprise-level storage area networks by 20 to 50 percent.

The world’s first and eponymously-titled Euclidean algorithm came to us in 300 B.C. and is still used by computers today. In fact, without algorithms, there would be no computer operating systems, no World Wide Web, and no Google with which to Google “algorithms,” much less the name of that actress who starred in that movie with that guy.

Okay, so now we have your attention.

Getting Too Personal

Today, algorithms are increasingly affecting our personal and professional lives in ways that we can’t imagine or might even find unsettling. Consider the algorithm created by the analytics team at the U.S. retailer Target, which could calculate whether a woman is pregnant and even when she is due to give birth.

In a nutshell, Target, like every retailer, stores a history of every item their customers have bought and any demographic information the company has collected from them. Target analyzed this information against historical buying data for all the women who had ever signed up for its baby registries. The analytics team then created an algorithm that identified 25 products — from unscented lotion to supplements such as calcium and zinc to oversized purses large enough to double as a diaper bag — which, when collectively analyzed, assigned each shopper a “pregnancy prediction” score. More importantly, for direct marketing purposes, its algorithm also estimated a woman’s due date, so that Target could send coupons to customers’ homes timed to specific stages of pregnancy.

And what could be the harm in that? Pregnancy, birth, an impending bundle of joy? Well, some women, families, and especially, teenagers, preferred that their pregnancies remained private. But Target’s predictive algorithm-based marketing hadn’t factored that very human element into their campaign, and trouble ensued.

Every Digital Breath You Take

And then of course there is the U.S. National Security Agency’s XKeyscore program, which was one of the covert projects revealed by Edward Snowden. You may never have heard of XKeyscore, but it definitely has heard of you.

XKeyscore collects every digital breath you’ve ever taken on the Internet, including browsing history, Google searches, the content of your emails and online chats, and at the tap of the keyboard, can process that data through an algorithm to identify potentially subversive activity. The NSA’s own training materials identified XKeyscore as its “widest reaching” system for developing intelligence from the Internet.  Click here to visit original source....

Contact Details:
Telehouse America
7 Teleport Drive,
Staten Island,
New York, USA 10311
Phone No: 718–355–2500
Email: gregory.grant@telehouse.com