wednesday november 18 - technology first...machines and virtual networks also apply to securing...

16
Promoting Information Technology Growth network, learn, grow, connect, transfer October 2015 Edition technologyfirst.org VOLUME 13 NUMBER 10 2015 TASTE OF IT CONFERENCE How to Navigate the Shifting Storage Landscape Wednesday NOVEMBER 18

Upload: others

Post on 06-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Promoting Information Technology Growth

network, learn, grow, connect, transfer

October 2015 Edition

technologyfirst.org

VOLUME 13

NUMBER 10

2015 TASTE OF IT CONFERENCE

How to Navigate the Shifting Storage Landscape

Wednesday

NOVEMBER 18

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 1

Page 2: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

CONTENTS

22

2 Leadership 2015 Taste of IT Conference

3 2015 Taste of IT ConferenceSampling of the Taste of IT 2015Breakout Sessions

5 TechnologyCloud Security Is a SharedResponsibility

6 TechnologyHow to Navigate the ShiftingStorage Landscape

8 TechnologyEncryption as a Legal Defense

9 TechnologySurviving a Data and Systems Disaster

10 TechnologyThree Requirements Your Data CenterProvider Should Meet

12 TechnologyContent Solutions Can Manage Data

MEMBER FEATURES

13 Member Mention

14 Blogs- Query Express

15 Training

LEADERSHIP

Technology First | October 2015

By: Ann Gallaher, COO, Technology First

2015 Taste of IT Conference

• Breakfast keynote panel will feature an interactive discussion on, The Emerging

Unmanned Aerial Systems industry: Applications, Challenges, and Opportunities.

The expert panel includes; Andrew D. Shepherd, PhD, Director of Unmanned

Aerial Systems for Sinclair Community College; Frank Beafore, Executive Director

for SelectTech GeoSpatial; and Kelly Cohen, PhD, Professor of Aerospace

Engineering for the University of Cincinnati.

The panel will discuss various industries’ use of drones to improve their

efficiency. Videos promise to make this interactive and very visual.

Sponsored by:

• Luncheon keynote promises an interesting presentation by Jeff Almoney,

General Motors Corporation. His presentation titled, A Technologist at Large

will cover the new technology that is beginning to appear in the automotive

industry. Technology that will change the way we look at vehicles and will

enable autonomous vehicles. This technologist-to-technologist talk will cover

the technology requirements and opportunities generated by this enhance-

ment to our everyday lives. Jeff Almoney joined General Motors Corporation as

a Global Director, Information Systems and Services in 2006. Previously,

Mr. Almoney was the chief technology officer for Reynolds and Reynolds.

Sponsored by:

Please plan to join us for three memorable presentations on:

Wednesday, November 18, 2015

(continued on page 3)

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 2

Page 3: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Don’t be Left Behind:Embrace the Third Platform

Presented by: McGladrey

The Experience of Things Presented by: Sogeti

Calling an Audible:Managing Project Direction and Success

When Business Priorities Shift

Presented by: AfidenceIT

Cybersecurity Compliance:If it ain’t working for Anthem, Lifelock and

Neiman Marcus, what am I supposed

to do for my company?

Presented by: Taft Law

Transforming IT withHyperconvergencePresented by: SimpliVity

From the Back Room to the Board Room — Elevating Security

in the BusinessPresented by: IO

Database Services in the Cloud

Presented by: CommitDBA

Technology First | October 2015

33

2015 TASTE OF IT CONFERENCE

Sampling of the Taste of IT 2015 Breakout Sessions:

(continued from page 2)

• Final wrap up keynote titled, Monkeys, a Race Car

and a Stool — A Bad Joke or a Collaboration

Strategy? will be presented by Rob Lang, Manager

of Collaboration Architecture - US Central Area for

Cisco Systems. The presentation promises that -

As the world has moved from Centrex services, to

Private Branch Exchange (PBX) to IP Telephony,

the transitions have been primarily back office

and architectural changes. Effectively, changes for

IT. As we move to Collaboration and Corporate

Messaging solutions, the changes are more about

user experience and “how” we work in today’s fast

paced communications environment. Learn why

transforming the way we work and creating agile

teams is more business-critical than ever before!

Sponsored by:

✔✔ Three Keynotes

✔✔ 20 Breakout Presentations

✔✔ An Exciting & EntertainingExhibit Hall

…all make the day well spent at the Taste of IT 2015!Hope to see you there!

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 3

Page 4: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 201544

WEDNESDAY, NOVEMBER 18, 2015SINCLAIR COMMUNITY COLLEGE PONITZ CENTER

7:30 AM UNTIL 5:00 PM

9TH ANNUAL

Taste of ITCONFERENCE

Presentation opportunities (member pricing) are going fast… call to reserve your spot!

Contact Michelle Marek at 937.229.0054 or mmarek@technologyfi rst.org for more information

Breakfast

Sponsor

Morning Break

Sponsor

Lunch

Sponsor

Afternoon Break

Sponsor

Wrap-Up Reception

Sponsor

Charging Station

Sponsor

Title Sponsor

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 4

Page 5: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 201555

TECHNOLOGY

By: Sogeti

Cloud Security Is a Shared Responsibility

The great benefits of the Cloud are its flexibility, on-demand availability, cost effectiveness, scalability and the way it enables a more agile approach to working.When you’re considering your cloud security strategy, you need to ensure that itreflects these characteristics to be truly effective. Maintaining security in the Cloudalso necessitates a shared responsibility between Cloud Service Providers and their clients. As it’s impossible for clients to simply walk into a supplier’s data centerto implement security measures; you need to use tools such as guest operatingsystem firewalls, Virtual Network Gateway configuration, and Virtual PrivateNetworks to secure your estate. Only by working together can you ensure thatyour applications and data are protected, the required compliance regulations are met and maximum levels of business continuity are achieved. It’s essential totake each of the different aspects of Cloud deployment, physical infrastructure,network infrastructure, virtualization layer, operating system, applications and data to determine which security measures fall within the remit of the providersand which need to be dealt with directly by the client.

It’s crucial to choose a provider with a trusted Cloud infrastructure and a dynamicsecurity strategy with a combination of access controls, authentication andencryption, firewalls and logical isolation. It’s necessary to design, create andmanage your own applications and additional infrastructure in the Cloud… safewith the knowledge that they are as secure as possible from malware attacks,zero-day vulnerabilities and data breaches. It’s also highly recommended to choosea provider that undergoes regular third party audits to ensure that securitymeasures adhere to industry standard frameworks, and be innovative and find a good balance between provider and client ownership and accountability.

Microsoft’s White Paper on Azure Network Security is an interesting example of apowerful shared responsibility security strategy. Azure uses a distributed virtualfirewall for the secure, logical isolation of customer infrastructure on a publiccloud, balanced with the client deploying multiple logically isolated deploymentand virtual networks according to business requirements. Azure’s internet com-munication security is very high, disallowing any inbound traffic but allowingclient administrators to enable communication with a choice of three differenttechniques via defining input end points, delineating Azure Security Groups orthrough a public IP address. The White Paper gives full details of securing all thedifferent types of communication that you might require, including:

• Securing communications among VMs inside the private network

• Securing inbound communications from the Internet

• Securing communications across multiple subscriptions

• Securing communications to on-premises networks with Internal or Public Facing Multi-Tier

Application:Security Management and Threat Defense are also explored in detail.Administrators can create a VM using either the Azure Management Portal orWindows PowerShell, both of which have in-built security measures.The firstassigns random port numbers to reduce the chances of a password dictionary

attack and the second is needed for remote ports to be explicitly opened. Again,these strong measures can be minimized by client administrators; and Microsoftgives good advice on how this can be achieved.

Azure offers a continuous monitoring service with a distributed denial-of-service(DDoS) defense system, which is continually improved through penetration-testing. Although not mentioned in the White Paper in detail, it’s worth noting that Microsoft conducts regular penetration testing and also allows customers tocarry out their own pre-authorized penetration testing. Network Security Groupsare used to isolate VMs within a virtual network for in-depth defense and to control inbound and outbound internet traffic. Microsoft’s guidelines for VirtualMachines and Virtual Networks also apply to securing Azure Cloud Services.Therehave been further improvements to MS Azure’s Network Security since the 3rd version of the White Paper was released in February 2014. The most notableimprovements were noticed since October 2014, when MS announced the general release of Network Security Groups with easier subnet isolation in multi-tier topologies, simpler policy validation and compliance with site to site forcedtunneling and VPN support for Perfect Forward Secrecy.

Regardless of whether you decide to use Azure or not, the White Paper is worth aread as a good overview of how a strong cloud security strategy divides responsi-bility between the provider and the client.

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 5

Page 6: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 201566

TECHNOLOGY

How to Navigate the Shifting Storage Landscape

Call it the Burden of Choice.

Many companies still capture and store data on traditional spinning disk drivesin corporate data centers, but the data storage landscape is drastically changing.And while it is generally better to have options, the sheer volume of emergingsolutions has left companies confused about how to handle their individual storage needs.

The process of choosing from options like flash arrays, software-defined storage,cloud and converged/hyper-converged can be overwhelming. There is misunderstanding permeatingthe industry with most IT organizations dissatisfied with the economics of their storage.

And with the digital universe doubling in size every twoyears, according to jointresearch by IDC and EMC,companies simply cannotafford to become mired inconfusion. They must figureout the best methods for collecting and storing vastamounts of data, which IDCand EMC predict will reach 44 trillion gigabytes annually by 2020.

Making a decision about data storage is a complex process, ifdone correctly. Organizationsneed to carefully consider anumber of factors includingtheir own individual needs,industry, cost analysis and business goals. Some companies may find that a com-bination of different solutions best suits their needs.

But first, it is important to understand the intricacies of different solutions, anduse them to weigh the pros and cons of each option against business needs.

Flash-Based ArraysFlash is poised to become one of 2015’s biggest trends, with its increasing popularity due in part to a significant drop in price. Prices for flash storage,once hefty at more than $1,000 per GB, have fallen to less than $10 per GB in the past decade. Enterprise storage vendors and startups are largely responsible for this development.

The improvements they have made to the reliability and performance of flash-based arrays have lowered the effective cost per gigabyte. Dubbed “super-efficient,” flash systems that combine high-performance flash and cutting-edgedata-reduction technologies have also contributed to lower costs. The main-stream application of deduplication and compression, which is well suited forflash-based storage, will likely further reduce the cost once they deploy.

Given these developments, it is hardly surprising that the flash-based array mar-ket grew past $11 billion in 2014, according to new research from IDC. And priceis not the only benefit flash offers. The agile solution excels in environments

where performance is thedriving factor. As perform-ance demands increase,flash-based storageexhibits a very favorabletotal cost of ownership(TCO) pattern.

Companies are adopting flash left and rightbecause of benefits suchas the aforementionedcharacteristics. However,organizations must under-stand certain disadvan-tages when considering a move to an all-flash storage system. A majordrawback is the rip-and-replace nature of all-flash.In many cases, it will notwork in tandem with current data center tech-nology without specializedsoftware, meaning muchof an organization’s

current data center architecture may have to be reevaluated. This elevates cost and time investment right off the bat.

In addition, implementing flash may become even more costly for organizationsthat need synchronized replication with zero data loss. In order to prevent dataloss, they should include a virtualization appliance with an all-flash array. Itsinclusion may be necessary because enterprise data management features arestill largely immature.

The cost of flash is certainly attractive compared to traditional storage, especiallywhen paired with hyper-converged systems. Still, it is imperative for companies toevaluate their data compression abilities, as data compression is essential for flash.

(continued on page 7)

By: Kevin Keuning, Patrick Conway, and Scott Popolizio, Forsythe

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 6

Page 7: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 201577

TECHNOLOGY, CONT.

Converged and Hyper-convergedConverged storage is a familiar industry concept. Although most storage continues to be deployed “non-converged,” adoption of converged infrastructurehas been growing steadily over the past 5 years. The idea is simple: Users buypre-integrated reference architecture, which the vendor ships to them. The archi-tecture consolidates components into a highly redundant storage platform thatusers can scale out as needed. It is a solution built around capacity, performanceand optimization.

Hyper-converged has recently emerged as the logical successor of converged.It takes the concept a step further, utilizing a pre-manufactured appliance that covers the capabilities of multiple functionalities. The appliance plugs into the network and covers the user’s needs, thereby simplifying the process.It is convenient for users because they get the resources they need with fewermoving parts. This user-friendly storage method also offers the efficiency of tight integration.

However, like any other solution, hyper-converged has drawbacks. The platform’slinear scaling model presents a potential issue because scaling to hundreds orthousands of appliances has not yet been explored outside of major cloudproviders. Furthermore, the solution does not allow for customization accordingto individual needs. If a user needs additional storage but does not require addi-tional compute functionalities, it still must pay for both. To put it simply, it’s akinto buying extra shoes, but really all you needed was additional shoelaces. Costscan quickly add up if one need continuously outpaces the other.

Despite the challenges associated with converged and hyper-converged, IDCpredicts the integrated systems market will grow to $14.3 billion by 2017.Adoption rates are currently low, however, due in part to the buzz surroundingother solutions such as software defined storage.

Software-Defined StorageSoftware-defined storage is a hot topic right now because of what it promises to deliver in the future—a platform for deploying applications based onautomating the infrastructure underneath. This model implements a layer of virtual networks and policies on top of the physical network, which ultimatelyeliminates the need to configure hardware. The ease of use makes this methodattractive to users; overlay solutions typically come prepackaged, with much of the required programming already configured in the controller.

Companies choose a software-defined approach when they wish to accomplishsome or all of the following goals: building a storage solution at a low pricepoint, establishing a solution specifically geared toward virtualized workloadsand making their infrastructure programmable.

The last reason is a critical differentiator. Companies that are not prepared for aprogrammable infrastructure should take heed, as they are most likely not yetready for a software-defined storage solution.

In a 2014 report, Gartner estimated there were only between 500 and 1,000mainstream deployments of SDN globally. But interest in software defined networking is heating up. In a separate statement that same year, DavidCappuccio, research vice-president at Gartner, proclaimed software defined as

a top trend in the near future. It has already demonstrated strong potential tobecome an essential component of future cloud-enabled, orchestrated data centers. Still, organizations are wise to take a wait-and-see approach, as software-defined networking standards, architectures and solutions continue to mature.It is best to track developments and products before taking the leap.

Cloud ServicesCloud is perhaps the most well-known modern storage solution. In fact, public IT cloud spending is on track to exceed $127 billion in 2018, according to a 2014 forecast from IDC.

Users find the cloud appealing for two main reasons. First, the cloud helps themcircumvent short-term costs. Secondly, and perhaps most important given themassive amounts of data companies collect in the digital era, it offers the ability toadd data continuously without worrying about a cap, because space is unlimited.

Organizations typically use the cloud for one of three purposes, with backing up data to the cloud as perhaps the most common reason. While users shouldremain wary of migrating sensitive data, private clouds are easing some of theconcern. It is also widely used for archiving data; this is particularly valuable in industries like healthcare where practices and hospitals must save certaininformation for legal and regulatory compliance. File sharing is the third popularuse for the cloud. Google spreadsheets and programs like Dropbox have gainedpopularity in the past few years.

While companies are adopting the cloud at a rapid pace, the vast majority shyaway from an all-cloud model. Instead, they opt for hybrid cloud—a blend of on-premises, private cloud and public cloud services with orchestration betweenthe two platforms. Businesses like hybrid-cloud models because it offers flexibility by allowing workloads to move between private and public clouds as computing needs and costs change.

Finding the Right FitWith all of the storage solutions available, it is wise for enterprises to make adecision based on their own needs. Leaders should focus on which model, orpairing of models, would best suit their organization and drive business—ratherthan simply reviewing their capabilities at face value. The process may provelengthy and complex, but the investment will pay off in the long run.

The future of data storage will likely follow a version of what Gartner termed “bi-modal IT” in a 2014 presentation. According to slides from the presentation,Bi-Modal IT: Managing the Dichotomy in the Data Center,“By 2017, 75 percent of IT organizations will have a bi-modal capability.”This bi-modal approach provides greater agility and enhanced flexibility, and allows for continuousgrowth to maximize long-term value.

Regardless of emerging and future solutions, challenges will always accompanytransformational shifts in data storage. But with an accurate roadmap and theright gear, organizations can navigate even the rockiest terrain.

For more information visit www.forsythe.com.

(continued from page 6)

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 7

Page 8: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

We strongly encourage companies possessing or transmitting personally identifi-able information (PII), protected health information (PHI), financial or other sensi-tive data, including trade secrets, to use encryption. Why? Because, if employedproperly, it is both effective and legally defensible.

So What is Encryption?Encryption is a type of information security. It involves the coding and decodingof messages in order to protect private content from third parties. In its earliestform, encryption was essentially letter substitution (e.g., substituting the letter “a”

for the letter “p” in a message). Today, encryption ismuch more complex than that. It usually involves thedevelopment of a shared secret key, the application ofan encryption algorithm to your data to create aciphertext, and, in many cases, the use of what is calleda nonce (or “IV”), which is introduced into the data exchange to prevent repetitive sequences in the encrypted text (since such repetitions could allow the encryption to be broken).

The two basic forms of encryption are stream ciphers and block ciphers. Streamciphers employ a single use key. The historical “one time pad” and once-trustyRC4 are examples of stream ciphers. This type of encryption is generally used forthings like email, since the cipher can only be securely used one time. Blockciphers, in contrast, employ many use keys. Two of the most common blockciphers used today are 3DES and AES, both of which are approved by NIST. Blockciphers are used for things like SSL (i.e., Internet packet encryption), since thecipher is created through an iterative process that allows the shared key to beused securely multiple times.

That’s the encryption short tour.

Why should you use it?You should use encryption because it gives you legal protection. Few lawsspecifically require encryption. HIPAA generally doesn’t. State statutes don’t.Nor does the Gramm Leach Bliley Act’s Safeguard’s Rule. Yet if you are notencrypting PII, PHI, or financial data, you are putting yourself at risk. Those lawsexpect you to take reasonable precautions. And using encryption, and using itproperly, is a reasonable precaution when it comes to dealing with sensitivedata. HIPAA, for example, provides that encryption should be used where “theentity has determined that the specification is a reasonable and appropriatesafeguard in its risk management of the confidentiality, integrity and availability”of the information or else implement an “equivalent alternative measure if rea-sonable and appropriate,” and document why encryption wasn’t the best choice.

Encryption also helps to avoid costly breaches. The HIPAA breach notificationrule is only triggered if the PHI is “unsecured.” So if the data has been made“unusable, unreadable, or indecipherable to unauthorized individuals” —say,through encryption—then there is no reportable breach. And almost every state and territory breach notification statute follows this same approach. Thethinking is that, since the data is encrypted, it is not feasible for someone tobreak the encryption to get to the underlying information, so the information isnever really exposed. If, however, the incident involves a person with access tothe encryption key and the individual or entity reasonably believes that suchbreach has caused or will cause identity theft or other fraud, then, under moststatutes, there will be a breach, and notification will still be required.

The bottom line is that if you’re a company that handles sensitive data”—including PII, PHI, financial data, trade secrets, etc.— you will want to use encryption as one line of your layered defense against cyberattacks, theft,and other information disclosure risks.

Technology First | October 201588

TECHNOLOGY

Putting technology into practice,itís what our consultants do...

7 practices, 1 partner: SogetiWith experts in Advisory Services, Application Development, BIM, Infrastructure, Mobile, Product Engineering and Testing, our Local TouchóGlobal Reach approach to consulting means you have access to local experts and a global team.

us.sogeti.com

Encryption as a Legal DefenseBy: Matthew D. Lawless

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 8

Page 9: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 201599

TECHNOLOGY

By: Caleb Compston, US Signal

Surviving a Data and Systems DisasterEvery company knows it needs data and systems backup and recovery, yet it isoften put on the backburner. Did you know that 60% of companies that losetheir data shut down within 6 months?

Can your organization successfully recover its data and systems in the event of a true disaster?

First a little history.

Current State of BackupsOut of 1,200 companies surveyed by Federal Emergency Management Agency(FEMA) and other sponsors, 67% reported only some success in achieving back-up goals, and 33% reported major fails. Companies failing to recover data oftenclose their doors within a year of the disaster.

The survey also found that 11% of the surveyed companies routinely missedtheir backup windows. Missing a backup window means not all of your criticalinformation is getting to where it needs it to go. Additionally, 22% of those com-panies were backing up inactive data that should have actually been destroyedor archived.

Of the successes, 39% completed successful recoveries, but not in the timeframeof their disaster recovery plans. Some companies went as far as two monthsbeyond scheduled recovery points. Only 28% out of the 1,200 companies completed their recoveries on time and without issues. Lastly, FEMA reportsbetween $4,000–$40,000 is lost per hour of downtime.The cost only gets bigger as your organization grows.

The numbers show it’s imperative to your business’ success to have a data protection plan in place. Data backup is like having an insurance policy againstnatural disaster, data corruption, and everyday mistakes, such as accidentallydeleting files. And who hasn’t done that?

Before we go any further, let’s cover some terms and get some answers you’llneed to know for your backup and recovery plans.

Recovery Point Objective (RPO). This is your point in time to recover. How muchdata are you prepared to lose? Do you need data from one minute, five minutes,a week, a month?

Recovery Time Objective (RTO). This is the total time to recover. You’ll need toknow how long you can afford to be down. If you’ve recovered your data butyour systems and applications are down, such as email or payroll, how long canyour business survive?

Disaster recovery plan. A disaster recovery plan is a documented process or setof procedures to recover and protect a business’ IT infrastructure in the event ofa disaster. You’ll want to understand how everyone will react in a disaster, andwho’s going to do what and when.

Getting Your Backup and Recovery Plans TogetherMaybe answering those questions left you rattled because you’re thinking yourbusiness can’t afford to lose any data, nor can it afford to be down for even a fewminutes. You’re thinking your lack of planning leaves you nothing to fall back on.

While it does take time and know-how to create and implement a backup andrecovery plan, US Signal can help you through each step.

Read up on how we can help you with your data protection needs — Backup-as-a Service, Recovery-as-a-Service and Disaster Recovery-as-a-Service.

With the help of US Signal’s Professional Service Engineers and our DataProtection Suite, we’ll work together to create a playbook detailing disasterrecovery plans and processes, thereby safeguarding all the data and systems you need to keep your business running.

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 9

Page 10: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 20151100

TECHNOLOGY

Before Silicon Valley became Silicon Valley, the Miami River Valley—with Daytonat the forefront—was an innovation nucleus. During the early 20th century, thearea led the country in patents per capita and was home to inventors, scientists,and great thinkers who pioneered the first cash registers, electric wheelchairs,modern parachutes, and even the tabs on soda cans. Fast forward 100 years, andDayton is still a hub of innovation boasting a thriving startup environment and a growing tech community while remaining an established mecca for topemployers. However, there is more to be done in order for Dayton to competewith businesses in Silicon Valley. But first—in order to out compete, one mustbe able to out compute. Enter data centers.

What to Look for When Choosing a Data Center

Not all data centers are the same, and the choice between one data centerprovider and another could lead to success or trouble for a company. Whenresearching how a data center provider can help expand your business, it isimportant to keep these strategies top of mind.

1. Focus on Your Core Business, Not on Your Data Center

Certain aspects of IT do not always align with a company’s business model, asallocating time, effort, and resources to an IT infrastructure can sometimes takeaway from core business needs. However, the tie between business and technol-ogy is growing, and as companies look to generate more technology insights, itis critical to have the most up to date software to aggregate information abouttarget customers, markets, and growth opportunities. Partnering with a datacenter provider makes business sense as it allows IT experts to handle comput-ing and software needs while you grow your business.

2. Your Provider Should Always Be Available and Secure

After deciding to allocate your business computing needs to a data centerprovider, the next best step is assessing the availability and security of the data.

Think about it: you outsourced your business computing needs to a data centerprovider in order to gain insights and advance your business. Therefore, the datacenter, which is receiving and processing your business information every secondof every day, should provide you with access to that data every second of everyday. In this way, it is important to think of your data center as a business partnerrather than a business decision.

Now, let’s talk security. The Identity Theft Resource Center reported 2014 as theyear with the highest number of data breaches ever recorded—a hike of 27.5percent more than 2013. The Center estimates that 675 million records havebeen illegally accessed by hackers since 2005.

When your data center provider has your most sensitive company records, theirsoftware needs to be up-to-date and secure. In terms of physical security, yourprovider should have top-of-the-line security to ensure only you, your employees,and the approved data center staff has access to your servers. Additionally, theservers that house the data should be completely protected from water, fire, orheat damage and should remain unaffected during power outages.

3. Future-Proofing Your Data Center to Facilitate Innovation

One of the intrinsic characteristics of technology is that it is constantly movingforward. By 2020, the amount of information processed online is estimated to beten times its 2013 size. So the concept of future-proofing your data center goeshand-in-hand with the growing demand for computing capacity.

In order to stay ahead of the curve, your data center provider must be able toanticipate your future needs and scale accordingly. The best way to do so is tochoose a data center provider with mixed-density capabilities that enables yourbusiness to scale in place and match density to application requirements. It’s the best of both worlds: you mitigate the risk of being unable to scale withouthaving to wastefully over-provision.

Why Dayton is a Great Place for Your Data Center?

Data centers will play an integral role in driving technological growth, as theseenterprises will enable companies to maximize their ability to handle high per-formance computing. This, in turn, allows IT infrastructures to gain a competitiveadvantage by turning the processed data into insightful business decisions.

Three Requirements Your Data Center Provider Should MeetBy: Chris Staggs, Account Executive, IO

Experience the power of being understood.®

When you trust the advice you’re getting, you know your next move is the right one.

For a tailored approach that aligns your technology, processes and people to help

improve productivity, turn to McGladrey.

We help you plan, select and implement new software solutions, address your

technology risk and design your technology infrastructure.

Experience the power. Go to www.mcgladrey.com/technology

or contact us at 800.274.3978.

© 2015 McGladrey LLP.PP All Rights Reserved. MCG0315KV

(continued on page 11)

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 10

Page 11: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 20151111

TECHNOLOGY

Dayton is a great place to collocate due to its physical location. The city is centrally located between major Midwest markets, including Columbus,Cincinnati, Indianapolis, Louisville, Chicago, and Minneapolis, making it accessible to a number of businesses.

Because of its central location, Dayton is an attractive choice for companies not only in the Midwest but also on the East Coast. Latency between Dayton and New York City is approximately 25 milliseconds, yet the energy prices andcost of doing business in Dayton is significantly lower than in New York City andneighbors to the east. In fact, the biggest reason global organizations chooseOhio for data center colocation is for disaster recovery and business continuity.

Last but certainly not least, Dayton is a top spot for tech talent being named ofthe top 30 metro areas in the United States for tech jobs. Multinational giants,such as Kroger, P&G, and Cardinal Health, call Ohio home. The Wright-PattersonAir Force Base, the largest in the U.S., performs “scores of high-tech research and development.”

There is no one right answer to the question,“Where should I locate my datacenter?” Most companies adopt a regional colocation strategy, co-locating indata centers within reasonable geographic proximity to where they do business.For organizations in the Midwest and on the East Coast, Ohio is an ideal place for data center colocation.

Chris Staggs is an Account Executive at IO Ohio, which is located in Miamisburg.

(continued from page 10)

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 11

Page 12: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Technology First | October 20151122

TECHNOLOGY

Content Solutions Can Manage DataBy: Laura Burkamper, McGladrey

Organizations today define the human resources function in many differentways depending on the size, industry, workforce makeup and, in some cases,economic composition of the company. In some small and midsize businesses,human resources may not even be an official department. The human resourcesfunction may be managed by operations or finance, or if there is a humanresources department, human resources staff may assume additional responsi-bilities such as training, safety and policy management. The premise of doingmore with less is a challenge that is prevalent in most human resources depart-ments, regardless of company size.

In addition to the vast scope of the human resources department’s responsibilities,many organizations typically lack the technology to support all of the documents,forms and processes that encompass the role. Many times, tracking is managedthrough spreadsheets and there is a lot of paper routed throughout the organiza-tion, with a lack of status or tracking available.Typically, midsize businesses havesystems in place to manage their line of business and financial activities, but havea gap as it relates to the tracking and management of employee records. Evenwhen there is a Human Resources Information System (HRIS) in place, there stillmay be challenges or deficits in the solution.

Much of the information that needs to be tracked is what is referred to asunstructured data. Unstructured data, as defined by Wikipedia:“Unstructured

Data (or unstructured information) refers to information that either does nothave a pre-defined data model or is not organized in a pre-defined manner.Unstructured information is typically text-heavy, but may contain data such asdates, numbers, and facts as well.”

Examples of unstructured data within the human resources area are employeeonboarding and termination management, time off requests, training requestsand tracking forms, safety occurrences, etc. Where should this information resideand how can organizations structure this unstructured data so that it is easilyaccessible by authorized individuals, well-documented, preserved for future ref-erence and secure?

Many organizations have successfully implemented Enterprise ContentManagement (ECM) solutions to help manage this data. ECM solutions notonly provide a repository to store and manage documents and forms but alsohave workflow capabilities to facilitate the routing, tracking and approvalprocesses. An example would be Microsoft’s ECM solution, SharePoint, whichallows businesses to take advantage of the investments they have made inother Microsoft solutions.

We recently worked with an eastern Iowa manufacturer, who was challengedwith tracking the company’s employee time off process. They were outsourcingtheir payroll functions, but managing time off requests with paper forms thatwere routed throughout the office for approval. They were also using spread-sheets to track employee time accruals and time off. They implemented an ECMsolution to not only manage electronic requests and approvals, but also todefine time accrual rules and make the information readily available to employ-ees so they could easily track their eligibility. After implementing the solution,not only were employees better informed of their benefits, but human resourceshad a better tool to manage the process.

Could an ECM solution help your company? The best test is to examine yourbusiness and track how much paper is exchanged and how much time is spentmanually tracking activities. Maybe there is a better way to manage the unman-ageable data within your organization.

The ISSUUapp is

availablefor Android,

iPad andiPhone

The ISSUUapp is

availablefor Android,

iPad andiPhone

Technology First magazine is nowavailable on ISSUU.

To locate the magazine on this website, search forTechnology First Dayton.

http://issuu.com/search?q=technology+first+dayton

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 12

Page 13: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

The Ohio Academy of Science has named

Hanen Alkhafaji as one of 58 Ohio’s

“Believe in Ohio” STEM Exemplars. She

was one of only two Daytonians named.

Exemplars are named for their science,

technology, engineering, and mathematics

(STEM) workforce perspective.They serve

as role models for students to encourage

them to pursue STEM careers and become

entrepreneurs and innovators. Alkhafaji

worked with middle school students

enrolled in Chaminade-Julienne High

School’s STEMM (Science,Technology,

Engineering, Mathematics, Medicine) sum-

mer camp, introducing them to statistical

concepts in an interactive analytical activity.

Alkhafaji works for PQ Systems as a

software development team member and is an alumna of Chaminade-Julienne

High School and Wright State University. She was named the Emerging Leader

at the Technology First Leadership Award event in May 2014.

Technology First | October 20151133

MEMBER MENTION

Design & Production:Courtesy of Bitstorm Web

714 E. Monument Avenue; Suite 106 • Dayton, OH 45402 p: 937.229.0054

Publisher: Technology First

Chief Operating Officer: Ann Gallaher

Managing Editor and Advertisement Sales: Michelle Marek

Writers: Our mission is to support the growth of Greater Dayton’s information technology industry.Technology First provides a forum for educators, business, and technical professionalsto communicate their expertise and lessons learned while working in the field. Please submit the article in Word, preferably with 500 to 700 words, with any graphics in pdf [email protected]. Please include your name, business organization, business address, phone number, fax number, e-mail address, and a brief description of any professionalaccomplishments. Please also include a digital photograph if available.

Subscriptions: Non-member business/home delivery of this publication is available at $120/year (12 issues). Mail name, address and check made payable to Technology First.

2013 Technology First; All rights reserved www.technologyfirst.org

IT Systems Engineer/Developer Community Blood Center

ETL Development Consultant Teradata

Business Intelligence Teradata

Senior .NET Developer Red Hawk Technologies

Senior Business System Analyst Red Hawk Technologies

Senior Project Manager RoundTower

For more information about these jobs and other jobs, please visit:

http://www.technologyfirst.org/component/employment_exchange

Technology First LeadershipAward Winner Named As STEM Exemplar

Hanen Alkhafaji September Issue Error:

The magazine article titled, “Five Questions To Consider Before Choosing a GPS Tracking System for Your Vehicles” was submitted by RACO Industriesrather than Sogeti as previously stated. We sincerely apologize for this error.

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 13

Page 14: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Warning: Techie Stuff Ahead!Recently I was in need of a free (I love free) tool to perform a few SQL queriesagainst a suspect database. Since I’m nowhere near being a DBA (DataBaseAdministrator), and if you watch me type SQL queries that becomes completelyobvious, I don’t have those tools available like the real pros do. Query Expresswas the answer to my need, at my favorite price ($0).

http://www.albahari.com/queryexpress.aspx

Google Drive For OfficeGoogle has released a small plug-in for Microsoft Office that connects into your Google Drive, making it easier to use the two together. Who says we can’t all get along?

googledrive.blogspot.com/2015/07/google-drive-plug-in-for-office.html

Apple Battery ChargerThis is my favorite AA batterycharger. Apple seems to bethe only company that under-stands that positive alwaysgoes up or always goes in first.It’s the simple things, like nothaving to put on glasses to doa little task, that I appreciate.

http://store.apple.com/us/product/MC500LL/A/apple-battery-charger

Technology First | October 20151144

BLOGS

By: Paul Moorman

Query Express

Scan to receive our weekly e-newsletter!

GETCONNECTED

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 14

Page 15: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Applied Cyber Security

Training at Austin Landing

TRAINING OFFERINGS IN CYBER SECURITY AREAS

Cybersecurity

& Information Systems

Applied Cybersecurity

Big Data/Cloud/Mobility

Computer Forensics Tool Kit/Analytics

Executive Cybersecurity Landscape

Briefing

Risk Analysis/Mitigation/Incidence

Response

Secure Networks & Software

Development

Secure Programming and Cloud

Threat Modeling

Cybersecurity Regulatory Compliance

Social Engineering Threat Tactics and

Mitigation Strategies

Cyber-Physical Systems/IOT

Trustworthy Autonomous (CPS)

Cyber-Physical Systems (CPS)

Robotics

Smart Systems

The “Internet of Things” (IOT)

Cyber Risk Assessment

Data Analytics

& Business Informatics

Health/Medical Informatics

Business Informatics

Security Informatics

Data Analytics/Data Science

Sinclair Corporate CollegeAustin Landing10100 Innovation Dr., Suite 310, Dayton

Focusing on the need for training in cyber security, intelligent systems and

data analytics, Sinclair Corporate College’s new Cyber Training Facility at Austin

Landing is designed to help prepare businesses to mitigate the threat of cyber

crimes.

Sinclair Corporate College at Austin Landing offers non-credit business centric

custom training programs and industry certifications in cyber-physical systems,

cyber security, computer forensics, information technology, data analytics,

robotics and business informatics.

Our programs will provide hands-on, context-based approaches to professional

development and workshops designed to prepare professionals to become

knowledgeable about best practices and current cyber security techniques

important to businesses and industries today.

Training engagements can be scheduled at our facility or on-site to meet your

needs. Check workforce.sinclair.edu for upcoming events and classes.

Technology First | October 20151155

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 15

Page 16: Wednesday NOVEMBER 18 - Technology First...Machines and Virtual Networks also apply to securing Azure Cloud Services.There have been further improvements to MS Azure’s Network Security

Tech1st_OCT_2015_v1.qxd 9/30/15 3:59 PM Page 16