Category Archives: Big Data

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete – take call centers as an example – there is only so much that you can do with data from…

ServiceNow Acquires Machine-Learning Company, DxContinuum

ServiceNow Acquires Machine-Learning Company, DxContinuum

SANTA CLARA, Calif. – Jan. 18, 2017 – ServiceNow (NYSE: NOW), the enterprise cloud company, today announced it has agreed to acquire DxContinuum in an all‑cash transaction expected to close this month. The pioneer in intelligent automation, ServiceNow can further increase productivity for its customers by applying machine‑learning capabilities and data models developed by DxContinuum. As more Internet of Things devices make service requests, it is increasingly important that those requests be categorized, routed and responded…

Cisco Introduces New Data and Analytics Training Portfolio

Cisco Introduces New Data and Analytics Training Portfolio

Cisco Enriches Training and Certification Portfolio in Support of Latest Skills and Technologies Needed for Digital Business Transformation SAN JOSE, CA–(Marketwired – Jan 17, 2017) – To support the skills needed for world-class digital business transformation, Cisco (NASDAQ: CSCO) today announced a new data and analytics training portfolio and significant updates to its data center certification track. The new data and analytics offerings focus on integrated data management and virtualization, teaching in-demand skills needed to connect…

BCG Survey Names 50 Most Innovative Companies

BCG Survey Names 50 Most Innovative Companies

50 Most Innovative Companies Report Spotlights a Growing Imperative for Companies to Balance Internal and External Innovation and Get Beyond a “Not Invented Here” Mindset BOSTON, MA–(Marketwired – Jan 12, 2017) – Apple, Google, Tesla, and Microsoft retain the top four spots in The Boston Consulting Group’s annual survey of the most innovative companies. Amazon moves up four spots to round out the top five. Netflix and Facebook join the top 10 for the first…

How Industrial Robots Will Brighten Our Future

How Industrial Robots Will Brighten Our Future

Industrial Robots The so-called “Robolution” is happening as we speak and has never been more obvious than it is today. Picture this: Would your parents – or even yourself – have thought, let’s say, 10 years ago that robotics would become such an inalienable component of our professional lives? Hard to believe, unless your parents were science fiction writers… The tremendous increase in interest for robots is mostly noticeable in such countries as the United…

Clutch Survey Explores Which Cloud Providers Companies Prefer

Clutch Survey Explores Which Cloud Providers Companies Prefer

Clutch Cloud Provider Survey Clutch, who is a leading IT ratings and review firm in the B2B space, recently held a survey to find out which of the various large cloud providers that companies prefer. The survey found that larger enterprises prefer to use Microsoft Azure, while SMBs (small-to-medium businesses), strongly preferred the Google Cloud Platform. The purpose of this survey and study was to learn more about these cloud providers and the companies who…

The Reasons Why Data Is The New Oil

The Reasons Why Data Is The New Oil

Data Revolution The industrial revolution was driven by fossil fuels, coal gas and above all oil, were becoming highly sought after. Wars were fought, regimes toppled, and thousands of people died, all in the pursuit of a little taste of black gold. Countries like Dubai would barely make an impact on the world, were it not for their vast oil reserves, and throughout the 20th and 21st centuries, oil companies have become most profitable companies…

Analyzing the Ethical Use of Big Data

Analyzing the Ethical Use of Big Data

Ethical Use of Big Data Big Data, a market predicted to grow exponentially in the next few years, is playing an important, albeit it behind-the-scenes role, in many of our most exciting and revolutionary technologies. Artificial intelligence and machine learning rely on big data analytics, while the Internet of Things both provides and utilizes troves of Big Data, and organizations of every kind are recognizing the value of Big Data and finding new ways to…

Candidate Tracking and New Hire Onboarding – Future Automation

Candidate Tracking and New Hire Onboarding – Future Automation

Candidate Tracking Systems Annually, $400 Billion are being spent on recruiting services and systems and even then, businesses are struggling to find the right talent, interested candidates are not finding their dream jobs, and star talent are still stuck in a job which they are not interested in doing. One of the main reasons behind these frustrations amongst the hiring managers, recruiters, and candidates is the use of outdated systems like emails and spreadsheets for…

What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had a huge increase in data breaches, including some of the largest in history; an uncertain future when it comes to cybersecurity policies; new European regulations that have major implications for U.S. companies; and yet, business carries on. Despite all the challenges and risks, businesses will continue to move forward on digital transformation, cloud adoption and…

CloudTweaks Comics
The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one step closer to a floor debate. Most recently, President Obama unveiled his new Cybersecurity Legislative Proposal, which aims to promote…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through “sensory lenses”. We digitize the results and make them available via networks. Finally, we put all the networked information into…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and it goes far beyond the smartphone in your pocket or the watch on your wrist. Innovations like the smart home…

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart Connected Cities Must Learn To Efficiently Collaborate

Smart City Collaboration A study from research firm Gartner demonstrates how smart and connected cities require a large number of players to collaborate efficiently, in order to unlock the huge potential associated with cities of the future. The study focused on Europe and showed clearly how a number of Northern European and Scandinavian mid-size cities have excelled in laying the groundwork of a sustainable, clean framework for growth and development, particularly in countries such as…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t Tase Me, Bro, esteemed internet celebrity. However, if you think viral infamy is your worst-case scenario when it comes to…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which was released on November 9 2015. The report finds that “Organizations are using cloud to create new customer experiences, reengineer…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections for cloud remain healthy, and there is optimism in the air. A recent roundup of projections in Forbes paints the…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use of data exceed the advantages to be gleaned, then it’s a pointless exercise. Fortunately, as data volumes have grown, so…

Battling With Bandwidth – Average Cost of DDoS Attack Was $40,000 An Hour

Battling With Bandwidth – Average Cost of DDoS Attack Was $40,000 An Hour

High Cost of DDoS Attacks Distributed Denial of Service (DDoS) attacks involve the use of multiple compromised systems, often infected with a Trojan, to target a single system. The array of compromised systems flood the resources or bandwidth of their victims, typically one or more web servers, in an attempt to make an online service unavailable to its users. Earlier this year, one report noted that DDoS attacks had doubled in the first quarter as…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake. Google’s OnHub router works with Weave, which the tech giant recently received in its acquisition of Nest, in a clear play to become the…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government began to legislate their use. In 1986, the Comprehensive Crime Control Act was amended to included the Computer Fraud and…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly darken your cloud. And as far as performance is concerned, it’s simply not ideal to be hosting large files such…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more frequently what you are really looking at is more like death by a thousand cuts. Cloud makes this easy to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how they want to work, and even where they want to work — a onetime executive luxury that is increasingly available…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth taking a moment to assess both options to determine what is best for you. There are a lot of considerations…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US, where the government had charged him with violations of the Espionage Act. Journalists boarded a flight from Moscow to Havana…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw in 2014 to a whopping $84 billion global market by 2019. Hybrid cloud environments offer companies the resilience and scalability…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported that 87 percent of respondents had faced a disruptive incident with third parties in the last two to three years.…