Category Archives: Cloud Computing

Where Is The Tipping Point For The Flying Drone Market?

Where Is The Tipping Point For The Flying Drone Market?

The Flying Drone Market

In the past year I have written a number of articles here on CloudTweaks about Drones. I enjoy flying drones. One thing I’ve used my drone for is proving I didn’t need to do the worst fall maintenance job ever. Cleaning the gutters of the house by flying the drone around the house I was able to demonstrate that in fact, the gutters were clean and did not require me climbing a ladder and cleaning them.

Now I did have a gadget-based plan B, if in fact the gutters were full of leaves. I have found a device, (robotic) which will clean your gutters for you. You simply have to make sure that it has a clear path, or you move it from one section of the roof to another. While there is still some effort, there isn’t that horrible feeling of leaning away from the ladder to reach that last bit of debris that is left in the gutter.


If you take my modular drone concept you could make the gutter cleaning even easier. The modular grabs the gutter cleaner and carries it up to the roof. You then place it in the gutter, and let it run. The device stops when it is done and you then use the drone to grab the device and move it to the next gutter.

Ground Based Robotics

Today there are ground based robotic vacuum cleaners and lawn mowers. My favorite use of a robotic vacuum was the video of a cat wearing a shark fin, riding around the house on the robotic vacuum. That to me seems like a great use of both a cat and a vacuum.  With the lawn mower, you simply stake out the edges of your yard and let the device go. It will mow the yard in a linear fashion at the time you select.

Drone Potential Uses

This got me thinking about what drones are yet to come. What lies just beyond the edge of the mass market? First off is a concept I’ve talked about here on CloudTweaks before. The concept of modular or easily removed drone components, such as the ability to change from regular cameras to infrared cameras. So you can check your gutters and then fly over your roof and see where you are losing heat, or where you need to insulate. My recommendation is the adoption of the existing standard Tripod mount. This would integrate the various specialty cameras while reducing the overall cost for the drone makers and the camera makers.

The next change is to make flying the drones easier. That has radically improved with the inclusion of the GPS chips in many drones. You can utilize the concept of ‘follow me’ or of ‘launch and hover’ at a specific height. Or even at a precise height and location if you are using the drone to do the same task over and over. The flying yokes are reminiscent of the systems used by radio control model plane flyers for many years. They are not the easiest to learn and drones can be a little sensitive when it comes to the controls.

Price Points


(Image Source: Shutterstock)

Price points have to come down a bit for the features that users want. Today there are a number of what I would call price zones for the drones that are available. The $100 to $300 drones will fly and take video and still pictures while flying. They will map their flight onboard. A couple even offer the streamed imaging but the quality is still pretty low. So you can stream a live video feed from the device but it is standard definition or low quality high definition. If you move up to the $300-$750 range in initial price, the streaming video is available on almost all of these drones and the quality goes up. You move, however, from the tablet controls of the cheaper drones to the flying yoke. Finally, we have the last category and that represents drones over $750. If you plan on having high quality video (4k or Ultra High Definition) you will have to move to one of these drones, or build one yourself. The other thing to consider in the drone pricing is if you want to lift or move something you will need a more expensive drone.

The last category, by the way, runs from $750 to well over $10,000. Over time as more and more functionality is added to higher end drones I will probably have to break the categories up a little more.

Those are my three initial price categories to get the Drone market to the tipping point. Lower the prices or increase the ability of lower end drones to become modular and make them a little easier to fly. The adoption of the tripod mount for all cameras and devices attached to drones is actually fairly simple. Making them easier to fly may be as much of educating me as it is of fixing the flight controls. The price points will come down as Drones move to the mass market.

Personally, I do not think the tipping point is far away for the drone market.

Scott Andersen

The Lighter Side Of The Cloud – Locating The ON Switch

The Lighter Side Of The Cloud – Locating The ON Switch

Valentines Day in Future-ON

By Rick Mernard

Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our comics to generate leads to a specific landing page, newsletter, presentation or social media campaign, you can contact us regarding commercial licensing rates. Enjoy!

How Cloud Data Is Driving Transparency In The Channel

How Cloud Data Is Driving Transparency In The Channel

Cloud Data Is Driving Transparency

Cloud technology and global data have opened up a world of opportunity for manufacturers who sell into retail (B2C) and industrial (B2B) channels. These organizations can attribute much of their success to their channel partners – distributors and resellers – who help move the goods from the manufacturing plant to the shelves of online and physical stores and on to end customers. This behind-the-scenes community bases its own financial health on the efficient management of data regarding items shipped, inventories available, commission structures, and much more.

Chandran SankaranIn recent years, the degree of transparency that guides the channel data management process has gone from a cottage industry to an industrial-grade movement, and this has benefits for all involved, says Chandran Sankaran, CEO of Zyme, developer of cloud-based Channel Data Management (CDM) solutions for global manufacturers. Zyme has a market share of approximately 70% among those manufacturers that have implemented a commercial CDM solution.

Sankaran points out that up until very recently, channel data management existed only as pockets of localized activity. “Some individual manufacturers would insist that their distribution networks deliver highly granular data back to them, and there have also been highly specific relationships between certain distributors and their value-added resellers (VARs),” he says, “but in most instances these remained as one-to-one transactions – isolated events.”

However, the consolidation of economies and technologies worldwide – largely due to the Internet and the sophistication of ecommerce – has given rise to a substantial increase in the compliance rate of Tier 1 distributors and retailers. Over 99 percent of these largest and best-known players now report data back to the manufacturers. “This denotes a substantial increase from the 25 percent of eight years ago,” Sankaran states.

Sankaran believes that the increase in reporting back to manufacturers is not only significant in its number, but also in its universality. It does not pertain to one geographic group, such as North American distributors, but is consistent all around the world, revealing that companies everywhere care about global visibility.

Clarity And Accountability 

The incentives for this change point towards an industry-driven demand for greater clarity and accountability, led by discipline around channel stuffing and revenue recognition. With data becoming so ubiquitous and accessible, transparency and improvement have become a vital part of the business.


(Image Source: Shutterstock)

The demand for improved data also applies to Tier 2 level distributors, solution providers, VARs, and resellers. One of the requirements has to do with end customer visibility. Figuring out who the end customers are has always been a must-have item. The challenge stems from the fact there is now more than one route that the goods can take. Distributors often ship products directly to end customers, bypassing solution providers. Manufacturers need to understand where and how they can obtain end-customer visibility, and this might be right from the distributor’s data. Many manufacturers have enhanced their data-collection imperative by tweaking their incentive programs, withholding payment until they see full transparency and visibility at the Tier 2 level.

A new development in the quest to identify the location of the end customer comes from the proliferation of smart devices and the expansion of the Internet of Things (IoT). Sankaran believes these will contribute significantly by tracking the activation of devices at the customer location, even when the identity of the delivery channel is not apparent. The act of using this end information to identify the route to market is a focal point of Zyme’s activities.

Channel partners have little choice but to participate in this new transparency model, firstly because their revenues come from the manufacturers. In essence, their money is becoming tied to transparency and visibility. Those who comply fully start to receive more of the back-end benefits and rebates, along with related programs. In other words, the greater the transparency, the easier it becomes for manufacturers to make the payout since they can see that the transaction happened. Secondly, transparency is becoming a default feature of distribution and reseller contracts, thus making it a fait accompli.

Helping Channel Partners

Transparency of channel data and improved information flow do not only benefit the manufacturers, however. There are at least three ways in which they help channel partners:

  1. The first is through simplified and smoother relationships with the vendor, which lead to faster rebates, fewer disputes, and streamlined back-end incentives.
  2. Second, exposure can be reduced. For channel partners that carry inventory, an improved data flow allows the vendor or manufacturer to say, “We are noticing a trend. Even though you are about to place an order for more inventory, we think you should hold off for two or three weeks.” This offers risk reduction for the channel partner concerning commitment and inventory.
  3. Third, vendors can provide more guidance about what the best-in-class partners are doing, which affords comparative data along with sales/marketing advice and coaching. The manufacturer has a unique vantage point in being able to see what every single one of the resellers is doing, helping raise the game and the average.

Industries and markets are changing all over the world, and they echo the same familiar refrain: data is king.

By leveraging new technologies to establish a platform for improved data management and transparency,” Sankaran says, “we anticipate that all players along the supply chain will continue to benefit in significant ways.”

By Liz Auclair

Internet of Things: I Spy With My Little Eye…

Internet of Things: I Spy With My Little Eye…

Using IoT To Spy

Big Brother may take advantage of our smart devices connected to the Internet so it can track or spy on people, according to U. S. Director of National Intelligence, James Clapper, who said in a report Tuesday to a U. S. Senate Select Committee on Intelligence. He submitted evidence as part of a global threat assessment report, when specific comments were made that in the future intelligence agencies could expand their surveillance capabilities by tapping into the Internet of Things to spy on suspects via their connected devices.

IoT Leaves Vulnerabilities

According to the report, when “smart’ devices are incorporated into the electric grid, we have improved efficiency, energy conservation, and convenience. This can include everything from our phones and cars to our televisions and washing machines. Security analysts have now shown that many of our new devices threaten our data privacy, data integrity or continuity of service.


In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.” Stated James Clapper, in the report.

Not specifying which government agencies might use the IoT to spy on citizens, that leads us directly into the debate in Washington over encryption legislation. Wednesday, the House of Representatives introduced bipartisan legislation that would prohibit individual states from requiring tech companies to build encryption weaknesses or back doors into their products.

Encryption has long been an area of disagreement between tech companies and law enforcement. It gained new attention after 2014 when Apple and Google began offering stronger encryption by default. The decisions to provide products that enable end-to-end encryption, as well as default encryption settings, at the same time that terrorist groups seek to use encryption to conceal their communication, has fueled this debate.

Moving Ahead

‘Going dark’ doesn’t have to be the case for law enforcement and government agencies according to the findings of a study at the Berkman Center for Internet & Society at Harvard University. The study addresses the warnings of law enforcement, and the importance of conducting certain types of surveillance. However, the conclusions are that “communication channels resistant to surveillance will always exist.” They go on to argue that market forces and commercial interests will limit the available opportunities in which companies will offer encryption that hides users from the companies themselves for advertising and commercial purposes. ‘Going dark’ is a myth.


(Image Source: Shutterstock)

Some of the reasons they found were that obscuring user data is not likely to be universally adopted by companies because the majority of businesses that provide services rely on access to user data for revenue streams, product functionality, and even forgotten passwords. Another reason the study gave is that software ecosystems are largely fragmented. More standardization would be required than currently exists for encryption to become widespread.

The study also found that law enforcement would have to learn to adjust and grow their surveillance capabilities to keep up with the times. The IoT is projected to grow substantially and will drastically change the way law enforcement uses surveillance today. The devices connected to the IoT may capture still images, video and audio – enabling real-time interception and recording.

Another area which law enforcement could use for surveillance and there would be no need for current government legislation into corporate encryption policies is metadata. The study concluded that:

Metadata is not encrypted, and the vast majority is likely to remain so. This is data that needs to stay unencrypted in order for the systems to operate: location data from cell phones and other devices, telephone calling records, header information in e-mail, and so on. This information provides an enormous amount of surveillance data that was unavailable before these systems became widespread.

There are many questions that will arise on how we can protect individual privacy and security in the future. The debate in Washington is important to all of us, but for all of its efforts, if Washington took into account the technological trends… the world is largely moving along quickly, without taking into account either side, or contemplating slowing down.

We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times; where there are no secrets from government.” William O. Douglas

By Tina Rose

Security: The Goodwill Virus That Keeps On Giving

Security: The Goodwill Virus That Keeps On Giving

The Goodwill Virus

When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced. It delivered a very powerful lesson about computer security for corporate decision-makers in all industries. Given that the story was so exclusive, it was written and produced on a single laptop computer that was kept off-line, and separated from networks and the Internet. The finished product was hand delivered, essentially turning the computer back to the type of standalone PC that has become virtually unheard of in the Wi-Fi era.


The extremes to which the Vanity Fair team had to go to ensure secrecy are not, of course, practical in day-to-day business, but they illustrate the gaping holes that exist in network security generally, despite the efforts of a global army of highly trained and knowledgeable security specialists. Whether it is access to an exclusive story or a company’s client list or confidential data, the enemy is not only at the door; it is also relentlessly seeking to break it down, dissolve it, remove it or skirt it. The enemy is always trying to get in.

One of the most significant threats to an organization’s data security comes in the form of human goodwill. Put another way, it is a natural tendency for most people to act in an honest, trusting manner, focused on just getting their work done. This human weakness essentially lurks inside the networks and databases of organizations, passive and innocent, waiting to be preyed upon.

BYOD Security Concerns

BYOD is a perfect example of this. Employees the world over rejoice at the concept of being able to use their own devices to keep up with the tasks, documents and emails of daily life. To access company files from a centralized folder system, or to check calendars and email from a mobile phone, or from a free public Wi-Fi space at a coffee shop or airport, seems to make life a little easier.

Yet these are precisely the types of activities that make IT security specialists cringe. Personal mobile phones seldom have the up-to-date security features required to prevent a hacker from making the leap from that device into the arteries of a company’s central network. A personal smartphone can spend half its time as a business tool, with the other half as a device of leisure. As a result, individual apps and games rub shoulders with sensitive corporate information, and such contact is a fertile breeding ground for infection.

Recharging Stations


(Image Source: Shutterstock)

Shopping malls, airports and hotels offer charging stations for smartphones. Busy people gravitate to them with relief once they see their battery power start to drain. These same people would never think of taking a drink from someone else’s bottled water. They would never double-dip their tortilla chip at the office party. Yet they do not think twice about plugging their phone into a free, public charging station or hotel docking station. These charging jacks can potentially deliver far more than an electrical charge, though. Like many other points of connection in the world, the task we expect it to do is the only one we think about. In most cases, though, there is far more that it can and will deliver.


Innumerable case studies exist of inadequate password maintenance, including passwords not modified after a security sweep and upgrade. People do not see past the immediate task to realize that actions, messages and keystrokes last forever. A bad guy can easily connect a mislaid password to an email, and then to a Facebook posting, building a profile with which they can impersonate someone, or send a distracting or troubling message that opens the door.

Most people are, by nature, trusting and good. This is an exploitable weakness. As a society we have trained our children to be aware of strangers, to be aware of allergy-inducing foods, and to be sensitive to harmful language and behavior in the classroom. Yet the busy-ness of the workplace has suppressed this vigilance among adults in general. Consequently, we use technological conveniences such as USB drives, insecure phones, and file-sharing technologies to counter the never-ending pressure of time and deadlines.

Corporations must look extremely closely at implementing a separation of personal and corporate devices and information. It may be important, even essential, to respect a BYOD policy as an employee’s right, but the price for such convenience comes in the form of doubled, or even tripled, vigilance and hygiene, paired with regular updates and physical training.

A great deal of the bad stuff that happens to our network systems and our companies is human-made, as opposed to a malignant technical failure. As such, it is up to humans to bolster their immunity not only physically, but intellectually. This demands a higher standard of mistrust and precaution, from the simplest text message, upwards to every activity that follows.

For more on this topic, go to, sponsored by Hewlett Packard Enterprise.

By Steve Prentice

Cloud Startups In The Caribbean

Cloud Startups In The Caribbean

Caribbean Cloud Startups

Though we generally focus our attention on the larger global markets where venture capitalists are hoping for greatest return on invested money, there are many smaller sectors scattered across the globe that are presenting their own robust and innovative startups. The Caribbean has a growing startup ecosystem, and their entrepreneurs while creating regionally are starting to think globally. With SMEs creating more jobs and producing significant impact on economies, it’s no wonder the Jamaican government has launched its own venture capital fund to promote the small tech sector. Says Therese Turner-Jones, Jamaica’s representative at the Inter-American Development Bank (IDB), “What we are witnessing is the evolution of the development of the ecosystem for venture capital and angel investors in providing more opportunities for small and medium entrepreneurs to thrive in Jamaica.”


(Image Source: Shutterstock – Nassau, The Bahamas)

Here are a few startups that caught our attention:

Appstartt Caribbean Limited

This software development company is dedicated to providing web and mobile app development to other startups. Focusing on the Caribbean market, Appstartt Caribbean Limited promises to provide the technical know-how to bring tech innovations alive, ensuring user interfaces are designed both functionally and attractively. The development team takes care also to concentrate on psychological triggers that will ensure customer happiness, providing an easy, smooth, and intuitive customer experience.

Profound Projects

Providing a host of professional services including e-commerce, CRM and workflow managers, cloud invoicing, and cloud email, Profound Projects is an innovative IT solution for small and medium Caribbean enterprises. The organization promises an understanding of Caribbean business and tailors solutions for their online operations.


The cloud is already being utilized in various global healthcare sectors, and MediRevu, run out of Barbados, is using these tools to help patients living with chronic conditions take control of their health. Keeping patients on track with health care provider plans, MediRevu provides reminders for activities such as diet, exercise, and medication, and enables the recording of vitals according to a patient’s condition and required treatment. Users can track their progress, educate themselves with health tips, and share concerns and progress with their doctors via an app available for both iOS and Android.


Mobile and desktop agricultural software providing specific local advice to gardeners and farmers at any level of skill or experience. This app aspires to bring together the knowledge of farmers, students, kitchen gardeners, and agro-professionals to create a library of practical solutions for agricultural problems, helping users identify, diagnose, and solve their plant woes themselves.


Hivesource, an online services platform for businesses, freelancers and “digital nomads” lets members collaborate on projects and sell digital services. Currently in private beta, Hivesource has already won numerous awards, including Caribbean Innovation Challenge 2013 Economic Entrepreneur Award and Talent and Innovation Challenges of the Americas 2013.

Interested in finding out more about the Caribbean tech startup industry? Take a look at ShoutBlast. This platform showcases Caribbean startups, calling itself “a hub for discovering and following the startups that are going to be shaping the regional economy in the future.”

By Jennifer Klostermann

Self-Driving Google Computers Are Almost Ready To Drive

Self-Driving Google Computers Are Almost Ready To Drive

Google Self-driving Cars Making Headway

U.S. vehicle safety regulators have said the artificial intelligence system piloting a self-driving Google car could be considered the driver under federal law, a major step toward ultimately winning approval for autonomous vehicles on the roads.

The National Highway Traffic Safety Administration told Google, a unit of Alphabet Inc (GOOGL.O), of its decision in a previously unreported Feb. 4 letter to the company posted on the agency’s website this week.

Google’s self-driving car unit on Nov. 12 submitted a proposed design for a self-driving car that has “no need for a human driver,” the letter to Google from National Highway Traffic Safety Administration Chief Counsel Paul Hemmersbaugh said.


NHTSA will interpret ‘driver’ in the context of Google’s described motor vehicle design as referring to the (self-driving system), and not to any of the vehicle occupants,” NHTSA’s letter said.

We agree with Google its (self-driving car) will not have a ‘driver’ in the traditional sense that vehicles have had drivers during the last more than one hundred years.”

Major automakers and technology companies such as Google are racing to develop and sell vehicles that can drive themselves at least part of the time…

Full Article Source: Reuters

Cloud Services Growth – Public vs Private

Cloud Services Growth – Public vs Private

Public vs Private Cloud

The idea of a ‘private cloud’ has been with us for nearly 10 years now, yet surprisingly, a new analysis indicates that the growth of this once extremely-hyped sector has slowed dramatically while the adoption of the public cloud has continued to grow steadily.

An analysis by the tech community resource Wikibon of the true size of the private cloud concluded that the current overall market size is around US$7-billion, while the size of the public cloud is nearly four times as large at US$25-billion. In fact, one of the largest public cloud firms, Amazon Web Services (AWS) is larger than the entire private cloud market. AWS came in at a value of US$7.9-billion in 2015.

cloud ideas

The study tried to understand various reasons why this is so.

Initially, it sought to clarify the idea that “deploying virtualized infrastructure implies that an IaaS cloud has been deployed. In fact, the IaaS cloud must be able to automate many additional tasks that surround the virtualized infrastructure – addressing, network routing, load-balancing, isolating resources for security, managing the scale-out of resources via automated tasks, etc.” A virtual machine simply imitates dedicated hardware and not enough true cloud management or automation frameworks were put in place to allow an organization to continually upscale. As the capabilities of virtualization slowed, so did the need for more private cloud.

The widespread use of a private cloud in an organization requires new skills to be imparted around IT, and as a result, this often lowers the priority of a private cloud to management. By comparison, cloud management is an “underlying, feature embedded within Public Cloud offerings”, and most companies can figure out to configure a dashboard to meet the needs that they have from their cloud offerings. At the same time, the security capabilities of the public cloud are improving steadily and this lessens one of the main drivers towards a public cloud.

With all the resources available to public cloud providers, they were able to develop more and more services as part of their offering. As a result, applications such as Database-as-a-Service, Data Management Services, Elastic Load-Balancing and much, much more, have come to be seen as simply part of the public cloud. By contrast, private cloud providers are unable to offer the full suite of offerings, which often implies that those services needed to be outsourced or come from an overburdened, stretched IT department, with mixed results.

For obvious reasons, highly skilled workers gravitate toward the highest-paying jobs and many of those have been centered around the public cloud for a number of years now. In 2016, technologies utilizing OpenStack, CloudStack, Chef and Puppet are some areas paying the best, attracting the best talent, and leading to the widening of the gap between the quality of public and private cloud offerings.

Yet it is not all doom and gloom for the private cloud. In particular, the popularity of PaaS services in a controlled private cloud environment has been growing. The over reliance on Shadow IT in public PaaS scenarios is of great security concern to many providers, and private PaaS is able to ensure a single enterprise cloud development environment which is appealing and familiar to many organizations.

By Jeremy Daniel

CloudTweaks Comics
Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Update: Timeline of the Massive DDoS DYN Attacks

Update: Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…


Sponsored Partners