Category Archives: Cloud Computing

Cloud Infographic: The Future Of Big Data

Cloud Infographic: The Future Of Big Data

Cloud Infographic: The Future Of Big Data Big data is not new. It has existed for ages and can be attributed even to the initial years of computing. However, one might do well to consider why is there an increased buzz around this now. The answer is quite simple: Significant advances that have been brought about

Big Data And eDiscovery: Professionalism Pays

Big Data And eDiscovery: Professionalism Pays

Big Data and eDiscovery: Professionalism Pays Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they

How Hackers Are Getting Inside Help

How Hackers Are Getting Inside Help There are more people today aware of the security risks they expose themselves and their companies during their regular internet activities than there have ever been before. The media has made it clear to all internet users just how often and easily their online privacy is threatened and each time some

Survival In The Cloud Depends On Experimentation

Survival In The Cloud Depends On Experimentation I was fascinated to hear Jeff Bezos comment that Amazon’s expected $1.5 billion in revenue via their Amazon Web services business was successful due their focus on experimentation. The experimentation paradigm is the most important strategy for cloud executives to execute successfully, lest they fail to take full advantage of the

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified Researchers at North Carolina State university and University of Oregon have proposed a jaw-dropping price tag for performing heavy duty cloud computing task – as low as zero dollars. Experiments reveal that cloud-based web browsers can be exploited to hijack the underlying computational power, and that as