Author Archives: Steve Prentice

IoT: Connected Manufacturing Leads To Service as a Product

IoT: Connected Manufacturing Leads To Service as a Product

Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of…

The Lurking Threat Called Passivity

The Lurking Threat Called Passivity

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around the world using Internet connections to break in and wreak havoc. But surprisingly, a significant…

Hybridization: The Executive Roundtable

Hybridization: The Executive Roundtable

Hybridization When discussing migration to the cloud, the use of hybrid cloud and all other cloud-related issues, people generally place the focus on the technology itself. What sometimes gets overlooked is the group of individuals who are — or at least, should be — responsible for the precise and successful integration of cloud into a…

The Soft-Edged Cloud: A Security Challenge

The Soft-Edged Cloud: A Security Challenge

The Cloud Security Challenge The use of the term “cloud” to describe global, offsite, computing and storage technology is apt for a number of reasons; not all of them good. The metaphor succeeds largely when people visualize their data hovering over their heads, no longer tied to a single location, and consequently easy to access…