Are we smart enough for future Smart Communities?

smart communities

All Communities need to be Smart…

The concept “Smart …” in association with technologies is not anymore new. Smartphones, smart watches or smart (intelligence) software are already part of our lives. Accelerate urban development, fast growing global population, limited energy resources and aging infrastructure are among the most critical challenges that the new wave of digital technology has to solve.

More than 50% of the today World’s population lives in urban areas and contributes with more than 80% of the World GDP. According IDC the concept of Smart Cities “is a construct in which to frame local government transformation. Cities need to transform in order to develop sustainable, improve resilience, meet citizens’ rising expectations, and attract investment, new businesses, and talent.”  As result public government structures are looking to invest in emerging technologies such as Cloud Computing, Big Data and Analytics, Mobile Solutions, M2M, and Internet of Things.

But 50% of global population live in villages, farms, and isolated communities. Many academic, business and industrial activities are developed outside the big cities. What are their needs? Practically the same like the metropolitan area: infrastructure, energy sources, transportation, communications, pollution, or public safety. This is the main reason we prefer to look to “Smart Communities” problems, keeping “Smart Cities” as a general frame.

IoT and M2M technologies drivers for Smart Communities development

smart cities AgoraWe can find Smart Cities punctual projects starting a long time ago. The first issues generated by energy and overpopulation needed solutions. One good example is the Smart City initiative developed by Ministry of Economy, Trade and Industry from Japan in 2011. Watch the movie from the link. It’s really interesting for the energy solutions. The Smart Community concept was first used in 1993 in Silicon Valley – California during the post recession.  Looking to alternative solutions to next development, Silicon Valley officials, business leaders, academic and other communities members decided to find a common plan to help the region jump-start.

But old smart initiatives was local, based on legacy technologies, budgets limited, and lack of alternative energy solutions. The real explosion of Smart Cities projects is accelerated by fast and large adoption of Internet of Things, Machine 2 Machine and other emerging technologies and alternative energy resources that generated digital revolution.

According to Gartner, smart cities will use 1.6 billion ‘things’ connected in 2016, an increase of over 39% compared to last year. Commercial buildings will be best equipped with IoT systems until 2017, after which Smart Homes will dominate with a market of over 1 billion objects connected by 2018.

Smart energy alternativesDigital transformation influences every component of our life: how we leave, how we work, how we travel, how we communicate, how we learn, how we relax, how we defense. In any quality: citizens, employees, employers, parents, friends, or any type of community members…

A Smart Community vision should address a population able to accept and integrates a multitude of disruptive technologies and solutions aimed to improve the quality of life by increasing the efficiency of essential services: housing, jobs, public spaces and retail, transportation, infrastructure, utilities, communications, mobility, knowledge, recreation, administration, education, health, safety.

A simple but comprehensive definition for Smart Community could be find in Smart Communities Guidebook made in 1997 by California Institute for Smart Communities from San Diego State University: “a community in which government, business, and residents understand the potential of information technology, and make a conscious decision to use that technology to transform life and work in their region in significant and positive ways.”

The main goals of any Smart City project should be based on:

  • Public services redesigning
  • Critical infrastructure efficiency
  • Transportation and public utilities calibration
  • Excessive consume and cost reduction
  • Optimal allocation of existing resources

First Smart Communities conference in Romania

Having a long experience in new technologies adoption and know-how transfer on the market, Agora Group – Romanian media leader in IT business and technologies and cloud☁mania – independent Digital Transformation knowledge platform, organised for the first time in Romania a dedicated conference to “ITC Infrastructures & Solutions for Smart Communities”.

smart_cars_300This initiative was a direct reflection of local organization and industries interest for smarter technology and business solutions to better deserve the digital transformation progress. Considering the valuable solutions and services diversity provided on the Romanian market we offered to participants some very interesting solutions showing how actual technologies could help the development of tomorrow smart communities.

Looking to the large coverage of the subjects proposed by important players on the IT&C market, and the real interest and interactive participation of the audience, we can consider this first „Smart Communities” conference as a real success.

In my opening presentation “How can current technologies to help the development of tomorrow smart communities”, I made a general review of the actual technologies and why is important to extend the “Smart Cities” definition to more complex “Smart Communities” concept. Many parts of the speach ideas was developed in the first part of this article.

In his “ICT solutions for corporate customers and SMEs presentation Catalin Rasturnoiu – Presales and Technical Solutions Manager Business to Business at Orange Romania referred to the wide range of solutions offered by Orange Romania for fixed data & voice and mobile services. A special focus was made on the LoRaWAN services with applications in Smart Metering, buildings monitoring, intelligent agriculture services for Smart Cities and Smart Home. Other solutions presented were: the Orange concept for smart class, Wi-Fi zones in public buses transportation and Insurance mobile solution implemented at Uniqa.

“Improving the urban experience through augmented reality (AR)” was a very interesting presentation sustained by Mitu Morega – Business Developer at High-Tech Systems & Software (HTSS) who illustrated how virtual reality (VR) and augmented reality (AR) are already used in urban projects, arguing that “both the young, and those not so young, have some personality who loves playing, interacting, color and movement, being it virtual. Increasingly more companies adopt to this trick to attract more customers. „But VR & AR are not just for sales, offering opportunity to develop smart applications for interactive tourists’ guides, increasing interest and interactivity, and having the ability to simulate projects development with virtual integration into the urban landscape.

Elena Paun Telekom

Elena Paun, BDM ITC Telekom Romania

Very interesting and well received by participants was the “Smart Street” key study presented by Elena Paun – Business Development Manager ICT at Telekom Romania. We had opportunity to hear details about the Smart City pilot project implemented by Telekom Romania in the Children’s Playground from Bucharest, in partnership with City Hall of 4th District, officially launched in April 2016. The pilot project includes a smart parking solution (automation of 129 parking seats), an intelligent dimming solution (automation and dynamic configuration of light intensity), a public safety solution (advanced video monitoring and analysis of the parking area), and a Wi-Fi network communication platform for park visitors, all integrated on a “Smart City” dedicated platform.  Telekom Romania implemented this pilot project in partnership with Cisco – strategic partner and supplier for IoT platform, Sensity – smart lighting solution provider, Kyunsis – smart parking solutions provider, and Kiwi Security – public safety solution provider.

“Bitdefender GravityZone – Unfollow the traditional” was the security solutions presented by Andrei Ionita – Bitdefender Business Development Manager. Bitdefender ia a Romanian company with global recognition, recently included by Gartner in the Visionary Quadrant for Endpoint Protection Platforms (February 2016): Bitdefender provides very good malware detection capabilities, including a sandboxed application emulation environment, automatic unknown file analysis and continuous behavior monitoring, resulting in very good public test scores. The agent performance is very good, too, with low overhead.” Bitdefender GravityZone solution for companies is available in 3 versions: Business, Advanced Business and Enterprise, being developed in both Cloud and on-premises models.

RobotiiFew serious reflection subjects were opened by “Future knocks at the door,” visionary debates opened by Daniel Gruia – Knowledge Explorer and CIO at Transgaz, Romanian CIO Council member. Daniel offered us an incursion in a not too distant future of a Robots’ World. It is not too late to serious reflect and to prepare us for a scenario in which all routine tasks will be taken by robots. There are applied researches which show the realistic possibility that 50-70% of the actual workforce to become jobless. 20 years from now, labor demand for lots of skill sets will be substantially lower. I don’t think people have that in their mental model,” said Bill Gates in speech made in 2014 at The American Enterprise Institute Economic Think Tank.


Techsylvania Hackathon a successful innovation and creativity challenge


Hackatlon Techsylvania

Students Culture Hall from Cluj hosted for two days the Techsylvania Hackathon, a creativity and development challenge organised during 3rd edition of Techsylvania innovation and technology event. The creativity development competition focused on last moment wearable and connected technologies. One of the special guest interested in hackathon ideas was Mark Shuttleworth founder of Ubuntu and one of the most awaited speakers at this Techsylvania edition.

For 24 hours 130 developers organised in 17 teams had the opportunity to explore the last technology gadgets and to build specific applications. In the final stage, each team had only 4 minutes to demonstrate their abilities. Between the gadgets presented was DJI and Parrot drones, Virtual Reality devices like Oculus Rift and Merge VR, smart watches from Apple, Alcatel, Google and Vector, or motion smart devices like Leap Motion and Eyetribe Tracker.

Hackatlon Techsylvania 2The big winner of the Techsylvania Hackathon is Green Box team which created a solution to increasing efficiency of solar power panels. A dedicated application which better manages the pills administration and send health notification to personal doctor developed by Dr. Alexa team won the second award. The third place award was won by Grip It team which designed a product that uses data provided by Force Sensitive Resistors on a climbing hold for viewers to improve climbers’ performances and better understanding the climbing sport.

Other two special prizes offered by Techsylvania sponsors rewarded interesting solution. Dronesylvania team won the HTC special prize with a drone rescues solution for mapping incident area, live stream images to a server, persons or objects identification and positioning data transmission. The Vector special prize was won by Penguins, a device that measures the number of people in a building, providing an efficient solution for institution queues and ticketing.

The Hackathon jury included some top personalities presented to Techsylvania like: Mark Shuttleworth founder of Ubuntu and Canonical, Wallace Wu – vice president at Misfit, Fredrik Nylander – partner at Lakestar, Cristiano Betta – founder of Betta Work, Anca Albu, Radu Stefan and Andrei Baican.

Techsylvania DroneFor a complete image of the high level and diversity of projects will shortly present all other solutions developed in Techsylvania Hackathon:

  • Ara – an educational solution that offers to children a better experience in learning about physics, while simulating spatial objects using Shpero and Raspberry Pi.
  • Augmented Tourism – an app that acts as a tour guide used on Google glasses and building identification.
  • Home Security – a home security system that uses only the smartphone to unlock a home.
  • Little Data – a special application designed on eyetracker technology, to create Web page heat-maps with points of interests
  • Medvac – a healthcare solution based on communication between smartwatch users, emergency calls, and subject geo-location.
  • Parking Buddy – an intelligent parking solution based on a drone.
  • Rocket Team – a product for roads monitoring, and safe environment data transmitted to drivers.
  • Rollo Collo – a solution dedicated to the people that suffer from color-blindness developed on Epson Moverio, a device that can replace the real colors.
  • Sensor Tracking – using various sensors to detect the pulse of a person and to analyse his mood, adjusting the room lightning accordingly.
  • Team Optimizer – an app that helps teams optimize their processes while recording daily interactions with Amazon Echo.
  • We Do Stuff – a solution based on Leap Motion, the team wishes to translate sign language into text, making it easy for people with disabilities to communicate with other people.

All awarded teams won free passes to Techsylvania conference, personalized mentoring sessions, and a series of gadgets and devices presented in the competition.

 Images Source: Techsylvania

Techsylvania aduce la Cluj Polul Tehnologiilor

Techsylvania outside

Ce au în comun NASA, Ubuntu, Twitter, Facebook, Accenture și Prezi? Dacă veți fi în Cluj în perioada 21-24 mai, veți afla!

De astăzi la Casa de Cultură a Studenților din Cluj începe cea de-a treia ediție Techsylvania, eveniment ce reunește personalități internaționale în investiții, inovație și tehnologie.

Iată câteva dintre VIP-urile prezente la Techsylvania 2016:

Tim Draper este co-fondator și Managing Partner al fondului de investiții Draper Fisher Jurvetson, care deține în administrare peste 3.5 miliarde de dolari, cu misiunea de a finanța start-upuri în domeniul tehnologiei. Investitorul va împărtăși în cadrul conferinței Techsylvania informații cu privire la provocările întâmpinate în demersul său profesional.

Ioana Cozmuta este cercetător și manager al departamentului de cercetare pentru inovație și micro-gravitație la NASA. Ioana va povesti la Techsylvania despre profesia sa și despre felul în care se îmbină tehnologia și inovația într-o organizație renumită pentru dezvoltarea cercetărilor spațiale.

Printre alți speakeri care vor împărtăși la Techsylvania despre experiența lor în afaceri și tehnologie se regăsesc și profesorul Mark Post, care a dezvoltat primul hamburger cu carne de vită produsă artificial în laborator și a primit o investiție de la unul dintre co-fondatorii Google, Steffi Czerny, recunoscută de publicația Wired ca una din cele mai influente 100 persoane din Europa, precum și alți reprezentanți ai unor companii precum Twitter, Hootsuite, Accenture, Coca-Cola sau Prezi vor fi prezenți la cea de-a treia ediție a evenimentului.

Hackathon-ul Techsylvania va permite dezvoltatorilor software să își testeze abilitățile de programare și creativitatea în realizarea de aplicații pentru drone DJI sau Parrot, dispozitive de realitate virtuală precum Oculus Rift sau Merge VR, ceasuri inteligente de la Vector, Apple sau Google, instrumente care urmăresc gesturile sau privirea cum ar fi Leap Motion și The Eyetribe Tracker ș.a. 130 de programatori vor concura pentru premii constând în gadgeturi de la Vector Watch, Parrot, Alcatel, Pebble, Merge VR, Leap Motion si Misfit, dar și o invitație exclusivă la programul de pre-accelerare găzduit de Young Leaders Club, precum și mentorat business din partea organizației Founders Forum din Londra.

TechslvaniaStartup Avalanche este un concurs și în același timp o platformă prin care noii jucători de pe piața IT locală și internațională pot avea acces la investiții, recunoaștere și resurse. Cea mai bună prezentare a unei idei de business  este recompensată cu o vizită în Silicon Valley.

Mai multe informații despre speakeri si agenda completa a evenimentului pe site-ul oficial:

Parteneri Techsylvania: Telekom, Accenture, Riverbed, Banca Transilvania, Halcyon Mobile, 3Pillar Global România, Small Footprint, Yopeso, Macadamian, Xoomworks, Twitter, Bitdefender, Laurențiu, Laurențiu și Asociații, Yonder, SDL, Telenav, DJI, Alway Stay Creative, Microsoft, Frequentis, PressOne, High-Tech Systems and Software

ITC Infrastructures & Solutions for Smart Communities

smart communities

AGORA Group si cloud☁mania va invita Marti 17 Mai la prima conferinta dedicata solutiilor de infrastructura si Smart Communities organizata in Romania. 

Studiile de piata indica o crestere continua a interesului pentru tehnologiile legate de echipamentele interconectate ce ofera solutii avansate pentru consolidarea unor comunitati inteligente. Smart Cities, Smart Campus, Smart Utilities, Smart Buildings, Smart Cars sunt solutii din ce in ce mai discutate atat de jucatorii din industria de IT cat si de organizatii din sfera administratiei publice, utilitatilor si furnizorilor de servicii Internet of Things si Machine to Machine (M2M).

In evolutia dinamica a comunitatilor, proiectele Smart City ofera o viziune integrata asupra proceselor esentiale asociate cu dezvoltarea urbana: cresterea populatiei, eficientizarea retelelor de utilitati, solutii mai bune de transport, servicii publice inteligente, salvarea energiei sau eficientizarea proceseor de securitate publica.

Conferinta “ITC Infrastructures & Solutions for Smart Communities” isi propune sa va ofere o trecere in revista a principalelor tendinte tehnologice, dar si cateva dintre solutiile propuse pentru piata din Romania de Orange Romania, HTSS, Telekom Romania si Bitdefender.

Pentru mai multe detalii despre locatie, Agenda conferintei si inregistrare vizitati pagina dedicata evenimentului de pe site-ul




IDC IT Security Roadshow: Reaching The New Frontiers in Data Protection

 IDC2 Cover

2nd article: Facing to invasion of more and more sophisticated data security threats business leaders push IT to deploy new technologies and services.

Continuing presentation of the IDC IT Security Roadshow organised in April 14th in Bucharest, will try to review the most important security issues discussed during keynote presentations and panel sessions.

Expose the Unknown – most important driver of data prevention for Check Point

One of the hottest subjects in the industry now is zero-day attacks prevention. According to Check Point a “zero-day” exploit is any vulnerability that’s exploited immediately after its discovery. We speak here about rapid attacks that take place before the security community or the vendor knows about the vulnerability, or has been able to repair it. Such kind of exploits are a Holy Grail for hackers because they take advantage of the vendor’s lack of awareness and the lack of a patch, enabling the hacker to wreak maximum havoc. Zero-day exploits are often discovered by hackers who find a vulnerability in a specific product or protocol. Once discovered, zero-day exploits are disseminated rapidly, typically via Internet Relay Chat channels or underground Web sites. From practice, detailed information about zero-day exploits are available only after the exploit is identified.

IDC2 Check Point

Source: IDC

“Increasing your enterprise security often means increasing your complexity and management challenges in kind. Check Point delivers a multi-layered line of defence to help you maximize your security while minimizing challenges and closing gaps”, said Cezar Varlan – Security Engineer, Check Point Software Technologies

Trying to cover multiple-layers potential vulnerabilities, many organizations are investing in a disparate mix of new security technologies from a variety of vendors. All these tools provide punctual advantage but each must be managed individually, including reporting, provisioning, configuration and testing tasks.

Check Point offers a comprehensive solution, with a full range of interoperable threat prevention blades, common policy management and monitoring, and maximum protection from emerging threats. Attackers have become more creative, reaching corporate resources with modern and complex malware attacks. Check Point SandBlast Zero-Day Protection combines innovative technologies to proactively protect against even the most dangerous targeted attacks and unknown malware, while ensuring quick delivery of safe content.

Staying ahead of the threat with Fortinet

IDC2 Fortinet

Source: IDC

Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their maliciousness. As these attacks become more advanced, organizations must similarly improve their security posture. Why do these breaches continue? “Extreme focus on compliance, reacting only to known threats, and existing of to many point solution are between main reasons”, said Adrian Danciu – Regional Director, South Eastern Europe, Fortinet. “More that, the lack of a defined perimeter offers a borderless attack surface.”

Fortinet solutions are based on a deep segmentation for protection against outside and inside threats, proactive Mitigation, Advanced Threat Visibility, and Flexible Deployment Fortinet Advanced Threat Protection relies on multiple types of security technologies, products, and research applied from the network edge through to endpoint devices. To deliver the most effective protection, they are integrated to work together automatically, continuously handing off data from one to the next to identify, evaluate and respond to attacks.

Fortinet Advanced Threat Protection Framework delivers end-to end protection across the attack chain, based on three elements which work hand-in-hand:

  • Prevent – Act on known threats and information
  • Detect – Identify previously unknown threats
  • Mitigate – Respond to potential incidents

Fortinet was recognised as major player in fastest growing market segment – network security and WLAN market (IDC, 2015), largest network security appliance vendor (units) and quickly growing (IDC – Worldwide Security Products), and second largest provider for Data Center Firewall (Infonetics research).

Applying probabilistic mathematics and machine learning to cyber threat discovery

Very interesting point of view opened by Darktrace and Safetech, based on major role machine learning could have in probabilistic identification of cyber threats.

Image result for machine learning darktrace

Source: Darktrace

Machine learning can be thought of as the third and most recent machine revolution. The first was the replacement of muscle by machine in the industrial revolution. The second involved computers taking over repetitive tasks that had originally been done by people. Machine learning represents computers being able to undertake complex thoughtful tasks.

Darktrace’s technology is powered by advanced machine learning, allowing it to learn what is normal for a company’s network environment, so that it can then determine if any behaviour is abnormal. This allows it to detect cyber-attacks of a nature that may not have been observed before, the unknown unknowns. The ability to self-learn and adapt to a changing environment in real-time allows organizations to reconcile the need for an interconnected workforce, customer base and supply chain, whilst ensuring that they protect against serious, existential threats to their businesses in the most effective and pragmatic way possible.

Legacy approaches to cyber security embody the second revolution: people describe what an attack looks for, and then ask the computer to look for a match to that description. Darktrace turns this paradigm on its head, embodying the third machine revolution: the computer analyses the data and finds areas that merit human interrogation. It is this capability that allows Darktrace to abandon the legacy approach of rules and signatures, and analyse even fast-moving, sophisticated and unknown threats in real time.

“Our vision is to apply human intelligence to cyber defence through revolutionary technology. Deep expertise in cyber defence operations and ground-breaking, self-learning technology allows organizations to keep up with the speed and sophistication of today’s attackers, “said Mateusz Flak – Cyber Security Regional Manager, Darktrace. “The age of surrounding your information with higher and higher walls is over. Legacy approaches permanently leave you a step behind. Darktrace moves at the same speed as the threat, automatically learning from an organization’s ongoing activity in real time to detect threat behaviours as they emerge.”

New approach for modern threat prevention coming from Palo Alto Networks

IDC2 Palo Alto 2

Source: IDC

Most important is everybody should understand the prevention is no negotiable. The Palo Alto Networks’ strategy for modern threat prevention is based on five simple processes every organization should implement, each of them having a well-established actions:

  • Everything must go in the funnel
  • Reduce the attack surface
  • Block known threats
  • Test and adapt to unknowns
  • Investigate and respond
  • Investigate indicators

One of most frequent cyberattacks are ransomware messages. Attackers have traditionally profited by stealing identities or credit card numbers, and then selling them on underground markets. According to the Verizon Data Breach Investigations Report, the

price for stolen records has fallen, so cyber attackers are on the hunt for new ways to make a profit. Due to technology advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware effect is decreasing.

According Palo Alto Networks, the three key steps to protect against ransomware are based on:

  • Preparation – Having a solid backup and recovery strategy in place is the key to recovery if the worst were to happen.
  • Prevention – Segment your network, control access, stop known malware, and quickly detect and prevent unknown malware as it arises.
  • Response – Understand the latest ransomware families and campaigns. Have a plan in place for engaging law enforcement agencies.

To better deserve the threat and attacks research Palo Alto Networks opened Unit42, with clear mission to analyse the data available to Palo Alto Networks to identify adversaries, their motivations and resources to better understand the threats our customers face.

Other valuable principle developed by Palo Alto is based on comprehensive concept of Threat Intelligence. What is Threat Intelligence? “Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard, “ explained Peter Lechman – Regional Sales Manager – Eastern Europe, Palo Alto Networks, during his keynote in IDC Roadshow from Bucharest.

A new approach to security from Symantec

Knowing how cyber-criminals are threatening security is the first step to securing information—and any company’s goals. From data breaches to digital extortion, the 2016 Symantec Internet Security Threat Report leverages an unparalleled amount of data and is the resource you need to quickly uncover digital threats.

Here are the main key finding pf the last edition of ISTR, presented by Christos Trizoglou – Regional Manager of MiTech Systems, Symantec in his keynote from Bucharest:

  • A large business attacked once in 2015 was likely to be attacked 3 more times

    IDC Sala 3

    Source: IDC

  • 50% of all targeted attacks were against small businesses
  • 55% increase in the number of spear-phishing campaigns attacks in 2015
  • 3out of 4legitimate websites found to have unpatched vulnerabilities
  • 125% increase in the number of zero-day vulnerabilities discovered
  • 100 Million Technical Support scams blocked
  • 35% increase in crypto-ransomware as it spread beyond end-users to holding businesses hostage
  • A record 9 mega breaches occurred in 2015
  • 430 Million new pieces of unique malware discovered

Symantec is ready to deliver a unified security intelligence platform that leverages the combined visibility and intelligence of all of his offerings (augmented by 3rd-party data) to block, detect, and remediate attacks, protect information, and reduce risk. Best Practices provided by Symantec are based on following advices:

  • Don’t get caught unprepared – Use advanced threat intelligence solutions to find indicators of compromise and respond faster to incidents;
  • Employ a strong security posture – Implement multi-layered endpoint security, network security, encryption, strong authentication &reputation-based technologies. Partner with a managed security service provider to extend your IT team;
  • Prepare for the worst – Incident management ensures your security framework is optimized, measureable and repeatable, and that lessons learned improve your security posture. Consider adding a retainer with a third-party expert to help manage crises;
  • Provide ongoing education and training – Establish guidelines & company policies and procedures for protecting sensitive data on personal and corporate devices. Regularly assess internal investigation teams—and run practice drills—to ensure you have the skills necessary to effectively combat cyber threats.

 Internet Identifiers – Your Most Undervalued and Under Risk Assets?

IDC2 Internet Security ICANN

Source: ICANN

Very interesting subject proposed by ICANN which considers Internet Identifiers for both vulnerability place and security asset. ICANN (Internet Corporation for Assigned Names and Numbers) is a not-for-profit public-benefit corporation with participants from all over the world dedicated to keeping the Internet secure, stable and interoperable. ICANN mission is to preserve the security, stability and resiliency of the Domain Name System and domain name registration services, to promote user confidence and trust in these systems.

Obviously identifiers are common targets for loss, misuse or abuse. Domain Name are subject of various attacks, having as consequence loss of Web services, public defacement, eMail or eCommerce functions disruptions. IP addresses damages conduct to network disruption and data exfiltration. Autonomous System Numbers breaks can generate disruption of global communications systems and largescale loss of commercial hosting.


Source: IDC

From Risk Mitigation perspective Internet Identifiers could be considered as assets. The best practice is based on quick adoption of standard risk management practices: regular evaluation of organization’s identifier assets, correct appreciation of the threat landscape and the vulnerabilities status, managing risks by priorities, and correctly positioning of mitigation techniques against protection costs. Periodic analysis is a strong defense.

Resource and relationship management could play critical roles in Risk Mitigation. “Organizations should know their allies, keeping points of contact for mitigation providers, upstream ISPs, hosting providers, registries, registrars, vendors and security service technical support,” said Andrea Beccalli – Stakeholder Engagement Manager – Europe, at ICANN

A new data protection regulation is born… during IDC conference in Bucharest

A happy coincidence was the final approval of the new EU General Data Protection Regulation has successfully passed through the European Parliament in the same day with IDC conference from Bucharest. Essential regulation and the critical importance for European Commission efforts toward a future Digital Single Market were presented by Bogdan Manolea – Legal Advisor,

European Union (EU) member states will now had two years to pass the new regulations – which were proposed by former EU justice commissioner Viviane Reding four years ago – into law. The data protection reform package includes both the GDPR and the Data Protection Directive for Police and Criminal Justice Authorities. It replaces current rules based on directives laid down in 1995 and 2008.

IDC Security 1

Source: cloud☁mania

Concluding, IDC IT Security Roadshow is a professional marathon inviting industry specialists and business managers to think, to learn and to act against digital security threats. This year IT security conference series investigates the threats to key systems, data, and networks, and the main actions that organizations need to take to secure them. IDC is advising security professionals not only to look at investing in security solutions, but also at people and processes, employees and business partners, helping individuals and organizations to develop a strategic thinking.



Gestiunea deșeurilor în Cloud: o opțiune care aduce beneficii

Eco Siveco

Funcționalitatea, scalabilitatea și agilitatea sunt cele mai valoroase caracteristici ale unui sistem Cloud.


Se spune că dezvoltarea de azi din industria de Cloud computing are același impact revoluționar pe care l-a avut evoluția rețelelor electrice și de transport cu un secol în urmă. Avantajele migrării în Cloud sunt evidente – costuri reduse, scalabilitate și flexibilitate mai mare, mobilitate crescută și implementare mai rapidă etc. Iată de ce gestiunea informatizată a deșeurilor în Cloud este o alegere perfectă pentru agenții economici generatori, colectori, transportatori sau revalorificatori care produc deșeuri.

Componenta de Management al Deșeurilor din sistemul informatic integrat SIVECO Applications 2020 Project: Cloud este nu numai un instrument statistic pe baza căruia se obțin date corecte referitoare la generarea și gestionarea deșeurilor care evaluează situația actuală și obiectivele de îndeplinit, ci și unul economic. Astfel, sunt reflectate costurile activităților de gestionare a deșeurilor, atât în prețul produselor, cât și în statutul pe piață al producătorului.

Siveco Deseuri 1

Image source: SIVECO

Aplicarea corectă a stimulentelor financiare pe de o parte, și a penalităților pe de altă parte, va încuraja activitățile de gestionare prin prevenire, reducere și recuperare, conducând în același timp la eliminarea practicilor de gestionare cu impact asupra mediului sau care vin în contradicție cu principiul „poluatorul plătește”.

Managerii firmelor vor cunoaște cu exactitate cantitatea de deșeuri care există în stoc și momentul oportun pentru eliminarea ei. Datorită acurateței și ușurinței în exploatare a bazei de date a sistemului, vor reduce erorile de gestiune și vor evita returnarea deșeurilor și a costurilor asociate.

Foarte importantă este asigurarea urmăririi traseului deșeului de la colectare până la valorificare sau eliminare, prin folosirea codului de trasabilitate. Astfel, vor cunoaște în orice moment unde se află deșeul în cadrul procesului de transformare.

Aplicația este integrată cu Managementul Financiar-Contabil, Managementul Stocurilor, Managementul Activității de Laborator, Managementul Transporturilor din pachetul informatic integrat SIVECO Applications 2020.

”Implementarea se face cu ușurință, iar oamenii noștri asigură suportul pentru instruirea tuturor celor care vor lucra cu aplicația Managementul Deșeurilor. Referitor la costuri, soluția a fost realizată astfel încât să funcţioneze şi în Cloud. Astfel, organizaţiile pot beneficia de o îmbunătăţire semnificativă a cheltuielilor cu infrastructura informatică. Serviciile cloud oferă şi alte avantaje, precum flexibilitate în alocarea de resurse hardware şi protecţie permanentă a datelor stocate. Componenta se implementează rapid, modificările impuse de eventuale schimbări ale legislaţiei sunt realizate în cel mai scurt timp de la apariţia acestora cu ajutorul componentei de configurare/ parametrizare de care dispune sistemul şi a echipei de suport tehnic din cadrul departamentului,” spune Ștefăniță Ghiță, director adjunct departamentul SIVECO Applications.


  • Cea mai frecventă contravenție din domeniul protecției mediului este gestionarea defectuoasă a deșeurilor. Ce se stie mai putin este ca în acest domeniu amenzile sunt uriașe, pot fi cumulate și se aplică și retroactiv.
  • Anual, cantitatea totală de deșeuri generate la nivelul României este de 10,2 tone de persoană, peste dublul mediei UE. Doar cinci alte țări au produs mai multe deșeuri pe cap de locuitor în UE în anul 2010: Bulgaria, Luxemburg, Finlanda, Estonia și Suedia.
  • 96 % dintre europeni consideră că este important ca Europa să își utilizeze resursele mai eficient.
  • În legea privind regimul deșeurilor, amenzile pornesc de la 1.000 lei și ajung la 40.000 lei.

Articol publicat în Catalogul Cloud Computing Romania – ediția a 4-a: Internet of Things, pag.21, Decembrie 2015

EuroCloud Romania a dat startul in competitia anului

Banner Mare EuCloud Awards

Asociatia invita furnizorii romani de servicii cloud sa participe la a patra editie nationala consecutiva EuroCloud Award.

EuroCloud Award 2016 LogoPentru al patrulea an consecutiv, asociatia EuroCloud Romania organizeaza traditionala competitie a premiilor nationale EuroCloud.

Scopul competitiei este de a pune cat mai bine in valoare solutiile inovatoare de Cloud si implementarile de succes. EuroCloud promoveaza in permanenta performantele industriei romanesti de cloud si incurajeaza mentinerea unui climat competitional la nivel regional si continental.

Premiile EuroCloud Romania fac parte din competitia europeana, care si in acest an va aduce in prim plan cele mai inovatoare servicii si proiecte de Cloud din Europa, selectate din cadrul castigatorilor fazei nationale.

Marea surpriza din acest an este ca Gala festiva de decernare a premiilor EuroCloud Europe 2016 va avea loc in cadrul Congresului EuroCloud Europa care se va desfasura la Bucuresti, in perioada 5-6 octombrie 2016. Un juriu de experti independenti ii vor desemna pe cei mai buni dintre cei mai buni in cadrul Galei speciale care va avea loc pe 5 Octombrie 2016 la Hotel Athenee Palace Hilton, in cadrul Congresului EuroCloud 2016.

De ce sunt importante premiile EuroCloud

Premiile EuroCloud promoveaza conceptul Cloud, prezinta cazuri de aplicare a solutiilor Cloud, ofera o larga vizibilitate solutiilor puse in competitie de catre companiile participante si reprezinta o recunoastere nationala si internationala a competentelor si proiectelor lor.

Pentru a aplica si inregistra compania dvs in concurs va rugam sa cititi cu atentie Termenii si Conditiile competitiei

si sa completati FORMULARUL ONLINE.

Buton EuroCloud Awards

Ce aveti de castigat?

Castigatorii premiilor EuroCloud Romania 2016 vor primi un pass de intrare gratuit la EuroCloud Forum 2016 Bucuresti si la Gala Premiilor EuroCloud Europa. Evenimentul anual al organizatiei EuroCloud Europa se va desfasura sub tema „Digital Single Market – Creating New Frontiers in European Cloud” si va aduce impreuna 1000 participanti din toata Europa la Romexpo Bucuresti in perioada 5-6 Octombrie 2016. Pentru mai multe detalii va rugam vizitati siteul evenimentului la

De asemenea solutiile castigatoare la nivel national vor fi incluse in catalogul nominalizarilor la Premiile EuroCloud Europa care va fi distribuit cu ocazia EuroCloud Forum 2016.

Castigatorii concursului vor fi prezentati intr-un interviu care va fi publicat pe siteul cat si pe siteul partenerilor EuroCloud.

Categoriile puse in competitie

Pentru furnizorii de solutii sau servicii cloud

  • Cel mai bun serviciu cloud pentru piete orizontale – Aceasta categorie va evidentia serviciile cloud care pot fi folosite in diferite segmente orizontale de piata, cum ar fi aplicatiile ERP, CRM, serviciile IaaS, etc.
  • Cel mai bun serviciu cloud pentru piete verticale – In aceasta categorie vor intra serviciile cloud care vin in sprijinul clientilor din piete verticale, cum ar fi in Logistica, Agricultura, Industria Hoteliera si altele.
  • Cel mai bun serviciu de cloud Startup – In aceasa categorie focusul va fi pus pe serviciile cloud oferite de startupuri romanesti.
  • Cel mai bun serviciu de migrare in cloud – Acesta categorie e destinata consultantilor, integratorilor, furnizorilor de servicii cu valoare adaugata si urmareste sa recompenseze organizatiile romanesti care au atins un nivel de excelenta in oferirea de servicii de migrare in cloud.

 Pentru utilizatori de solutii sau servicii cloud

  • Cel mai mare impact in business – Acest premiu va fi atribuit unei organizatii uilizatoare de servicii cloud, adesea ajutata, promovata sau sponsorizata de catre furnizorul serviciului cloud.


Pentru alte amanunte legate de costurile participarii, termenul de admitere a candidaturii, criteriile de apreciere, cine poate candida,  cum va puteti inscrie in concurs si componenta juriului vizitati pagina oficiala EuroCloud Awards 2016.


Oracle push Cloud adoption in Romania


Oracle Cover

Oracle was one of the first big IT providers opened an office in Romania in 1995. From more than 20 years Oracle Romania played the role of the software market leader, having a substantial contribution to development of local software industry and in technology progress of Romanian economy. Oracle’s clients are part of most important industries like: energy, manufacturing, utilities, financial, government, healthcare, education and more.
Oracle 2Early in the 2000’ years Oracle was also one of the first IT vendors who invested in Romanian high-tech skills, opening of the global services centers in Romania. Today Oracle Romania has over 4100 employees in the country in high standard buildings from Bucharest and Iasi.

Beside key administrative functions for customers, partners and Oracle organisations Romania is also home for core development teams and teams helping customers to realize successful IT projects. To name a few:

  • Oracle Product Development
  • Oracle Advanced Customer Support
  • Oracle Software Support Services

Oracle is a key contributor globally to IT education through its Oracle Academy Program.  Oracle Academy currently supports 664 institutions and over 52,000 students in Romania. In 2016 we are training 200 teachers in Java Fundamentals and Java Programming

Sorin Mindrutescu - Oracle Country Leader Romania & Central Eastern Europe Cloud Leader

Sorin Mindrutescu – Oracle Country Leader Romania & Central Eastern Europe Cloud Leader

With more than 420,000 worldwide customers and with deployments across a wide variety of industries in more than 145 countries, Oracle offers a comprehensive and fully integrated stack of cloud applications, platform services, and engineered systems.

“Switching to cloud model is a turning point in which we leave as leader on each of the segments and this makes us feel ready for this challenge, not only in the CEE region, but globally also. Perhaps the most important thing now, is the Oracle’s guiding principle: understanding customer needs, anticipating trends in the market and building solutions designed to meet these needs – in close relationship with the trust Oracle has built at customer level due to the very good understanding of real requirements,” said Sorin Mindrutescu – Oracle Country Leader Romania & Central Eastern Europe Cloud Leader, in an exclusive interview for cloud☁mania.

Oracle has built carefully Cloud strategy in recent years, investing and developing applications and technologies with the clear and transparent goal to become the market leader in this area in the shortest time. Market interest in Cloud solutions (both at business and IT level) brought Oracle in position to rapidly address new strategic themes of discussion with Romanian clients.

Related articles:







%d bloggers like this: