Category Archives: Cloud Computing

The State and Future of B2B E-Commerce

The State and Future of B2B E-Commerce

B2B E-Commerce

It’s official. B2B (business-to-business) companies have shifted their focus on web e-commerce to mobile e-commerce—a trend influenced by the rise of Cloud computing and SaaS connected smartphones/tablets and portable devices that have replaced the traditional PCs.

It’s estimated that the B2B e-commerce in the U.S. will balloon from $780 billion in 2015 to $1.13 trillion in 2020, according to Forrester Research. By then, the B2B e-commerce market will make up 12.1 percent of the $9.39 trillion B2B industry. Online retailers like Amazon and Alibaba are currently leading the B2B e-commerce market. These companies are lucky to be the pioneers of the booming trade.

But the tables will turn in 2019, said Forrester Research analysts Peter Sheldon and Andy Hoar, as traditional B2B companies increase their spending on upgrading their e-commerce systems. By 2019, manufacturers and wholesalers will make up a combined 30 percent of spending on e-commerce technology–up from 20 percent in 2013.


(Infographic Source:

Meanwhile, online retailers are expected to make up 28 percent of the 2019 spending, which is down from 41 percent in 2013. This isn’t surprising. Online retailers have already setup their own platforms, while traditional B2B companies have yet to invest money on building e-commerce websites. However, B2B companies, with lots of money in the bank, can spend more on better systems.

Companies have all the reason to go mobile. A mobile-optimized e-commerce platform generates more revenue than e-commerce sites that aren’t mobile-friendly. It isn’t enough to sell online, you need to optimize your business for mobile devices, according to a survey by Demand Gen Report.

Out of the 105 buyers surveyed, 85 percent said they require content on B2B sites to be mobile-optimized– that’s up from 69 percent in 2014. B2B buyers are getting wiser, too. Around 94 percent of B2B customers report conducting some research online before making a purchase. Additionally, 44 percent of the 94 percent used a mobile device to research an item, according to a study conducted by Acquity Group.

By Gene Briones

The “Cloud Hangover” Is Real And There Are Ways To Avoid It

The “Cloud Hangover” Is Real And There Are Ways To Avoid It

The “Cloud Hangover

One phrase that has been recently coined in 2015 yet many are expressing growing concerns over is a “cloud hangover”. With cloud computing being such a prominent topic in IT news, many whistleblowers are now expressing their opinions on how to combat this situation.

A cloud hangover is what professionals describe as the undesirable effects of a transition into the cloud, the most significant of these effects being the the increase in costs for organizations in maintenance and support for their new infrastructure. While you probably associate hangovers with irresponsible drinking decisions resulting in a not-so-pleasant morning after, the phrase itself is a very serious issue that many organizations with cloud IT are looking into.

cloud hangover

The benefits of switching a company’s infrastructure to the cloud are clear. Better data encryption, more storage capacity, improved flexibility and lower costs are the primary reasons that companies switch over. In many cases, however, the actual switch to a new infrastructure can be difficult to manage and actually end up costing more than anticipated due to the various supplemental changes that have to be made to the company as well. These problems can be avoided, and here are what organizations need to be thinking about prior to a move to the cloud.

Time Investment Reduces Money Investment

Movement to the cloud requires an investment of time from any company execs to establish specific needs and reasoning to move. A definitive plan needs to be made in order to avoid the hiccups that could occur during migration. Working closely with cloud suppliers and third-party experts at this point in the transition is critical to avoiding future problems.

When working with a supplier, it’s important to lay out and assess the costs, risks, and rewards of using cloud infrastructure for your business. In many cases, it should be the suppliers responsibility to create a detailed map of the entire migration process.

Have The Right Reasons For Switching


Just because hypothetically migrating your infrastructure to the cloud saves costs and has an easy implementation strategy doesn’t mean it will be successful. Cloud infrastructure has benefits that can be seen much farther and have better results in one to three years rather than immediately.

It’s also important to understand the type of data that your company is creating, gathering, and analyzing in order to determine the best type of infrastructure. Security requirements for data need to follow strict mandatory rules depending on the industry that your company works in. It’s actually possible to save money holding data in a different security environment than what was previously planned.

The Team That Manages IT Must Be Good


The migration to the cloud also requires that the team handling the original infrastructure of your business must be trained thoroughly for the differences. Shaping a team around technological savvy, experience, and eagerness to adapt is crucial for a successful migration. Key skills that come up repeatedly in successful cloud companies include good managing suppliers, service level agreements, change management, and project management.

Organizations or companies that plan ahead in all of the above situations will not experience a cloud hangover and will achieve the results they were looking for when originally considering the switch to the cloud.

(Image Source: Shutterstock)

By Keith Baird

Here’s Why A Chinese Venture Firm Is Sinking $400 million Into AngelList

Here’s Why A Chinese Venture Firm Is Sinking $400 million Into AngelList

Venture Firm Invests $400 million Into AngelList

China is looking to get in on the U.S. tech startup scene. A crowdsourcing funding website for startups, called AngelList, has apparently received a $400 million dollar injection from private-equity firm CSC Venture Capital.

Interestingly, the money is meant specifically to target young startups still in their earliest stages. A lot of investors prefer to sit back and wait to see if a product or new company has potential, but the Chinese are looking to roll the die, and they’re doing so in a big way.

It’s no secret that the United States tech industry is the biggest, and ultimately produces the highest number of successful tech startups. A few ranking lists will try to finagle with numbers to knock the United States off the top spot, but at the end of the day, the United States is home to nearly 5,000 startups, while the next closest competitor, India, barely tops 2,000.


Further, most of the biggest tech startups over the last several decades were born in the United States. From Microsoft, Apple, and Google, to Salesforce, ZenDesk, and Facebook, multiple generations of American startups have revolutionized the world.

The Chinese investors are hoping that some of their investments will fall into the coffers of what ultimately becomes the next Apple. By focusing on the early rounds of funding, they will be able to cast a wide net, and hopefully reel in some gold.

AngelList is already a proven source for connecting companies and investors. Among their success stories has been Uber, a yes- wait for it, uber successful company.

Up until now, AngelList has managed to raise only $205 million dollars to distribute to startups. Thus, in one fell swoop, Angelist is securing nearly double all of its previous investments combined.

While CSC Ventures is taking a big risk, especially by targeting startups, more and more Chinese investors are looking to diversify. China’s economy is massive and fast growing, but as the recent turbulence proves, any country can suffer turbulence, and it’s always best to diversify.

CSC Ventures itself is clearly looking to make a big splash. While Chinese investors are becoming more active in the United States as China liberalizes its trade and investment laws, Chinese firms don’t have the long-standing reputation and connections of many larger American firms. With this deal, CSC will certainly get some media coverage, and likely also make some good investments.

By Brian Brinker

What Forecasts Of Data Breaches Should Spell To Cloud Security Practitioners

What Forecasts Of Data Breaches Should Spell To Cloud Security Practitioners

Cloud Security Practitioners And Auditors

Today we have seen relatively few data breaches in the cloud despite its growing use for mission-critical workloads. However, as cloud increasingly becomes the backend for our mobile devices, for the Internet of Things (IoT) and for other daily life functions, we can safely predict that hackers will set their sights on such troves of personal data.

This year’s data breaches have been characterized by massive exposures of personal information and identities. With the Internet of Things’ devices introducing streams of data that are far more personal and intimate than the current digital economy and those streams providing increased pathways to the cloud, it makes cloud an increasingly attractive target for data breaches.

Have We Become Too Trusting Of The Cloud?


Though cloud is recognized as a different paradigm to en premise security, it seems that many of the same security standards and frameworks still apply. Auditing practices and toolsets in the cloud are still immature compared to their enterprise counterparts and lack of visibility across the entire stack is still a challenge for most cloud consuming organizations. Additionally, the “castles in the cloud” syndrome still applies with many cloud providers taking the approach of fortifying their environment but not focusing on the different types of data being transacted on or traveling to and from their clouds.

Compliance Does Not Necessarily Equal Trustworthiness

Many of the standards and regulations that today’s cloud providers and cloud consuming organization have to abide by are largely focused on assessing capabilities to process and store information – they don’t guarantee the safety or trustworthiness of your data in the cloud. Trust is the key factor! Just as warning labels don’t’ make you safer – for example, you could still get hurt even though your car may come with warnings for seat belt usage – compliance certification doesn’t protect your data. Compliance and certification implies that the provider, the consumer or both have a well-controlled environment. The focus should be much more on the data, its access and its usage.

Focusing On What Really Matters To Build Consumer Trust


Cloud providers and cloud consuming organizations have the opportunity to put in place stronger data protection measures that align to today’s business and personal usage contexts. Security practitioners and auditors need to be able to talk about data protection in business consumable terms so that developers and business leaders can understand which types of data they need to especially focus protection measures on. It’s this rather than having a secure and compliant infrastructure that will help retain consumer trust in the long term and potentially help mitigate data breaches in the future.

Data classification schemes are going to have to be based on a variety of contextual measures and on different levels of personal and privacy-related data given our highly digitized personal and business futures. There won’t be any one scheme that will apply universally and it will need an industry-wide approach to ensure a cohesive strategy. If we don’t start focusing in this direction now, we will face even more egregious data exposures in the not so far future.

(Image Source: Shutterstock)

By Evelyn de Souza

Android Auto: Useful Car OS Or Corporate Spy?

Android Auto: Useful Car OS Or Corporate Spy?

Android Auto

Car infotainment systems have become the bane of many drivers and car critics. More often than not, car critics have selected their favorite car infotainment systems based on which system was the least worst out of all the options available. A few companies, like Chrysler, have notably “not-so-bad” systems, while a few companies like Ford have been lambasted for their poor car infotainment systems.

Android Auto may be able to fix that. Android has already proven to be up to the task as the world’s primary smartphone operating system. Most likely, Google’s upcoming “Android Auto” will prove to be a serious upgrade over the infotainment systems being offered by many automobile companies.


Already, however, concerns are arising over how much data Android Auto will be gathering from drivers and their cars. It’s no secret that Google, along with numerous other tech companies, makes huge chunks of its revenues off of gathering information and finding ways to monetize that data. Still, a lot of people are (rightly) uncomfortable with the amount of data being collected. Over the past few days the Internet erupted into a firestorm over Android Auto.

It all started because of some remarks written in Motor Trend. Long story short, Porsche allegedly elected to go with Apple’s upcoming Apple Play OS because Google was demanding too much data. Immediately, big brother fears began to crop up with potential Android Auto users, and also critical Apple fans, wondering whether or not Google is basically try to become the automobile version of Big Brother.

Ford and General Motors have already released statements to reassure their customers that their cars would not be compromised, and that only limited amounts of data would be collected. Google has also moved to defend its product, claiming that its data is used only for safety and user experience purposes. Of course, these are rather vague “purposes”, but Google did say that users would opt-in to share data. Whether or not Android Auto will work fully unless customers opt to share their data remains unknown.

Truthfully, we won’t be able to pass final judgment on Android Auto until we get a bit more experience with it. The OS is already available on some cars, but as of right now it’s basically in a sort of live-test beta stage. It’ll take a bit more time, and bit more effort by some software aficionados to figure out exactly how much data is being collected. Most likely, when the dust settles the operating system will try to collect a lot of data, after all data is power, but there will likely be a number of opt-out or opt-in features that will give people control over how much data is collected and for what purposes.

By Brian Brinker

The Massive Tech Deal : Dell and EMC

The Massive Tech Deal : Dell and EMC

The Dell EMC Deal

Dell has acquired EMC for a whopping $67 billion, a Brobdingnagian deal regarded as the biggest takeover in the technology industry. Shareholders at EMC will get around $33.15 per share, which includes $24.05 per share in cash and tracking stock—valued at $9 per share—at VMware, the company’s popular cloud and virtualization subsidiary. Under the terms of the agreement, VMware will continue to operate as a publicly traded company.


Dell and EMC said that the total transaction of the deal is valued at $67 billion. Although Dell recently reported having $12 billion in debt, the company astutely held negotiations with banks to help finance the acquisition. In a press release, Dell said that the buyout will be financed by a combination of debt financing (around $40 billion), tracking stock, cash on hand, and common equity from Dell founder Michael Dell, his private equity firms Silver Lake and MSD Partners, and the Singapore-based investment company Temasek Holdings.

The combination of Dell and EMC creates an enterprise solutions powerhouse bringing our customers industry leading innovation across their entire technology environment. Our new company will be exceptionally well-positioned for growth in the most strategic areas of next generation IT including digital transformation, software-defined data center, converged infrastructure, hybrid cloud, mobile and security,” said Micheal Dell.

Our investments in R&D and innovation along with our privately-controlled structure will give us unmatched scale, strength and flexibility, deepening our relationships with customers of all sizes. I am incredibly excited to partner with the EMC, VMware, Pivotal, VCE, RSA and Virtustream teams and am personally committed to the success of our new company, our customers and partners,” he added.

Joe_Tucci CEOThe deal is expected to close in the second or third quarter of Dell’s fiscal year, which ends in February 2017. Once the deal closes, Michael Dell is expected to lead the combined company as chairman and CEO. Meanwhile, Joe Tucci, the chairman and chief executive officer of EMC, will continue as chairman and chief executive officer of EMC until the transaction closes, although he could stay beyond the period. The two executives started the negotiations last year, sources said.

The coming together of EMC and Dell will create a powerhouse in the technology industry with more than $80B in revenue. The combined company will be a leader in a number of the most attractive high-growth areas of the $2 trillion information technology market. It will have complementary product portfolios, expanded market reach, and four of the world’s greatest technology franchises: servers, storage, virtualization and PCs,said Joe Tucci, chairman and chief executive officer of EMC. “Additionally, it brings together strong capabilities in the hottest IT trends, including digital transformation, the software-defined data center, hybrid cloud, converged infrastructure, mobile and security.”

The deal provides a unique relationship, mixing Dell’s expertise in computers and servers with EMC’s leading storage and virtualization services. EMC owns around 80 percent of VMware, which is currently valued at $33 billion in the market. The deal will help Dell transition from a consumer-focused company to an enterprise-centered business, competing against IBM, HP, Oracle, Microsoft, and Amazon. Investors lauded the deal.

This landmark transaction will create a powerhouse with leading franchises across enterprise IT. For EMC, this moment represents the culmination of Joe Tucci’s and his team’s work to create one of the most important technology companies of our time. We also commend Michael Dell and Silver Lake for their vision and creativity in recognizing EMC’s unrealized value and in creatively structuring the transaction,said Jesse Cohn, senior portfolio manager at Elliott Management. “Further, Elliott is pleased to participate in VMware’s ongoing upside through the tracking stock, which will benefit from both meaningful synergies as part of Dell’s organization as well as far greater liquidity than VMware shares have today.”combination of EMC and Dell will prove to be a winning combination for our customers, employees, partners and shareholders.”

By Gene Briones

Secure Cloud Video Conferencing Is Possible

Secure Cloud Video Conferencing Is Possible

Secure Cloud Video Conferencing

Video conferencing has gone far beyond the conference rooms at large corporations. Although the H.323/SIP Room can be awesome, it’s expensive, requires a lot of IT knowledge and it’s yesterday’s solution.

Clouds are secure


Sure people try to scare businesses away from clouds, but those people probably work for Big Tobacco. Video conferencing done correctly is secure. If it wasn’t, the U.S. and Russian military would not talk to each other via videoconference. They did that recently, to make sure their planes did not get it each other’s way over in Syrian airspace, ABC News reported. Apparently, they had not been warning each other about airstrikes.

When was the last time you heard of a company’s stock price changing because a videoconference was hacked? You’ll have a hard time finding an example on Google. Part of the reason is because cloud-based video conferencing providers have really good security. Otherwise, they’d go out of business.

Cloud-based video conferencing service providers such as Blue Jeans offers global data centers with network firewalls, proxy servers and load balancers. The company is continually testing its security to stay ahead of the bad guys. There are additional measures to ensure security during a meeting such as participant passcodes, encryption and locking. So even if a competitor steals a participant’s account password, the thief still can’t get into the meeting.

Cloud advantages

Moving beyond the videoconference room can present many advantages to a business. The good news about cloud-based video conferencing for small businesses is they don’t have to invest in a high-priced H.323/SIP Room. Participants can connect to a meeting by clicking an emailed link. All they need is a webcam on their desktop or laptop. Blue Jeans even has apps for iPhone and Android devices.

With cloud-based video conferencing, businesses can share video content within the meeting and record everything, so those who were not able to participate can watch the meeting later. The cloud software has a command center for monitoring and measuring usage during the meeting. The software integrates with calendar and email programs to make scheduling a meeting easy.

By the way, Twitter recently set up its New York headquarters office in Chelsea. Alex Kantrowitz of Buzzfeed got to go inside, and the video conferencing setup Twitter uses to collaborate with its office in San Francisco looks about as complicated as a flat-screen monitor with a big webcam underneath.

Connecting with clients through video conferencing is possible thanks to the interoperability and mobility of today’s cloud-based technology. Up to 100 participants can join a meeting. If clients want to use Google Hangouts, Skype or just a web browser, that’s not problem.


When working with freelancers or remote employees, video conferencing can make up for the inevitable lack of face-to-face time. A lot of information can be missed or misinterpreted when it is communicated by phone, email or IM.

A one-on-one videoconference can cut through 99 percent of the communication barriers to save time and increase productivity. Most people work faster and more efficiently when they clearly understand the objectives and procedures. Of course, a virtual employee is more likely to be focused and productive, if he knows the boss is paying attention and appreciates his contributions. Videoconferences are an inexpensive way to do that.

New to video

The Lighter Side Of The Cloud – The Name Game

A lot of people are accustomed to traditional boardroom-style meetings. Things are a little different with videoconferences. Business Day come up with some basic suggestions to make the videoconference experience more productive and enjoyable especially if your location is remote:

  • Practice with the technology beforehand
  • Have an uncluttered background
  • Use plenty of lights
  • Set the camera at eyelevel even if it’s on the top of the laptop screen
  • Dress appropriately because being at home is no excuse
  • Have your talking points readily available, not buried on the hard drive
  • Remember the camera and microphone are on

The main trick to looking good during a videoconference is to stay focused and participate. Don’t bring your dog or toddler into the meeting. Playing on your phone or browsing fashion websites during a videoconference probably will get you noticed in a bad way.

And don’t forget about screen sharing. It’s a great tool for sharing information among colleagues and perspective clients. Just make sure your screen is clear of distractions including the page you have up to browse the latest instant movies.

Try not to eat while on a videoconference call. Teeth are what many people key in on especially when the person is eating or talking. The attraction lists on the Internet can be useful, sometimes. Thought Catalog reports women notice a man’s smile third most often.

By Glenn Blake

Dell Acquires EMC For $67 Billion

Dell Acquires EMC For $67 Billion

Dell Inc. this morning formally announced that it has agreed to acquire network storage giant EMC Corp. EMC 6.66% for approximately $67 billion.

Under terms of the complex deal, EMC stockholders would approximately $33.15 per share. This includes $24.05 per share in cash and $9.10 worth of a tracking stock for VMWare VMW 1.75% , an EMC-owned cloud and virtualization software company that already has around a 20% equity “stub” trading on the public markets…

Read Article: Fortune

CloudTweaks Comics
The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

Security and the Potential of 2 Billion Device Failures

Security and the Potential of 2 Billion Device Failures

IoT Device Failures I have, over the past three years, posted a number of Internet of Things (and the broader NIST-defined Cyber Physical Systems) conversations and topics. I have talked about drones, wearables and many other aspects of the Internet of Things. One of the integration problems has been the number of protocols the various…

The DDoS Attack That Shook The World

The DDoS Attack That Shook The World

DDoS Attack: Update 2 6 days after the DDoS attack that rocked the internet to its core, Dyn have released detailed analysis of the attack and further details have emerged. The attack has been confirmed to have been the largest of its kind in history, and the Mirai botnet has been cited as the official cause.…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…


Sponsored Partners