Category Archives: Cloud Computing

Is It Time For Your Small Business To Take CRM Seriously?

Is It Time For Your Small Business To Take CRM Seriously?

Small Business CRM

Nothing is more important to a small business than creating and nurturing solid relationships with its customers and treating them in ways that lock in their loyalty for many years to come. But customer relationship management (CRM) is hard work and very time consuming without the right tools to tackle the challenge. Making that relationship easier to manage is the reason why multi-national software company SAP has developed SAP Digital CRM, an all-in-one solution that can centralize the administration and record keeping of the entire spectrum of customer engagement within a company.

You may think that your small business doesn’t need this kind of software; that you really know and understand your customers and their individual needs. While that may be true, that kind of thinking does limit your ability to expand your business while maintaining such high quality relationships.

So what are the signs that you need to make the move to a CRM solution?

  • If you are relying on personal memory to keep track of customers preferences and requests
  • If you do not have a system that tracks the current status of requests
  • And if your records are not accessible and shareable from any of your devices.

These are all common business challenges. It should be reassuring to know that there are software solutions out there that are easy to implement, and allow you to focus on your core strengths while maintaining the quality of relationship that you have worked so hard to develop.

Watch this video to get an insight into how SAP Digital CRM could work for you:

There are a number of key features of the solution which are worth highlighting that will really bring home the value of SAP Digital CRM to a small business owner. When each member of a team logs on, they are directed to a personalized homepage on their mobile device that displays all the relevant information for that day in a simple format. Appointments, pipelines, forecasting, to-do list – all are there in one easy-to-use view.

First-class service for customers is at the heart of SAP Digital CRM. The dashboard allows you to create tickets that manage all the customer queries in one place. Those tickets can be escalated, assigned to specific members, and commented on via notes all the way through. Furthermore, you can select activities that need to happen on each of the tickets, such as a follow-up call or a new task, and you can manage the status of the ticket constantly. Customers who receive proactive and effective service never forget it and are likely to remain loyal. A recent study by Twitter itself confirmed the widely held belief that responsive customer engagement leads to greater customer loyalty in meaningful ways. In the airline industry, a responsive tweet to a customer within the first six minutes after a query results in the customer willing to pay $20 more for service. Furthermore, a response to a negative tweet from a customer has resulted in a favorable perception from customers in 69% of cases.

There are massive opportunities for businesses who are willing and able to engage with prospects via Twitter. That’s why it is so beneficial that SAP Digital CRM can be attached to a company’s Twitter feed, in order to monitor and respond to customer queries or conversations around the brand, and even to escalate tickets that demand an urgent response from disgruntled consumers before they start badmouthing a brand to their followers. This is a simple, low-cost option that should be mandatory for any brand working in the digital space.

Read the Twitter blog on Responding to customers:

When it comes to generating and nurturing new leads, SAP Digital CRM makes it easier than ever. In order to keep growing you need to make sure that your message is being seen by the right people, and that you are ready to respond when prospective customers reach out. SAP Digital CRM lets you create targeted email campaigns, rank your leads in terms of any number of metrics and measure how effective your marketing campaign has been. And all this from a simple, all-in-one platform.

It’s no secret that happy, loyal customers are the foundation of any successful business. If you are ready to unleash your full potential, to steer your sales teams to greater heights and grow your business the way you’ve always dreamed of, then it’s time to consider a simple and effective way of making customer engagement central to everything that you do, while freeing you up to keep the business growing.

SAP Digital CRM is available for only $23 per user/month, and you can try it free for 30 days here, no credit card required. (10% on SAP Digital CRM Promo Code: DCRM10LIST)

Sponsored spotlight series by SAP

By Jeremy Daniel

Growth Hacking Your Startup Into The Cloud

Growth Hacking Your Startup Into The Cloud

SaaS Growth Hacking

Growth hacking could be just the kick your business’s marketing strategy needs but knowing that the cheap and prolific tools and tactics work and knowing how to make them work for you are two different things. We take a look at who to get advice from, which brand strategies to replicate, and where to get the how-tos.

A Few of the Experts

growth-hacking-followers

Though there’s no definitive list of growth hacking experts, there are a few who’ve made a name for themselves in the field and continue to develop their art. Sean Ellis is notable not only for coining the term ‘growth hacking’ but also for the marketing triumphs of Dropbox, LogMeIn, and Eventbrite (to name a few). Check out Sean’s Twitter feed for some valuable advice. Neil Patel, co-founder of CrazyEgg and KISSmetrics, is another digital marketer with an excellent reputation and a list of top tier clients he’s helped to grow. Considered a top influencer on the web by the Wall Street Journal, Neil provides tons of quality growth-hacking content on advertising, SEO, content marketing and much more. Though the range of experts worth tapping includes far more than mentioned here, Brian Dean rounds us off with specialist SEO expertise that helps organizations build traffic growth through SEO. Brian keeps thing simple with a few key strategies and detailed step-by-step tutorials for decisive success.

Influential Brands

brands-tech

But don’t just take the experts’ word for it; it’s always a good idea to have a look at the growth hacking success stories to see what might best fit your own business. Hotmail made excellent use of simple email tag lines that invite new users through mail sent out by existing users, and both Gmail and Pinterest exploited the public’s love of exclusivity to create a buzz through invite only access. Twitter’s automatic suggestions of new users to follow have encouraged broader connections and sustained use, a version of upselling that when correctly employed is extremely fruitful. A few brands, including PayPal and Dropbox, have made good use of the fact that nobody can say no to free stuff with incentivizing schemes that encourage existing users to refer friends to their services, a growth hack that not only expands customer bases but improves the loyalty of current users.

The How-Tos

For some tips, tricks and detailed growth hacking tutorials, consider the following:

Growth Tribe

Coming to you from Amsterdam, ‘Europe’s 1st Growth Hacking Academy’ offers a wealth of information helping individuals and companies build and use top growth hacking skills.

GrowthRocks

26 online courses to help you make the most out of the available growth hacking tools.

Udemy

With a sizeable range of growth hacking courses available, this online learning platform lets you pick and choose the skills you’d like to master.

Traction

How Any Startup Can Achieve Explosive Customer Growth’ – by Gabriel Weinberg and Justin Mares, a practical and tactical must-read.

100 Days of Growth

Sujan Patel and Rob Wormley’s ‘Proven Ways to Grow Your Business Fast.’ Practical advice in an actionable set of guidelines and strategies with examples of successful devices.

Just as growth hacking provides budget-friendly and efficient marketing tools to new and growing businesses, the growth hacking community is eager to share and build their skills inexpensively and abundantly. For those with the will, the resources are waiting.

By Jennifer Klostermann

Microsoft Announces 3D features For New Windows Update

Microsoft Announces 3D features For New Windows Update

Microsoft Corp (MSFT.O) on Wednesday announced a free update to its Windows operating system that lets users take photos and edit content in three dimensions, in a bid to raise excitement for its declining computing business.

The Windows 10 Creators Update, coming in early 2017, lets users on mobile devices take three-dimensional photos by scanning an object as they walk around it. It also allows for 3D graphics in Microsoft’s popular PowerPoint presentation software, and a new “Paint 3D” application lets people edit photos and other designs in three dimensions.

The technology company also announced a new Surface Book laptop whose battery life is 30 percent longer at 16 hours.

Shares of Microsoft were up 0.2 percent in morning trading.

Terry Myerson, Microsoft’s executive vice president for the Windows and devices group, said the update was tailored for gamers who are increasingly interested in augmented and virtual reality experiences.

Windows 10 will be your platform for gaming glory,” he said at a product launch event in New York.  Accessories for the update will start at $299, Myerson said.

The revamped operating system and accessories, which also will let users tour world heritage sites in virtual reality, come as Microsoft’s Windows and mobile business is struggling…

Read full article source: Reuters

Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips

October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security and private industry to ensure that citizens and businesses alike have the resources they need to use the Internet safely and securely. Today’s cyber criminals are ingenious and constantly probing for vulnerabilities, and when breaches occur they can put the whole company at risk. Don’t give them the opportunity!

cloudtweaks.com-comicOne of the biggest security challenges companies face is that the way we work together has changed dramatically – a transformation that is still ongoing. The term “workplace” is becoming an anachronism as people find new ways to collaborate digitally, anywhere, at any time. Sensitive information needs to be shared among dispersed teams that may include co-workers, partners, customers and other stakeholders. Some of these individuals are vetted and trusted, others…not so much.

Since most security breaches start with human error, now is a fitting time to share some reminders for employees and business users. Think of these as your first line of defense when collaborating in an unsafe world.

Don’t Intermingle Work and Personal Files

Always keep business and personal files separate, otherwise you’re asking for trouble. (A certain presidential candidate learned this the hard way!) For cloud apps, use separate accounts. If work and personal files must be on the same device, store them as far apart as possible, using different directory paths.

Use Strong Passwords and Keep Them Safe

According to Verizon’s 2016 Data Breach Investigations Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords. Employees, contractors and everyone else in your business ecosystem should be required to use unique credentials with strong, unique passwords, rather than the name of their pet goldfish over and over. Even if a password is exposed just once, the potential consequences are enough to make a security manager cringe. Remind people that the infamous Target breach began when some hacker stole a heating contractor’s credentials, while at Home Depot, someone used a vendor’s username and password to steal credit card info for more than 50 million people.

Verify Email Addresses Are Correct

According to a Ponemon Institute survey of over 1000 IT professionals, 63% of respondents have accidentally sent files to the wrong recipients – people who clearly were not authorized to see them. Here’s a simple suggestion: if an employee needs to send an email to someone for the first time, have the intended recipient send an initial email so the employee can respond to it and use it thereafter. This eliminates the chance they’ll get the address wrong – misspell a company name, forget a dash (or add one), use “.com” instead of “.org“, etc., and send a file goodness knows where.

Don’t Send Sensitive Files using a Consumer-Grade Service

data-science

When employees need to share a file that’s too large for email, it’s tempting to send it through Dropbox, Box or some other consumer-grade file sharing service – or simply park it there for convenience. While many of these consumer-grade services have improved their security measures in recent years, they lack the file-level security and controls necessary for protecting sensitive data. For example, a file may be intended for information only, but people are saving it, renaming it, forwarding it others, pasting sections into a competitor’s sales campaign or misusing it in other ways that the sender never intended.

Have Remote Erase Capabilities, or an Effective Alternative

People are always losing their devices – at the airport, in the back of a taxi, at a restaurant, etc. If a device is used to store sensitive data, it also needs a remote wipe feature to be able to erase that data in the event the device is lost or stolen. (NASA learned this lesson the hard way.) Another approach that’s much more flexible is to use information rights management (IRM) software that can delete sensitive files instantly, on any device.

Don’t Share Your Devices with Family and Friends

With the holidays approaching, many people will be receiving new devices (laptops, phones, etc.) as gifts, and family and friends will be pleading for a chance to use them. According to a survey by Kaspersky Lab, one third of respondents reported sharing their personal devices, and of those, 32% took no precautions to protect their information. Why tempt people? In addition, some family members probably have minimal awareness or understanding of today’s cyber threats, and how cunning the perpetrators can be.

Stay Safe Online – and Collaborate with Confidence

Since most security breaches start with human error, educating your staff is an obvious way to reduce the risk. But we also have to remember that training only goes so far – whenever human beings are involved, there’s always the chance of risky behaviors and silly mistakes. And if someone takes advantage of a security lapse to sneak onto your network and steal sensitive data, the damage may not be apparent for weeks or months.

Thus a company has to back up its first line of defense with other measures to keep its information safe. Consider a solution that embeds encryption and user privileges directly into a file, including who is authorized to access it and what operations they can perform with it. These permissions then follow the file wherever it goes on, on any device it lands on. If sensitive data falls into the wrong hands, access can be immediately revoked. Companies get control over their files that’s not available with email or traditional file sharing. As business becomes increasingly powered by digital collaboration, it’s the way to keep sensitive information secure while using it to full advantage.

By Daren Glenister

The Managed DNS Industry

The Managed DNS Industry

DNS Industry 

The SaaS industry has been going through a major shift in just the last few years, which is redefining how platforms are designed. System and network administrators are demanding all-in-one platforms for a variety of management tasks. The managed DNS industry, for one, has been radically altered by this shift. Both new and existing DNS providers are rolling out integrated platforms, which combine the analytical power of monitoring with advanced query management.

The Internet has been abuzz as the skeptical sys admins question how these integrated platforms can fix issues their predecessors couldn’t. And can you replace your current toolset with an all-in-one platform?

The principal idea behind these platforms is synergy, a mutually dependent relationship between monitoring and management. This technology is made possible by the cloud, which allows information to be shared between the two services in real time. The cloud foundations for all-in-one platforms have also proven to make these subscription services noticeably cheaper.

So what is this synergistic secret sauce that makes these all-in-one services so revolutionary? In the case of DNS management, network monitoring is integral to efficient query routing. What’s the point of making changes to your network configurations if you can’t monitor and analyze the results? This can also be applied the other way around: what’s the point in monitoring your network if you can’t fix the problems that you identify?

security-tips

Traffic management should never feel like a shot in the dark, rather it should be informed and calculated to provide the best result for each individual end-user. The new integrated platform push is forcing admins to rethink how they manage their organizations’ traffic.

The problem is, too many admins think these tools are only used for anticipating DDoS or resolving attacks and outages. To be frank, outages are rare, but they can be devastating. DNS management has shifted from outage resolution to performance optimization. Next-generation managed DNS solutions will take a look at your entire network and implement changes to improve the experience for all of your end-users—individually optimized for each user’s location, browser, IP connectivity, and more.

Admins aren’t wrong for wanting to use query management for security reasons. That’s because DNS traffic operates at a critical ingress point for managing incoming traffic; as in, you can filter and root out malicious traffic before it even reaches your site. But what most admins seem to forget is these same management tools can be used to eliminate latency and improve network performance.

End-users are demanding faster load times, especially from mobile sites. DNS resolution times are only one portion of load time, but 50% of page load time is taken up by network latency overhead. Admins have to leverage every layer of the stack for optimal performance, or get left behind.

All-in-one management solutions are proving to be invaluable during high traffic periods. You can analyze traffic loads and redirect segments of traffic so that it’s balanced across many different resources or locations. You can also use this technology to minimize resolution times, by ensuring queries are being answered at the nearest possible server, or most optimally performing server (in case the closest one is under strain or underperforming).

These platforms are also incorporating Artificial Intelligence (AI) to analyze areas causing performance degradation and then make changes to alleviate them before they can cause appreciable affects to end-users. Some AI’s are paired with automated services that are able to recognize performance trends and patterns. They then use the analytics to anticipate and even predict potential attacks or fluctuations.

These all-in-one suites have created a new breed of traffic management, called Internet Traffic Optimization Services (ITOS). This new industry seeks to redefine the way admins manage their networks, by harnessing the power of analytics to make informed proactive changes. DNS is a user’s first and most impactful step when accessing a website, which is why ITOS places a strong emphasis on informed DNS management.

In the end, it all comes down to the cold hard stats. In order to get the most ROI out of a service, you need to look for reliability, cost efficiency, and proven performance improvements. All-in-one and ITOS solutions may still be in their formative years, but these solutions provide admins with all the tools they need in one platform. Now admins can see the performance improvement of their configurations in real time, while still costing less than non-integrated services.

By Steven Job

Microsoft Releases Beta of Microsoft Cognitive Toolkit For Deep Learning Advances

Microsoft Releases Beta of Microsoft Cognitive Toolkit For Deep Learning Advances

Microsoft Cognitive Toolkit

Microsoft has released an updated version of Microsoft Cognitive Toolkit, a system for deep learning that is used to speed advances in areas such as speech and image recognition and search relevance on CPUs and NVIDIA® GPUs.

The toolkit, previously known as CNTK, was initially developed by computer scientists at Microsoft who wanted a tool to do their own research more quickly and effectively. It quickly moved beyond speech and morphed into an offering that customers including a leading international appliance maker and Microsoft’s flagship product groups depend on for a wide variety of deep learning tasks.

We’ve taken it from a research tool to something that works in a production setting,” said Frank Seide, a principal researcher at Microsoft Artificial Intelligence and Research and a key architect of Microsoft Cognitive Toolkit.

The latest version of the toolkit, which is available on GitHub via an open source license, includes new functionality that lets developers use Python or C++ programming languages in working with the toolkit.  With the new version, researchers also can do a type of artificial intelligence work called reinforcement learning.

Finally, the toolkit is able to deliver better performance than previous versions. It’s also faster than other toolkits, especially when working on big datasets across multiple machines. That kind of large-scale deployment is necessary to do the type of deep learning across multiple GPUs that is needed to develop consumer products and professional offerings…

Read Full Article: Microsoft

A President’s Trove of Data

A President’s Trove of Data

Then vs Now

According to some popular opinions, today’s information age affords more information to teens today than a few of the world leaders had access to 20 years ago. C+R Research has put this hypothesis through its paces, comparing access to information across areas such as private data, classified information, genetics, public opinion, and more and finds that in many ways the average smartphone user does, in fact, have access to a lot more information than those with the highest clearance would have two decades ago. However, the accuracy and quality of data available don’t necessarily compare.

Critical Information vs. the Non-Essentials

C+R Research finds that just about any 13-year- old with a smartphone in 2016 would beat President Bill Clinton’s 1996 intelligence and access in areas such as traffic data, music, trivia, opinion, and even genetics. But then, the president of the United States might not have time to listen to the 30 million songs immediately accessible via Spotify, nor would Air Force One likely be constrained by the same traffic limitations as the rest of us. Of course, political campaign teams of 20 years ago would drool for the polling possibilities that Twitter offers today.

Data

On the other hand, President Clinton would have had better access to classified information, data from satellites, and research journals, as well as access to private data – though there are rules governing this, some very important people tend to be ‘incorporated’ into such regulations. Happily, or unhappily depending on how much privacy you desire, tracking of family members via the secret service in 1996 was about as proficient as the smartphone apps we use today to monitor friends and family.

In the end, the 13-year-old wins 7 to 5 in the most general terms, but it’s important to recognize that the broad scope of information available today doesn’t necessarily point to accurate or significant information, two traits President Clinton could be sure of.

By Jennifer Klostermann

Blockchain and the IoT

Blockchain and the IoT

IoT Blockchain

Blockchain, also known as Distributed Ledger Technology (DLT), is the innovative technology behind Bitcoin. The impact of Bitcoin has been tremendous and, as with any revolutionary technology, was treated initially with awe and apprehension. Since its open source release back in 2009, Bitcoin became a transformative force in the global payments system, establishing itself without the aid or support of the traditional financial infrastructure. While initial usage saw huge success in black markets, Bitcoin defied odds, and the blockchain technology spawned other cryptocurrencies, exchanges, commercial ventures, alliances, consortiums, investments, and uptake by governments, merchants, and financial services worldwide.

block-chain

On August 12, the World Economic Forum (WEF) published a report on the future of the financial infrastructure, and in particular on the transformative role that blockchain technology is set to play. Notably, it analyzes the technology’s impact on the financial services industry and how it can provide more transparency and security. Potential use cases are examined, including for insurance, deposits and lending, insurance, capital raising, investment management, and market provisioning. The report also looks at the current challenges in instituting a widespread implementation of blockchain, many of which will require international legal frameworks, harmonized regulatory environments, and global standardization efforts.

DLT is already having a serious impact on the financial services industry. The WEF report states that 80% of banks will initiate a DLT project by next year, and more than $1.4 billion has already been invested in the technology in the past three years. More than that, governments and law firms are seriously staking their claim in advancing the technology. Law firm Steptoe & Johnson LLP recently announced the expansion of its Blockchain Team into a multidisciplinary practice involving FinTech, financial services, regulatory, and law enforcement knowledge. The firm is also one of the founders of the Blockchain Alliance, a coalition of blockchain companies and law enforcement and regulatory agencies, alongside the U.S. Chamber of Digital Commerce and Coin Center. This expansion is an endorsement of the potential of DLT, within and eventually beyond financial services.

blockchain-landscape-2016

(Image source: Startupmanagement.org)

The possible applications of blockchain are already being explored in numerous new sectors: energy, transportation, intellectual property, regulation and compliance, international trade, law enforcement, and government affairs, among many others. Ethereum is one blockchain endeavor that features smart contract functionality. The distributed computing platform provides a decentralized virtual machine to execute peer-to-peer contracts using the Ether cryptocurrency. The Ether Hack Camp is launching a four-week hackathon in November 2016 for DLT using Ether. Currently, the Camp is requesting developers to propose ideas to the public, which will be voted on by registered fans and those selected will be able to take part in the hackathon. The ideas can be seen online already and are vast and varied, ranging from academic publishing without journals, music licensing reform, decentralized ISP, voting on the blockchain, alternative dispute resolution, and rural land register. The idea winning first place in November will collect $50,000 USD.

IBM is one of the most dynamic forerunners currently pushing DLT for the IoT. The firm just announced it is investing $200 million in blockchain technology to drive forward its Watson IoT efforts. The firm is opening up a new office in Germany, which will serve as headquarter to new blockchain initiatives. The investment is part of the $3 billion that IBM pledged to develop Watson’s cognitive computing for the IoT. The goal of the new investment is to enable companies to share IoT data in a private blockchain. A commercial implementation is already underway with Finnish company Kouvola Innovation, which wants to integrate its capabilities into the IBM Blockchain and link devices for tracking, monitoring, and reporting on shipping container status and location, optimizing packing, and transfer of shipments.

IBM is working hard to align its IoT, AI and Blockchain technologies through Watson. The new headquarters in Germany will be home to a Cognitive IoT Collaboratories for researchers, developers and engineers.

Many of IBM’s current projects are developed leveraging the open source Hyperledger Project fabric, a consortium founded by the Linux Foundation in which IBM is a significant contributor, alongside Cisco and Intel. IBM pushed its involvement even further with the June launch of its New York-based Bluemix Garage. The idea is to allow developers and researchers the opportunity to use IBM Cloud APIs and blockchain technologies to drive cognitive, IoT, unstructured data, and social media technology innovation. Just one month after the launch, IBM announced the launch of a cloud service for companies running blockchain technology. The cloud service is underpinned by IBM’s LinuxONE technology, which is specifically designed to meet the security requirements of critical sectors, such as financial, healthcare, and government.

The potential for DLT is certainly broad and rather long-term, but the engagement by the financial services industry is a testament to its potential. While FinTech remains the big focus for blockchain technologies, its success will drive the use of DLT for other areas. The promise of blockchain is to deliver accountability and transparency; although this could be disrupted significantly if announcements, such as the one made by Accenture on ‘editable’ Blockchain, become a reality. While banks may welcome the feature, it would be a serious blow to not only the integrity, but also the security of blockchain technology.

By Michela Menting

CloudTweaks Comics
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by 10-20%. This infographic provided…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…