Category Archives: Cloud Computing

Floating Data Centers And The $5 Billion Dollar SUPERNAP Pyramid

Floating Data Centers And The $5 Billion Dollar SUPERNAP Pyramid

Unusual And Innovative Data Centres

While we’re all enjoying the many benefits of the cloud, including reduced hardware requirements and lower energy costs, data centers are popping up all over to meet our cloud needs. Many providers take the conventional route of data giants such as the 990,000 square foot QTS Metro Data Center building in Atlanta and Miami’s NAP of the Americas’ 750,000 square foot construction. A few others are choosing more unusual locations and methods of data housing, taking advantage of energy efficiency, security, and other resources.

The SUPERNAP Pyramid

Steelcase_Pyramid_2

(Image Source: Wikipedia)

Formerly owned by Steelcase, the largest office furniture manufacturer in the world, this site is reportedly looking to build a $5 billion, 2 million square-foot SUPERNAP data center at the former Steelcase office building. The seven-story building, featuring a glass and granite exterior, and a two-level industrial underground complex, includes the world’s only spherical compound pendulum that constantly swings in the atrium between the points of sunrise and sunset. 

The $5 billion reflects the costs for both the data centers and the computer servers that will be placed inside the buildings over a multi-year period, according to the company. SUPERNAP Michigan will be the largest data center campus in the eastern U.S. and will serve Switch’s current and new clients.

Switch-Supernap7

Switch SUPERNAP Data Centers are the best commercial data centers in the world. They’re extraordinarily sophisticated, they have hundreds of patents, this is really the industry leading company,”  said James VanderMey co-owner of Open Systems Technologies. “This is now a facility that will host companies like Ebay, Amazon, the internet scale companies of the world that’s really an opportune to bring that to Grand Rapids.”

Floating Data Centers

In 2009 reports that Google was developing a floating data center came to light, but the company insisted that the disadvantages of such a solution made the concept unfavorable. However, Nautilus Data Technologies recently announced their successful launch of the first Waterborne Data Center Prototype with construction set to begin immediately.  

“The Nautilus proof of concept prototype exceeded all expectations — validating how our waterborne approach will provide the most cost effective, energy efficient and environmentally sustainable data center on the market,” said Arnold Magcale, CEO and co-founder, Nautilus Data Technologies. “Our innovations are the most significant data center advances in decades — marking a revolutionary change in the data center industry.”

Traditional data center models are unsustainable. They are expected to consume 140 billion kilowatt-hours annually by 2020, costing American businesses $13 billion a year in electricity bills and emitting nearly 100 million metric tons of carbon pollution per year. With its proprietary infrastructure, and its complete suite of cloud and predictive data center infrastructure management (DCIM) technologies, Nautilus will help its customers reduce both their data center expenses and carbon footprints.

I admit I was skeptical at first, wondering who could have a material impact on data center economics while still reducing risk,” said Jay Kerley, CIO of Applied Materials, Inc. “But the leadership at Nautilus Data Technologies has done just that. Proprietary technology that will always keep you steps ahead of the efficiency curve no matter the underlying pace of change and innovation.”

MareNostrum

Installed in Barcelona’s 19th Century Torre Girona chapel, The Barcelona Supercomputing Center’s (BSC) MareNostrum was once the most powerful supercomputer in Europe, and the BSC is considered one of the most beautiful data centers in the world. The exterior of this publically funded research center suggests a typical Spanish chapel. Inside, the MareNostrum is housed in a giant glass box, using more than 10,000 processors to perform 94 trillion operations per second.

The Bunker

Built in an ex-Ministry of Defense nuclear bunker in Kent, England, this 18-acre site is secured by a 3 meter-high barbed-wire topped perimeter fence. The underground data center has 3-meter-thick reinforced concrete walls, and the only entrance is through a security checkpoint, complete with electronic barriers and bulletproof glass. And to ensure your sleep is undisturbed by data security concerns, the Bunker also has an onsite security team of ex-military, ex-police, and guard dogs, patrolling the facility 24 hours a day.

By Jennifer Klostermann

Juniper Research: Top Ten Tech Predictions For 2016

Juniper Research: Top Ten Tech Predictions For 2016

2016 Top Ten Tech Predictions 

Virtual Reality and Consumer Robots Head This Year’s List

HAMPSHIRE, UNITED KINGDOM–(Marketwired – November 16, 2015) – As 2015 draws to a close Juniper Research has drawn up a list of predictions for the coming year, all neatly wrapped up as the top trends for the technologies industries for 2016. A free report detailing the findings is available to download from the Juniper website today.

2016 — A Watershed Year for Virtual Reality (VR)

Juniper has identified 2016 as the watershed year for VR headsets, both in terms of product launches and consumer roll outs. Oculus, Sony, and HTC are amongst the leading players expected to launch key VR products over the next 12 months. The recent attention to and investment into virtual reality is helping to revitalise the industry and with major brand commercial launches imminent, there is huge potential for rapid market expansion.

As a result, Juniper expects significant VR uptake over the next 5 years as consumers benefit from a combination of improved VR technology allied to immersive applications, as well as reduced prices. Consequently, the technology is now poised to transform the entertainment industry, including gaming and video, over coming years whilst offering the potential to quickly expand into other markets such as industrial and healthcare.

Top Ten Tech Predictions for 2016

The full list of our top ten tech predictions follow below. Further details are available in the free report, Top Ten Tech Predictions for 2016 available to download from the Juniper Research website.

1. Virtual Reality — a watershed year.

2. Consumer robotics becomes a reality

3. Wearables go to work

4. The race for 5G begins

5. Many devices, one platform

6. Blockchain technology embraced by financial institutions

7. Hybrid console & cloud gaming gathers pace

8. eSports delivers significant new revenues for the games market

9. New security models emerge

10. Crowdfunding Fires StartUp Growth

Juniper Research provides research and analytical services to the global hi-tech communications sector, providing consultancy, analyst reports and industry commentary.

On-Premise VoIP vs The Cloud

On-Premise VoIP vs The Cloud

Modern Day Phone Systems

The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if we cut through all the strange wording and focus on the features that make each system unique, we can develop enough of an understanding to make a well-informed decision for our own business needs. According to Morning Markets, 65% of businesses are expected to utilize some form of VoIP service by the end of this year. The growth is largely due to the cost savings and flexibility advantages of VoIP over traditional landlines. However, two distinct forms of business VoIP services have emerged: on-premise (the equipment is physically located in your office) and cloud-based (the service is accessed through the Internet). Although this may seem confusing, this article will provide even the busiest entrepreneur with a good idea of which service is a better fit.

Setting The Record Straight

ethernet-voip

To make sure we’re all on the same page, we’ll start by defining VoIP. The acronym itself stands for “Voice over Internet Protocol,” and refers to any service that provides users with the ability to make phone calls through the Internet rather than a normal analog line. It’s not that different from what you’re used to—VoIP works just like a regular phone, but exchanges the phone plug for an Ethernet plug or WiFi. You may already be aware of these VoIP services, but you may not know that consumer versions of VoIP are now the norm for most home phones. We’ve come a long way since low-cost, low-quality providers such as Vonage, and now most companies won’t even install analog services unless specifically requested by customers. In fact, you’re currently using VoIP if you have AT&T U-Verse, Time Warner’s home phone service, or Ooma—and you’re smart to do so, as VoIP services typically provide customers with free long distance and rates that are cheaper than analog.

The PBX System

Business VoIP combines VoIP phone service with the features of a business phone system, including employee and department extensions, call transferring, specialized call routing, voicemail, and more. In the past, businesses installed a PBX system to get this functionality. PBX stands for “private branch exchange,” an individual phone network used solely by the business in question, and it typically costs thousands of dollars to install. In addition to the money spent on the products and service themselves, an IT professional would need to be hired to put everything together, resulting in a significant expense by the time the setup process is finally complete. Luckily, present-day business owners need not cough up thousands in order to employ a functional phone system, thanks to technological advances made within the last decade. Virtual PBX services—“cloud services” maintained and upgraded by third parties rather than the business itself—provide the customer with an alternative to purchasing, installing, and maintaining individual PBXs within in an office.

voip-cloud

As was previously mentioned, there are two kinds of business VoIP services. The first is on-premise business VoIP, which uses VoIP lines and an on-site (or “on-premise”) PBX. On the plus side, the presence of an on-site PBX means the customer’s phone service is not dependent on a third party for the phone service. (However, the phones do still need high-speed Internet to function properly, which is important to keep in mind when considering VoIP.) Furthermore, if your business has a large number of employees located in a single office, the pricing options often scale in your favor. On the other hand, freedom from third-party maintenance does not necessarily guarantee full independence—customers must still rely on an IT specialist to maintain equipment and resolve any Internet issues, which can mean additional fees. On-premise VoIP is also problematic for on-the-go business people, as the phone system is limited to the office where the PBX is located.

Small Businesses Should Consider Cloud Business VOIP

If you have a small, growing business, you may consider cloud hosted business VoIP. Companies who offer this service host the PBX systems themselves, meaning that a business switching to VoIP only has to purchase phones. These are mailed to the customer preconfigured and ready to go—no technician needed. Any necessary management or maintenance occurs through an online portal. As one would guess, the setup costs are much lower for cloud VoIP than on-premise, primarily because the PBX is hosted elsewhere. Additionally, the phones are not confined to a single office and can be used anywhere with an Internet connection. This is ideal for on-the-go and remote employees alike, and also something to take into account if you’re a business owner looking to work from alternating locations throughout the year. Other pros to the cloud include automatic upgrades to phone system features, courtesy of the provider, and easy integration among desk and smart phones as well as softphones. (“Softphones” refers to software used when making calls through your computer rather than a desk phone or mobile phone.) Downsides to using cloud business VoIP include dependence on the PBX-hosting company, as the provider may occasionally suffer from an outage that temporarily leaves their customers with poor call quality or the inability to make or receive calls altogether. Businesses with a large number of employees may want to consider on-premise services, as pricing for the cloud business VoIP is usually based per user.

Whether you prefer on-premise or the cloud, VoIP has something to offer every entrepreneur. If you’re still using an outdated phone line, or looking to outfit your business for a low price, business VoIP is for you and your wallet.

LeoBy Leo Welder

Leo Welder is the Founder and CEO of ChooseWhat.com, LLC, a website that guides entrepreneurs through the process of starting a business, and Zilker Ventures, LLC, which manages a family of B2B information sites.

Google Taking A Back Seat To Self Driving Laws

Google Taking A Back Seat To Self Driving Laws

Google Hoping To Prove To California Regulators 

MOUNTAIN VIEW, Calif. — Hustling to bring cars that drive themselves to a road near you, Google finds itself somewhere that has frustrated many before: Waiting on the Department of Motor Vehicles.

Comic-Driverless-CarsThe tech titan wants the freedom to give the public access to self-driving prototypes it has been testing on public roads since the summer. Before granting that permission, California regulators want Google to prove these cars of the future already drive as safely as people.

The Department of Motor Vehicles was supposed to write precedent-setting rules of the road by last Jan. 1. Nearly a year later, it is still struggling. After all, the agency is geared to administering driving tests and registering cars, not settling complicated questions the technology raises.

If the cars’ advanced sensors and computing power can drive better than humans, do they need a steering wheel and pedals? Would a person even need to be inside? Google says no on both…

Read Full Article: NYTimes

Solving The Identity Management Conundrum With Sensible Cloud Solutions

Solving The Identity Management Conundrum With Sensible Cloud Solutions

Solving The Identity Management Conundrum

Businesses of all sizes are increasingly moving their IT operations into the cloud. Their reasons for doing so are diverse and varied, but typically fall into broad categories; modernisation, streamlining workflows, easier access to business-critical applications, cut costs on data centres, and so on.

While there is no denying that the amount of benefits that the cloud can bring to a business are vast, there are still some important considerations to make when making the leap.

One of those considerations is how to effectively manage identities.

The Old Problems with Identity Management

The challenge of identity management was never fully solved in the pre-cloud era, a strange anomaly given that identity and access management (IAM) has been at the heart of corporate IT security for two decades.

Management

With companies now entirely reliant on computers for all aspects of doing business, IAM is also one of the broadest issues in IT security. Whether an employee needs to access internal applications, an outsourcing company requires limited control over hardware functionality, or consumers want to interact with their online accounts, they are all dependent on secure and reliable IAM.

Managing all the access points and accounts could be a time-consuming exercise, especially if the systems have been badly implemented. Even if they have been correctly implemented, issues such as orphan accounts, poorly mapped essential data, non-existent monitoring of privileges, and wrongly assigned super-user accesses could all combine to soak up precious resources and ultimately result in costly clean-up exercises.

The Arrival of Off-Site Services

Before the explosion of off-site services, IT staff were responsible for manually performing administrative tasks in order to give the employee the correct accesses. Such an approach made meeting regulatory guidelines, sufficiently managing security controls, and creating company-wide consistency difficult to achieve – all of which only served to exacerbate the problems listed above.

As discussed, IAM now underpins almost every facet of the business world – and thus requires far more management than simply adding and removing various accesses. The system in place needs to reflect a company’s business goals and unique challenges, and thus allow it to adapt almost instantly to any new requirements that arise. Beyond that, it needs to be simple, user-friendly, and secure.

If the situation was difficult to manage before, the uptake of cloud services, the growth of the Internet of Things, and the addition of external constituents could make the problem worse. Indeed, with Gartner now predicting that by 2020 “60 percent of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace, up from less than 10 percent today”, it is vital that systems are put in place now to help manage the impending change.

Thankfully, the cloud can help by offering hybrid solutions between on-premise resources and cloud-based resources.

The Importance of Cloud-Based Solutions

The long-held ideal of effectively organising identity management in cloud computing whilst maintaining control over internally provisioned applications and resources is now becoming a reality.

data breach

(Image Source: Shutterstock)

At the core of the solution is security. With data breaches and data theft seemingly never away from the headlines, organisations are increasingly required to prove that they have strong IAM controls in place both for internal resources and for resources accessed remotely. To achieve this, the ability to tie off-premise user identities to back-end directories is vital, and systems should be used that can provide cloud-based bridges to those directories.

Some facts serve to underline this point even more forcefully; according to SC Magazine, privileged users cost US businesses $348 billion per year in corporate losses, Group ID claim 19 percent of employees change job responsibilities each year (with 5 percent of users in an average company’s Active Directory being no longer employed by the organisation), and Gartner are predicting that IAM will remain as one of the top three most sought-after cloud services.

How Microsoft Azure Active Directory Can Help

The capabilities of Microsoft Azure Active Directory (AD) address many of the issues raised. Most importantly, Azure AD can provide access control to cloud-based applications, including third party ones, but the benefits extend far beyond that.

For example, it offers tools that allow IT professionals to scan the applications in use and isolate those which have the biggest effect on data confidentiality, compliance, and auditing, it helps to identify and address cloud-based security threats, and it can provide single sign-on to the most popular SaaS applications.

It also helps to negate inefficiencies in the user lifecycle, thus becoming the perfect solution for newer SMEs that were created in the age of cloud use. It does this by including support for self-service and dynamic rule-based groups, role-based and rule-based provisioning, managing both on-premise and private cloud directories, and regular recertification of user privileges.

In the age of global business, it is also important to have a way to let partners and other vendors access your applications. Azure AD assists in this business-to-business collaboration without the need for proxy users, instead making use of email-verified and social identities.

The Future

As the necessity for greater engagement between businesses and their customers grows, and as newer social and mobile technologies continue to come online, effective IAM is more important than ever.

The Future

Businesses now have to take a consumer-led approach for granting and controlling access to their resources, especially to those which are based in the cloud. Without that approach, they risk being exposed and left behind on a number of fronts.

Systems such as Microsoft Azure AD are the perfect way for SMEs to better manage their existing users and extend their services over time, making sure they don’t miss the exciting opportunities that will arise over the next five years and beyond. Contact them for more details.

This post is brought to you by Cloud for Tomorrow.

By Dan Price

3 Steps To Ensure Third-Party Security With Your IoT Providers

3 Steps To Ensure Third-Party Security With Your IoT Providers

Third-Party Security IoT Providers

When you decide to partner with a third-party provider for your Internet of Things solution, you also partner with that third party’s security vulnerabilities.

Fair or not, your customers will hold you accountable for any security breach related to your company, especially when your brand is the face of the partnership. Companies that must maintain security compliance — like those that have to maintain The Payment Card Industry Data Security Standard — can be found legally liable for their partner’s security deficiencies, so more than your brand will suffer if you trust the wrong firm with your business.

shutterstock_53192464

The 2013 Target security breach demonstrated the potential scale of damage that businesses can suffer when third-party providers don’t practice proper security. After stealing credentials from a third-party heating, ventilation, and air conditioning contractor, attackers accessed Target’s systems and stole the credit card data of millions of customers.

Despite the security vulnerability resting with the third party, Target received all the bad press that accompanied the breach. Even today, we refer to the attack as the “Target security breach,” so don’t expect your customers to be understanding and place the blame elsewhere if your partner makes a mistake.

As the IoT becomes more mainstream, attacks like the one on Target will become more common while hackers attempt to use backdoor entrances into company networks and systems. More interconnectivity means more opportunities for breaches, so you must be vigilant when it comes to security standards.

IoT

(Image Source: Shutterstock)

Follow these three steps when vetting potential partners to prevent breaches and maintain the trust of your customers:

  1. Do your research. Don’t trust what someone else tells you. Perform your own security audit of potential partners by visiting their data centers, meeting with their IT security teams, and reviewing their security controls. If you don’t have the expertise to conduct a thorough audit, hire a specialist and don’t cut corners. By spending some money now, you could save yourself from losing much more down the road.
  1. Set high standards. Know what security controls you require from your partners. If a company doesn’t meet your standards, don’t just negotiate a smaller contract; refuse to work with it until all the necessary controls are in place.
  1. Continue to monitor. Once you find the right third-party business, don’t sit back and assume everything will be fine moving forward. Meet with its security team at least once a year to ensure your partner continues to follow and improve the security controls identified in the initial audit. If ownership changes or you notice a lot of organizational turnover, perform another audit to identify deviations and make sure the security you need doesn’t take a backseat to other initiatives.

The IoT will only continue to grow. You must prioritize security within your company and your vendors to ensure that dangerous vulnerabilities don’t accompany that expansion. Be diligent, stay up-to-date on the latest in data security, and demand a partner that takes security as seriously as you do.

Alex-BrisbourneBy Alex Brisbourne

Alex is president and CEO of KORE Telematics, the world’s largest wireless network provider focused exclusively on the rapidly expanding machine-to-machine communications market. He is a prolific speaker and opinion leader and is frequently sourced as an expert on machine communications.

Cloud Pinup: Evident.io – Securing Companies Big and Small

Cloud Pinup: Evident.io – Securing Companies Big and Small

Cloud Pinup: Evident.io

Every company should be as secure as the industry leaders with NO exceptions

More and more organizations are placing their faith in the cloud, with both their general everyday and their mission-critical workloads. They trust that the cloud has evolved to a place where their data and processes will be secure while providing all the flexibility and elasticity that defines the cloud in today’s workplace. In its 2015 survey of the Enterprise Cloud, Verizon discovered that 87% of companies surveyed were using the cloud for mission-critical workloads.

tim-prendergastCEO of Evident.io, Tim Prendergast, writes on the Evident Blog that “We can all agree now that the cloud – public, private, or hybrid – is the future of data centers for organizations large and small, and that meansdeveloping new security technologies that support this future.”

This working environment naturally produced a company like Evident, which provides a security platform that continuously monitors the client’s Amazon Web Services (AWS) Cloud, automatically identifies security misconfigurations and enables rapid mitigation of risk through guided remediation. In their own words: “Evident is united around the concept that every company, regardless of size, can be as secure in the cloud as leaders like Adobe and Netflix. This became our driving goal: to automate security processes while enforcing security and compliance policies.”

An automated, agentless and nonintrusive security service has many benefits to the customer; effortless migration to the cloud, complete visibility across all AWS accounts, regions and services, a proactive assessment of vulnerabilities and guided step-by-step remedial action when necessary.

 

evident-image

(IAM Security Signature Sample/Evident Blog)

The numbers are impressive when it comes to the Evident Security Platform: All 50 AWS Services are protected with results in 5 minutes, over 150 best practices are automated and a staggering 865 000 issues are detected per hour.

The product has been designed for companies both big and small, “From the Fortune 500 to the Fortune 5 000 000”, as it says on their blog, and Evident has already been adopted by organizations as diverse as Adobe, Jobvite and CareerBuilder.com, to name just a few.

Brian Morehead, senior devops architect at Jobvite reports that ‘Evident shows us and pinpoints issues in the way that we’ve configured specific services in our dev, QA and production environments almost instantaneously.’

And it’s not just private organizations that have embraced the work of Evident. The team has also produced a Government Edition which securely delivers Continuous Diagnostics and Mitigation to AWS cloud environments. Writing in Signal Magazine, Tim Prendergast explains “Because government servers host so much personal data about Americans, agencies need to have full confidence that when they move to the cloud, security is a top priority.”

The company secured Series A funding of $9.85 million in November of 2014 from Bain Ventures. Managing Director of Bain Ventures, Enrique Salem explained about the funding that “No other solution can deliver this type of comprehensive security for the specific challenges of cloud infrastructure. “

The amount of data produced every day in the business world is staggering and over powering to most people. “Mainstream security strategies and controls were already struggling to keep up with the rapidly evolving threat landscape,” explains Prendergast, “and we are quickly learning that these traditional tools and tactics are mostly – if not completely – inadequate for the challenges we face in cloud computing environments.”

By taking the responsibility off key teams and automating the processes, the Evident solutions free up valuable time and resources that could be better used in other more productive areas.

By Jeremy Daniel

The Lighter Side Of The Cloud – More Bandwidth

The Lighter Side Of The Cloud – More Bandwidth

more-bandwidth-cloudtweaks-com

By Rick Menard

Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our comics to generate leads to a specific landing page, newsletter, presentation or social media campaign, you can contact us regarding commercial licensing rates. Enjoy!

CloudTweaks Comics
Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…