Equinix Cloud Transformation Conference 2022: The key takeaways

This year’s Cloud Transformation Conference, powered by Equinix and TechForge, saw industry leaders gather to discuss the importance of a “digital-first” strategy.

For this roundup, CloudTech caught up with some of the world-class speakers at the event to get their thoughts on the key topics discussed during the conference.

Here’s a list of the speakers featured in this article:

Dax Grant, CEO of Global Transform, Forbes Technology CouncilErik Thorwirth,...

IDC predicts cloud infrastructure spending this year will hit $90.2B

IDC forecasts that cloud infrastructure spending will exceed $90 billion in 2022.

In Q1 2022, IDC found that spending on compute and storage infrastructure products for cloud deployments – including dedicated and shared environments – increased 17.2 percent year-over-year to $18.3 billion.

The firm’s analysts note the strong growth is despite “tight supply of some system components and disruptions in transportation networks.”

Dedicated cloud...

Alibaba launches ‘Data-as-a-Service’ firm Lingyang

Alibaba has spun out a “Data-as-a-Service” (DaaS) business called Lingyang Intelligent Service Company.

Lingyang will offer solutions to enterprises that were initially developed for Alibaba.

“The launch of the new firm is an important step taken by Alibaba after long-term consideration,” said Daniel Zhang, Chairman and CEO of Alibaba.

The team behind Lingyang has vast experience supporting Alibaba’s Double 11 Data Big Screen and 88VIP initiatives....

Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks

Cloud Tech caught up with Andrew Egoroff, Senior Cybersecurity Specialist at ProcessUnity, to discuss the increased threat around the Russia-Ukraine crisis and how to mitigate risks from third parties.

A business can implement excellent internal cybersecurity measures, but a slip-up from a third-party vendor can have devastating consequences. ProcessUnity specialises in helping businesses determine what vendors carry the lowest risk.

“We try and evangelise the...

Greg Day, Palo Alto Networks: On protecting our way of life in the digital age

Security threats have evolved considerably over the years and Palo Alto Networks knows more than most that “protecting our way of life” also requires a digital approach in the modern world.

Historically, nations would protect their way of life by having the sharpest swords, the biggest guns, the sturdiest tanks, or the fastest planes. Nowadays, it’s as much – if not more – about who has the most secure networks and systems.

CloudTech spoke with Greg Day, VP...

Amazon criticises New York Times reporting of open source theft concerns

AWS vice president Andi Gutmans has penned a scathing response to an article highlighting concerns that Amazon is stealing the innovations of startups.

New York Times journalist Daisuke Wakabayashi wrote an article titled Prime Leverage: How Amazon Wields Power in the Technology World in which he highlighted several cases where Amazon is said to have "strip-mined" (as startups have coined it) open source technology.

The main example is of Amsterdam-based startup...

London police using Big Data to tackle small crime

Small criminals are predictable, at least that's what London's Metropolitan Police Service (MPS) are hoping. New software, developed by Accenture, pulls large amounts of data in-use by the police service and puts it through an advanced analytics engine to predict when criminals are likely to strike.

By analysing five years' worth of data, it is hoped that an accurate prediction of when / if a criminal will re-offend can be made. The data was gathered over a four year period of...

China launches “Great Firewall” attack against iCloud

According to a report by web censorship watchdog Great Fire, China's infamous state firewall is performing a MITM (Man-in-the-Middle) attack against users of Apple's Cloud-based services. It is suspected the attack has been launched in response to Apple's new default encryption methods.

It is possible to circumvent the fake site using a VPN, or one of iCloud's many other IP addresses.

Since iOS 8, authorities can no longer bypass on-device encryption to gain access. The...

Amazons AutoRip helps ease consumer transition to the Cloud

Admit it, we all thought the CD was on its way out, and it probably is. Yet if any company wishes to hold on to sales a little bit longer, it’s Amazon.

Today the firm has announced ‘AutoRip’ which offers any physical media you’ve (ever) bought to stream for free from the Cloud.

 

Whilst many music-lovers have already subscribed to one of the extensive-list of new generation streaming services; such as Spotify, Google Play Music, Rdio,...

Splunk’s “Hunk” makes dealing with Hadoop big data easy

Earlier this week we got to speak with Sanjay Mehta, VP of Product Marketing, and Clint Sharp, Senior Product Manager, Big Data; concerning the (beta) launch of a new product, “Hunk”, making exploring data stored in Hadoop easy.

In fact, one of the taglines randomly generated on the company’s website is “taking the ‘sh’ out of IT”, solutions which work for clients in the real-world is a clear priority.

Sanjay gives an interview of the...