Author Archives: CloudTweaks

Future Tech – Wearables And The Smartphone

Future Tech – Wearables And The Smartphone

future-tech

Wearable technology seemed like something of a far away future just a few short years ago but is now doing a complete take-over. The market for wearable technology has completely exploded over the past two years or so, and is signaling what could be the end for smartphones. There are still those who are split in terms of  adopting the concept of wearable technology and stick to their smartphones like glue, however.

So many different wearable gadgets are available on the market today that it feels like we are all living in the Jetson’s world. There are those who get excited about chatting through a wrist phone, but there are also those who find the whole concept of it too ‘techy’ and somewhat scary. Technology has come a very, very long way from where it once was and does not look like it will slow down in production anytime soon.

The benefits that team up with wearable technology have yet to be crystal clear, except for entertainment and ease. Wearable technology, such as Google Glass or the Sproutling, are designed to give us a break out of our extremely busy lives. Wearables are supposed to give us an advantage in life, such as knowing when your baby is awake before he or she can start wailing. All of these different gadgets with different purposes have moved the world of technology to a new, exciting world, where you can check the scores of last night’s football game without pulling out a smartphone or a computer, but by simply looking up and using a voice command.

The newest piece that is coming to light is the iWatch. Apple is known for keeping the markets that are involved in their projects in the dark completely until the very last minute, but what they are planning now is huge. The iWatch is not only going to be one of the latest ‘must haves’ on the market, but one that is really going to stir the pot up quite a bit. Right now, however, there has been no definitive answer made about the iWatch’s appearance, or what it’s going to be capable of that will separate itself from what the iPhone is capable of. That in itself has got a lot of people fired up, solely based on the mystery and anticipation of what the iWatch is going to be like overall.

This simply just goes to show that more wearable pieces of technology are storming the market than smartphones. However, the newest smartphone and what it is capable of is enough to get an entire crowd going, but wearable technology does have that ‘newer’ feeling to it. Wearable tech takes the element of being the odd man out by wearing something particularly odd, such as Glass, and gives you the intimate feeling with it.

With that said, not every person who has a cell phone these days has converted over to smartphones and upgraded technology. However, wearable technology strikes our curiosity, while smartphones are pieces that we already know front and back, for the most part.

By Linda Green

Veda Partners With IBM And Prepares For Next Phase Of Growth

Veda Partners With IBM And Prepares For Next Phase Of Growth

Veda Partners with IBM and Prepares for Next Phase of Growth

SYDNEY, Aug. 21, 2014 /Source: PRNewswire/ — IBM (NYSE: IBM) today announced it has signed a five-year multimillion dollar agreement with Veda (ASX: VED), a leading provider of credit information and analysis in Australia and New Zealand. The agreement extends Veda’s existing strategic outsourcing relationship with IBM, which continues to provide Veda with a highly reliable and resilient infrastructure, and now includes cloud services.

IBM LOGO

The contract reflects the deep partnership between IBM and Veda, and the value that the partnership has delivered to our business,” said Veda’s CEO Nerida Caesar. “Being a business based on using data and analytics to provide insights, we are constantly looking at the best way to manage and deliver the most accurate insights to our clients. To this end, we have already deployed one of our systems that supports comprehensive credit reporting (CCR) on IBM’s flexible infrastructure.”

This extended agreement assists Veda’s growth strategy, as it provides a scalable solution to support Veda’s introduction of CCR products in response to the credit industry’s most significant reform in recent times.

Included as part of the amendments to the Privacy Act 1988, CCR requires five additional data fields in order to provide a more complete picture of a consumer’s credit activity. Veda expects that the volume and mix of data relating to credit reporting will grow rapidly as companies realise the benefits of CCR. This prompted Veda to expand its relationship with IBM, to support the expected growth of data and analysis that CCR will bring.

Veda’s customers range from financial services organisations, utility companies and telecommunications providers, with its core product offering being the provision of credit reports in relation to individuals and businesses. It carries credit information on 20 million individuals and 5.7 million commercial entities in Australia and New Zealand.

We are excited to support Veda as it navigates through a significant time of transformation within the credit reporting industry. The ability to support clients during phases of critical growth in a complex business environment is what differentiates IBM as the leading infrastructure and cloud service provider,” said Jeffrey Rhoda, General Manager, IBM Australia and New Zealand.

Veda listed on the Australian Stock Exchange (ASX) in December last year and is continuing to grow its product and market portfolio. The IBM project will be a key strategic pillar to support Veda’s growth plans.

About IBM Cloud Computing

Today, IBM has 100+ cloud SaaS solutions, thousands of experts with deep industry knowledge helping clients transform and a network of 40 data centers worldwide. Since 2007, IBM has invested more than $7 billion in 17 acquisitions to accelerate its cloud initiatives and build a high value cloud portfolio. IBM holds 1,560 cloud patents focused on driving innovation. In fact, IBM for the 21st consecutive year topped the annual list of US patent leaders. IBM processes more than 5.5M client transactions daily through IBM’s public cloud. For more information about cloud offerings from IBM, visit http://www.ibm.com/cloud. Follow us on Twitter at @IBMcloud and on our blog at http://www.thoughtsoncloud.com. Join the conversation #ibmcloud.

About Veda

Veda (ASX:VED) is a data analytics company and the leading provider of credit information and analysis in Australia and New Zealand. From its core credit bureau business established in 1967, Veda has expanded to deliver a suite of credit and other analytical products targeted to specific industry segments.

Veda is built on the largest, most comprehensive and current data source in Australia and New Zealand with information on over 20 million credit active people and 5.7 million commercial entities. The breadth and depth of our data, and the knowledge it delivers help customers take a proactive and informed approach in making decisions.

Veda’s customers use data intelligence provided by Veda to make decisions on credit risk, verify identity and employee background, reduce identity theft and fraud, and undertake digital marketing strategies. www.veda.com.au

SOURCE IBM

Pinup: Wearable’s Specifically For Teenagers On The Rise

Pinup: Wearable’s Specifically For Teenagers On The Rise

Pinup: Wearable’s Specifically For Teenagers On The Rise

Teenagers have nothing in common with calorie counters, and the guys and girls behind wearable technology have taken note of that. An entirely new breed of wearable technology will be emerging in the near future, and will be targeted at teenagers and what they like to do. This includes extending imaginations and engaging social behavior between the teenage populations.

adam-adelman

Mighty Cast is one of the many companies who are developing the wearable technology for young adults, while Juno Baby, Adam Adelman’s company, did focus groups just a few years ago. The focus groups were for the purpose of testing a story concept for children, which was a fantasy story that featured a magical charm bracelet. The bracelets enabled members of a secret society to message and contact each other, which did not go well.

The test group did not go well because the members, teenagers, just wanted to know where they could get the magical bracelet from the story. This lead Adelman and colleagues with a very big decision; ignore the demand, or supply. Adelman is now the CEO, almost three years later, of Mighty Cast, who is currently producing the magical charm bracelet.

nexband

(Image Source: MightyCast.com)

This bracelet, the NEX Band, is the first modular smart band and is targeting the tween, teen and young adult age groups. The band can track friends through the proximity, act as a game console worn on the wrist, which enables different powers and can be used to message friends. Wearers can add in different charms, or ‘mods’, to change how their bracelet functions. Adelman has said that the NEX Band’s modularity holds the biggest advantage because the band has the ability to grow with the wearer. Even though the young testers of the band are interested in the games, the older children are interested in the fashion components, the customization notifications and the proximity features.

Mighty Cast has put bets down that since the new modifications are able to be added while the technology develops over time and also as the wearer changes, the modularity will protect against the obsolescence that will come from the NEX Band.

A million dollar grant was recently won by Might Cast from the Canadian government, for the purpose of developing and bringing the story to life of the NEX Band’s platform. This will be done through an application that will enable users to play on their NEX Band, and will be a social, mobile-based game where users will find each other through the proximity with total ease. Unlocking secrets and exchanging moods between players, or users, will be enabled. Users will also be able to create their own content that will be user-generated, and suited to them specifically.

However, when it comes to the overall design of the NEX Band, that’s where it gets tricky. Fashion-conscious teens still exist, and to ensure that teenagers will actually wear the band, Adelman has turned to the users for the design process.

By Linda Green

Cloud Infographic: Startup Soup – Hot or Cold?

Cloud Infographic: Startup Soup – Hot or Cold?

Cloud Infographic: Startup Soup – Hot or Cold?

It is not easy running a startup, but it’s getting much easier due to the availability and low cost of Cloud computing and its related services.  This will inevitably mean more competition, but with the growing interest in Big Data, IoT, Cloud Computing, Wearable Technology and Clean Technology, there will be a tremendous number of options to demonstrate innovation.

The bad news is that most of the startups don’t last past the first few years as seen in the infographic provide by SurePayroll.com.  However, the good news is that VC’s are out in full-force spending boatloads on new products and services. This is very good news to startups which are innovative, stick through the tough times and make smart sound business decisions.

startups-cloud

vArmour Raises $36 Million To Protect The Data Defined Perimeter

vArmour Raises $36 Million To Protect The Data Defined Perimeter

Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures Contribute Funds to Accelerate Development of Disruptive Technology, Scale to Meet Global DemandvArmour

MOUNTAIN VIEW, CA–(Source: Marketwired – Aug 20, 2014)vArmour, a stealth security company designed to protect the new data defined perimeter for enterprises, today announced it has raised $36 million in funding, including a Series B round closed in December 2013 ($15 million) led by Menlo Ventures and a Series C round closed in August 2014 ($21 million) led by Columbus Nova Technology Partners (CNTP), Citi Ventures and Work-Bench Ventures, bringing total company funding to $42 million. vArmour will use the capital to scale development and sales teams to help the enterprise protect their new data defined perimeter in today’s reality of pervasive virtualization, constant threats and advanced security breaches.

“vArmour has the escape velocity to completely disrupt the security industry,” said Mohsen Moazami, Founder and Managing Director, CNTP. “We went all in on vArmour as I’m confident that vArmour’s continued growth will deliver a solution for the enterprise that can visualize, manage and ultimately protect the data center in a way we’ve never seen before.”

Our investment in vArmour is a testament to the potential for its technology to shape the future of enterprise security for the data center,” said Arvind Purushotham, Managing Director at Citi Ventures. “As an organization that supports billions of secure transactions per day, Citi is dedicated to consumer trust and vArmour’s management team shares our vision for the importance of enterprise security.”

Three-fourths of organizations have active command-and-control communications, indicating that attackers have control of breached systems and are possibly already receiving data from them.* As massive, growing amounts of data continue to be distributed on a global scale, security controls need to move deep into the data center and be as dynamic as the applications and data they protect. There, at the data defined perimeter, vArmour provides the needed protection dynamically and securely by giving enterprises instant visibility and control of their East/West traffic flows for both old and new data centers architectures.

Advanced targeted attacks are easily bypassing traditional firewalls and signature-based prevention mechanisms. All organizations should now assume that they are in a state of continuous compromise. However, organizations have deluded themselves into believing that 100 percent prevention is possible, and they have become overly reliant on blocking-based and signature-based mechanisms for protection. As a result, most enterprises have limited capabilities to detect and respond to breaches when they inevitably occur, resulting in longer ‘dwell times’ and increased damage,” wrote Neil MacDonald and Peter Firstbrook of Gartner.** “In reality, going forward, improved prevention, detection, response and prediction capabilities are all needed to deal with all types of attacks, ‘advanced’ or not. Furthermore, these should not be viewed as siloed capabilities; rather, they should work intelligently together as an integrated, adaptive system to constitute a complete protection process for advanced threats.”

As part of the investments, Pravin Vazirani, general partner at Menlo Ventures and Mohsen Moazami, CNTP, will both join the vArmour Board of Directors. Recently, Lane Bess and Dave Stevens, both previous CEOs of Palo Alto Networks, were also announced as investors and vArmour board members, offering their combined 60 years of experience leading and growing security, data center and tech start-ups, including current roles at Brocade and Zscaler. The company, which has been in stealth-mode since its founding in January 2011, previously announced a $6 million Series A led by Highland Capital in January 2013 and is now prepared to launch later in 2014.
Our investors saw first-hand vArmour’s large scale deployments of advanced data center security technology on a global basis and they realized that we have created something extremely valuable that solves a strategic issue for the enterprise,” said Tim Eades, vArmour CEO. “Today, our board represents some of the best minds in security with Lane and Dave from Palo Alto Networks, now joined by Mohsen from CNTP and Pravin from Menlo. With our all-star team throughout the US, EMEA and APAC, we’re in the best position to bring this technology to market and forever change the rules for security in the data center.”

Those interested in learning more about the newly defined data perimeter and East/West traffic flows are invited to attend an upcoming webinar on August 20. For more information on the webinar, presented by vArmour, distinguished ESG analyst Jon Oltsik and Demetrios “Laz” Lazarikos, Blue Lava Consulting IT Security Strategist and former CISO for Sears Online, visit vArmour.com.

vArmour is continuing to grow and is aggressively hiring at all levels. For those interested in learning more, visit vArmour.com.

*Source: FireEye

**Source: Gartner, Designing an Adaptive Security Architecture for Protection From Advanced Attacks, 12 February 2014 G00259490, Neil MacDonald | Peter Firstbrook

About vArmour

Based in Mountain View, Calif., vArmour is a stealth security company focused on securing the data defined perimeter of enterprises. The company has raised $42 million in funding led by Highland Capital Partners, Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures. Executives from NetScreen, Juniper Networks, Silver Tail Systems, Citrix, Riverbed and IBM lead the company, which will launch in 2014. Learn more at www.varmour.com.

Wearable Technology To Monitor Disease

Wearable Technology To Monitor Disease

Wearable Technology To Monitor Disease

Technology has something for everything these days, now even disease monitoring. A wearable vapor sensor that is currently under development at the University of Michigan might just offer disease monitoring continuously for patients who have diabetes, lung disease, anemia and high blood pressure. The market for wearable technology itself is exploding and expected to go up to $14 billion by the next four years or so.

The sensor will be able to detect chemicals that are airborne, from either being released through the skin or exhaled from the lungs, and will most likely be one of the first, if not the only, piece of wearable technology that will be able to pick up on a broad array of not physical, but chemical attributes. The researchers at the University of Michigan are working together with the National Science Foundation’s Innovation Corps program for the purpose of moving the gadget out of the labs and into the market.

When it comes to wearable technology, everything that could ever be done, is about to get done. Technology has come a long way, from the first ever computer all the way to a piece of technology that can be worn to monitor someone who has issues with their diabetes. The world we live in is truly extraordinary, and technology has yet to slow down.

Each disease that can be detected by the device has its own special biomarker, such as acetone for diabetes. It will also be able to detect oxygen and nitric oxide and abnormal levels overall which could further pinpoint lung disease, anemia and high blood pressure, to name a few. The sensor will also be able to identify a broader array of chemicals as well. The sensor is being developed by Fan and Zhaohui Zhong, who is an associate professor of computer engineering and electrical, as well Girish Kulkarni, who is a doctoral candidate in electrical engineering. The researchers have said that the device is smaller, more reliable and faster than the counterparts that are too bulky and big to be worn.

The sensor also has applications that have the ability to register and notify of a hazardous chemical presence in places like a lab, or public area. This application alone could save lives, and will prove itself to be extremely beneficial to those who work in careers or industries that are surrounded by chemicals. Once the sensor has detected a chemical leak, data about the overall air quality will be provided.

With our platform technology,” says Zhong, “we are able to measure a wide variety of chemicals at the same time, or modify the device to target specific chemicals. There are limitless possibilities here.

The researchers, to create this piece of technology, took an extremely unique approach when it comes to detecting molecules. Kulkarni says that, “Nanoelectronic sensors typically depend on detecting charge transfer between the sensor and a select molecule that is currently in the air at the time, or in the solution.”

By Linda Green

Pinup: Sproutling – Wearable Technology For Your Baby

Pinup: Sproutling – Wearable Technology For Your Baby

Pinup: Sproutling – Wearable Technology For Your Babysproutling

It’s safe to say that everything that could be done in this day and age, is now done. Sproutling, a wearable baby monitor, is one of the latest pieces of wearable technology that the world is absolutely raving about. The Sproutling itself looks just like a FitBit, an activity tracker for exercising purposes, and comes from a team that is behind Google and Apple products.

The Sproutling is a baby monitor but is very special in its own way. The device monitors the baby’s activity and will let you know directly when your baby is moving around, what trouble he or she is up to, but without the audio or the traditional video. Instead of hearing your baby making noise, Sproutling will alert you through the application on your smartphone or tablet about what your baby is doing.

monitorThe application that can be downloaded from the application store on any smartphone or tablet keeps track of when your baby is asleep or awake, and also how long he or she has been sleeping for. Interestingly enough, Sproutling is also capable of telling you your baby’s mood. For example, your baby wakes up at 2:00 am crying. The notification that comes from your smartphone or tablet will read, “Awake and fussy“, and is also capable of warning you about noise levels. If there is a noise in the house, like a blender running in the kitchen that could wake your sleeping baby, a notification will pop up telling you so.

There are also some extraordinary safety features with the Sproutling, such as notifying you if there is a sudden spike in the baby’s temperature, a change in his or her heart rate, or if he or she has made an unusual roll in the crib. If any of these situations should occur, you will receive a red notification instantly telling you so. The safety features that come with this device are remarkable, and any parent who worries about their baby should look into it.

The Sproutling application itself is currently only available for iOS, however, it is coming up for Android devices as well. The entire Sproutling device includes three different pieces; a sensor piece for the band that measures temperature, the baby’s position and movement, if the band has been taken off, and heart rate. There is also a wireless charger included, which needs just two hours of charging every three days, and the actual band itself.

As an extra safety feature, the sensor piece itself is encapsulated inside a silicon of medical-grade and is completely sealed. This ensures that the sensor piece will not be at risk to the baby as a choking hazard. Those who want to know more about the Sproutling, should visit the official website.

By Linda Green

CloudTweaks Comics
4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The CloudTweaks Archive - Posted by
Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart City Collaboration A study from research firm Gartner demonstrates how smart and connected cities require a large number of players to collaborate efficiently, in order to unlock the huge potential associated with cities of the future. The study focused on Europe and showed clearly how a number of Northern European and Scandinavian mid-size cities…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…