Category Archives: Cloud Computing

Clouding Around: Apple, Twitter And Amazon Web Services

Clouding Around: Apple, Twitter And Amazon Web Services

Amazon Web Services Expands to Analytics

At its annual AWS re:Invent conference, Amazon unveiled a smorgasbord of new products designed to poach legacy customers at rival companies like Oracle and IBM. One of the most notable is the new AWS Import/Export service, which Amazon says is “faster, cleaner, simpler, more efficient, and secure.” Moving petabytes of data is also easier, thanks to a new Snowball appliance that is robust enough to withstand a 6 G shock, the company said.

In addition to the 47-pound tamper-resistant storage device, the Amazon Kinesis Firehose was also announced, making it easier to load streaming data into AWS. With Firehose, customers can create delivery streams and route them to Simple Storage Service (S3) buckets or Amazon propagation tables. It will then do all the monitoring, scaling, and data management, the company said.

Furthermore, Amazon courted legacy customers by introducing a new tool called Amazon Inspector, which can analyze behavior of applications running in AWS, while also detecting security issues on the fly.

Now, what about the rumored business intelligence tool that Amazon is reportedly working on? Enter Amazon QuickSight, a BI tool that the company is offering at 1/10th the cost of traditional analytics services. It’s also capable of handling data-intensive workloads such as sales analytics, ad targeting, customer segmentation, forecasting and planning, clickstream analysis, inventory and shipment tracking, and IoT device management.

Amazon also announced that AWS now has over 1 million active customers (businesses), making it a $7.3 billion enterprise.

Apple Buys Perceptio

Apple acquired Perceptio, a startup specializing in deep learning and artificial intelligence, reports Bloomberg Business. The iPhone maker confirmed the acquisition, sending a boilerplate response that said: “Apple buys smaller technology companies from time to time, and we generally do not discuss our purpose or plans.” The financial terms of the deal, however, were not revealed.

Founded by artificial intelligence researchers, Nicolas Pinto and Zak Stone, Perceptio is working on an advanced image-recognition system for smartphones that doesn’t rely on too much data in the cloud—a boon to Apple’s praxis, which is to minimize the use of customer data, all for the sake of privacy.

Perceptio uses deep learning, an advanced artificial intelligence that allows computers to process sensory input. This means that Apple’s upcoming iPhones and iPads will have better machine learning capabilities, able to do perform advanced calculations without storing data in the cloud. An advanced image-recognition system could also improve image processing in iOS. Last week, Apple nabbed VocalIQ, a speech intelligence startup.

Twitter Debuts Moments


(Image Source: Joseph Sohm / Shutterstock)

Hot on the heels of Jack Dorsey’s appointment as the new CEO of Twitter, the social network is rolling its most important product update. Enter Moments, a new feature that displays a curated list of tweets on various subjects, ranging from sports and entertainment to science and technology. Simply put, Moments is Twitter’s own newsfeed. The concept is somewhat similar to Snapchat’s Live Stories feature.

Twitter has partnered with the New York Times, Washington Post, Fox News, NASA, Vogue, MLB, and Getty Images to curate interesting stories. The social network plans to expand its list of partners in the future. The feature is currently available in the U.S. To use it, tap the lightning icon or the new Moments tab, where you will be able to discover trending stories on Twitter.

Twitter has been working on the feature for a long time. Internally, it’s been called Project Lightning. The new feature serves two purposes. One is to capitalize Twitter’s strength, which is real-time news. The second is to attract new users, who are somewhat intimidated by Twitter’s interface. With Moments, new users won’t have to follow important people and publishers to get updates. Moments will determine how Dorsey will be remembered in his new role as Twitter’s leader.

European Court of Justice Rips ‘Safe Harbor’ Data-Transfer Agreement

The European Court of Justice, the highest legal authority in the European Union, declared the “Safe Harbor” agreement between Europe and the United States to be invalid, stating that its 503 million Europeans do not have the right to bring legal cases in the U.S., should their rights to privacy are infringed.

The Safe Harbor agreement, which allows American companies to collect data from web searches, social media posts, and other online transactions in Europe, was signed in 2000. Under the agreement, the United States promised to protect the data of European citizens. Over 4,000 American and European companies vowed to treat any information moved to the U.S. with the same privacy rights the data had inside Europe.

The ruling is big blow to technology companies, including Google, Facebook, Apple, and Microsoft. Now that the agreement is void, American companies will need to check with their legal teams to ensure that the data of their customers are transferrable. Tech companies use personal data to tailor advertisements and promote products that are based on the habits of their users.

By Gene Briones

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies

Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients.

Industry experts are stating that mobile connected technologies are providing much more than just gains in productivity for the healthcare industry.

Care teams are using mobile technologies to collaborate in new ways and extend their reach,” says Kevin Dean, managing director of Healthcare, and Life Sciences for Cisco Consulting Services. “In the past, patients only had access to the clinicians and specialists in their vicinity. Many doctors were forced to be a jack of all trades, especially in rural areas. But with mobile technologies, patients and clinical teams have better access to one another, which creates opportunities to improve care and design new care models.”


What the New Model Looks Like

The healthcare industry has always been associated with response-based actions. People who are in need of help won’t be on the radar unless communication is established. With the help of technology, clinical teams and their patients have an opportunity to be more proactive, working together to try to avoid—or at least delay—crises in chronic diseases and medical events.

Synchronizing the communication between previously disconnected care teams is one way mobile technologies are transforming the healthcare industry. With more integrated care, patients can receive attention and advice before an acute event occurs.

This coordination isn’t just reserved for clinicians. Social workers and elderly care professionals also have an opportunity to partner with integrated care teams, bringing “hospital expertise” to patients’ homes and daily lives and helping avoid unnecessary admissions.

Patients Can Be Cared For Without Coming Into a Facility

As independent care teams become more integrated and better coordinated, they can extend their capabilities and resources to new patients and to existing patients in new ways. Telehealth and telemedicine technologies, for example, are helping providers deliver care at a distance.

Telehealth allows clinicians to consult with patients who are not at the hospital or doctor’s office, which can save time and costs for both the provider and patient in managing their disease. Telemedicine helps two or more clinicians, such as an on-site generalist and remote specialist, work together in support of a patient.

Dynamic Care for Everyone


Mobile technologies create more dynamic care solutions. With the “Internet of Everything” movement connecting any number of devices and sensors, providers now have a chance to analyze a large amount of healthcare data in real-time and make better decisions much quicker. What normally took days could take minutes.

Beyond epidemics, dynamic care could help health providers better understand and improve their operational efficiency, patient support, and community impact. With faster, more proactive decisions and care, providers have an opportunity to minimize adverse events, circumstances, and costs.

Getting Patients Involved

The most important factor to consider is that mobile technologies are allowing patients to play a greater role in their own care. Smartphones and other mobile devices, in particular, are helping patients gather important personal health details—insulin levels or blood pressure, for example—and send them to their doctor. Doing so gives the care team more patient information more frequently, complementing or even circumventing hospital or office visits.

(Image Source: Shutterstock)

By Connected FuturesMag (Cisco)

Google Customer Match And The New IoT Business Model

Google Customer Match And The New IoT Business Model

The New IoT Business Model

The Internet of Things (IoT) faces new challenges almost daily, from software to security to management requirements, but also continuously offers us new prospects. Gartner is predicting 25 billion plus connected devices by 2020 and related revenue exceeding $300 billion, the impact of IoT on businesses today and in the future is due much consideration. Exigent Networks takes a look at how it will shape the future of business and states that IoT will soon dominate the world’s device market. By 2019, the IoT market is expected to be twice as large as the combined PC, tablet, smartphone, connected car, and wearable market, adding $1.7 trillion to the global economy. Exigent Networks also asserts that software and infrastructure will drive revenue while hardware sales are likely to account for only 8% of the total revenue.

IoT and your Customers

See high quality PDF


(Image courtesy of Intel discovered via: Visual Capitalist)

  • IDC forecasts the market to be worth $7.1 trillion
  • Cisco has estimated by then, 5 billion people and 50 billion devices will be connected
  • Morgan Stanley feels the number should be even higher: up to 75 billion devices connected in 2020

AVG’s General Manager of SMB, Mike Forman, remarks, “The Internet of Things is one of those nebulous bits of jargon invented by the IT industry, and many people I meet are confused by what it actually means…we wanted to show how the Internet of Things can bring opportunity to small businesses.” According to Exigent Networks’ infographic, opportunities include:

  • New business models

Speeding up time to market, triaging market performance, and responding rapidly to customer needs.

  • More efficient, real-time operations

IoT connection allows for greater business intelligence, bolstering operational efficiency and effectiveness.

  • Real-time information on mission-critical systems

Data about products and processes can be captured timeously for the creation of new revenue streams, improved operational efficiency, and increased customer loyalty.

  • Diversification of revenue streams

Creating new services and revenue streams on the foundations of traditional products.

  • Global visibility

IoT lets enterprises see across the business, regardless of location.

  • Increased cybersecurity and privacy concerns

The more data that is collected and combined, the greater the security risks. The potential for hacking into valuable and sensitive business information is a severe threat that needs to be mitigated.

Though security, cost, and external monitoring of IoT remains a concern, eight out of ten small businesses surveyed believe IoT is likely to broaden their opportunities in the future. As explained by Paul Saffo, Managing Director of Discern Analytics, “The biggest shift is a strong move away from a single do-everything device to multiple devices with overlapping functions and, above all, an inter-relationship with our other devices.

Google Customer Match


(Image Source: Shutterstock)

A new service from Google, Customer Match, is putting some of these opportunities to work. Launched in September, this service allows marketers to more precisely track and target users by loading their own email address databases into Google’s new advertising system. This information is then used by Google to target online ads, and also opens the door for personalized ads across devices. Highly segmented personalized ads, an example of retargeting, results in users seeing the same ad across multiple sites. Traditionally accomplished using cookies, retargeting was tied to a particular device; Customer Match instead hones in on certain individuals, regardless of device.

Customer Match Privacy

Of course, with the massive volumes of data being uploaded privacy and security is, as always, a concern. Google insists that email addresses loaded into Customer Match are handled in a “secure and privacy-safe way.” Some question the necessity of the customers’ knowledge that their details may be shared with companies such as Google, but Nicki Lamont, an internet marketer and SEO specialist, states, “I do see the concern of, ‘It’s your email address, where’s it going to go?’ But that’s kind of the world we live in now. If you put something online, it’s a little bit fair game.

By Jennifer Klostermann

Smart Accessories: The Apple Watch Hermes

Smart Accessories: The Apple Watch Hermes

The New Apple Watch Hermes

Apple began allowing the purchase of their newest wearable tech in collaboration with Hermes yesterday, October 5th, 2015. The French Luxury brand and and world’s largest technology company began collaborating after the introduction of the newest iPhone model last month. While this product release may not be the most significant in recent months (the new iPhone 6, Apple TV, and larger-than-life iPad Pro top the list), the partnership between these two brands alone is huge.

Smart clothing has seen a recent surge in popularity, with sport health bands, the Pebble, and necklaces that monitor heart rate and the amount of steps you’ve walked in a day being commonplace among western people’s daily accessories.

(Image Source: Shutterstock)

The Apple Watch Hermes features a standard Apple Watch face with three unique types of bands, the single tour, double tour, and cuff models. With the standard price of a baseline Apple Watch being over $400, the partnering allows Apple to convey their latest new gadget as a luxury item. There is no doubting that those who can afford the watch are interested in luxurious accessories (The collection ranges from $1100 to $1500).

What the Apple Watch Hermes represents is the combination of mobile technology and high-end fashion. With two powerhouse brands such as these partnering up, it’s a matter of time before other technology companies pair their wearable tech with other fashion brands.

Hermes has always been known to be selective in the brands that it chooses to partner with, and ripples are being set within the fashion industry. The collection will only be available in 70 stores world-wide, and you can expect to find the watches in select Apple stores, Hermes boutiques, and high-end retail stores such as Maxfield, Colette in Paris, and Selfridges in London.

You can read more about the watch specifications on Apple’s product page.

By Keith Baird

Amazon AWS Connecting To Lucrative IoT Market

Amazon AWS Connecting To Lucrative IoT Market

Amazon AWS

Though both Microsoft and IBM have revealed plans to support the Internet of Things, with billions of connected devices gathering consumer and industrial data to be passed on for cloud storage and analysis, Amazon Web Services (AWS) hasn’t shown much initiative to date. However, the AWS offering is about to get in the ring. Though existing AWS services such Kinesis data ingestion, EC2 compute, and S3 storage are currently used for IoT data analysis by companies like Ayla, it’s been reported that partnerships with chip enterprises and facilities to support IoT service opportunities will be announced this week at the annual AWS Re:Invent conference.



According to Fortune, the new AWS service will link the AWS cloud platform to silicon from specific vendors, thus targeting developers who are trying to build connected devices. It’s implied that this service will be similar to services currently offered by IBM, Microsoft, and Ayla Networks. With companies already storing proprietary data on AWS including the likes of Airbnb Inc., Netflix Inc., Pfizer Inc., and Nike Inc., Amazon is in a prime position to offer an add-on service to help businesses analyze their data. Analyst Pringle & Co. expects the business intelligence market to be worth $143 billion in 2016, and say Boris Evelson, an analyst of Forrester Research Inc., “This will be the new 800-pound gorilla in the market.”

Space Needle

Amazon’s new analytics service, code named Space Needle, may further endear AWS customers by housing more of their data, and would broaden the cloud-computing user base to include non-technical employees as well as the current IT division users. It’s expected that Space Needle will provide a faster data transfer or copying method, and in situations of gargantuan data exchanges, Amazon would provide a storage device for customers to send back with their data.

IoT Suites

An IDC study across 15 countries, surveying 2,500 IoT decision makers, found that 73% of the companies surveyed already have IoT implementations in place, or will have in the next year. Specialists agree that Amazon needs to create a suite of services that are more easily tapped by developers, similar to amalgamations already offered by Microsoft and IBM. Essential competencies would include means of getting and managing many devices online, as well as reliable data collecting and analyzing facilities. Amazon’s newly purchased 2lemetry is able to offer device management and monitoring, and Space Needle could be the required data evaluation service.


A crowd of smaller startups are already offering cloud services tied to development platforms, and many of them have been hosting these offerings on AWS. Companies such as Particle, Ayla Networks, and Electric Imp could face a new set of challenges should their principal partner become a competitor. Currently companies begin developing their ideas on a test board in an engineer’s lab, but having a cloud provider such as AWS means that successful tests can easily be scaled up, and hundreds of thousands of units can be manufactured, without ever switching from the test cloud to the real cloud.

By Jennifer Klostermann

The Need For A Security Incident Response Team

The Need For A Security Incident Response Team

Security Incident Response Team

The incidences of modern cyber-attacks are growing, along with their sophistication. Every single weakness, whether technological or human, is being constantly exploited, and the interconnectedness of computers means that a break-in, theft or infection on one system has far-reaching consequences with customers, suppliers and the general public.

Network Security

Network security is an industry created out of necessity. Company decision-makers must recognize that the sheer variety of attack vectors is something that requires constant vigilance, and that not only preparedness, but post-attack response strategies, too, are a critical part of doing business.


MetricStream is a global organization that focuses on Governance, Risk, and Compliance (GRC) for modern and digital enterprises. Their recent white paper, entitled The Important Role Of A Cyber Security Incident Response Program, and authored by Vibhav Agarwal and Dr. Michael Redmond, presents a comprehensive assessment of the damage that hackers can cause, the value of deploying a Security Incident Response Team, along with some fascinating case studies and a wealth of highly actionable preventative steps.

Here is an excerpt:

We live and do business in a whole new world; one marked by increasing cyber attacks, and all new rules. Beyond the increase in frequency of attacks, we also face an increase in the types of organizations that have become targets. Today, it goes beyond banks and government-related institutions, to include healthcare providers, retailers, and essentially any entity that owns or has access to the assets and information of its consumers.

Organizations require more focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy. Furthermore, organizations need to ensure compliance with new laws and regulations that govern how they protect information assets.

It’s also critical that organizations buy into the fact that network and systems administrators alone cannot protect corporate systems and information assets – it must be an organizational team effort. A Cyber Security Incident Response Team (CSIRT) is a must in today’s world.

In April 2012, a server hack was responsible for a HIPAA violation by the Utah Department of Health, where over 780,000 people were compromised in the server attack at the authentication level, permitting hackers to hijack Social Security Numbers and personal health records. It was determined that a vulnerable server was not properly configured as per normal procedure, allowing hackers to gain access into the computer network. Added to that, in January and February 2012, nearly 1.5 million individuals were affected by hackers who successfully infiltrated and gained access to the payment processing system of Global Payments Inc. On December 14, 2014, it was reported that the Dutch government suffered a website outage due to a cyber attack. Allegedly, hackers crippled the Dutch government’s main websites for most of the day, rendering back-up plans and contingencies largely ineffective. All of this goes to show the serious loopholes in our current infrastructure and back-up plans.

While organizations cannot always prevent a breach, a quick response to a security event can go a long way when it comes to minimizing the financial damage and most importantly, protecting the business and its reputation. In order to reduce the costs associated with increased call center activity, customer education and awareness programs, brand repair campaigns, legal and compliance fines, and expenses associated with any customer settlements, organizations should adopt a proactive approach with timely stakeholder communication.”

Pandora’s Box

Of greatest significance in the paper is the recognition that attacks have incalculable costs. Data breaches and thefts unleash a Pandora’s box of additional problems. One compelling case study describes a data break-in to a state Revenue agency that resulted eventually in the filing of hundreds of fraudulent tax returns. It is precisely because no organization can know everything that must be known, that an alliance with governance, planning and response organizations is essential. To review the entire paper, visit Metricstream

By Steve Prentice

Facebook Mobile Internet Traveling To Africa

Facebook Mobile Internet Traveling To Africa

Facebook Mobile Traveling Far And Wide

Expanding Internet access has long been among the chief goals of various web companies and tech world leaders. Google, Microsoft, and Facebook have all been working on ways to make the World Wide Web truly world wide. Mind you, the motivations aren’t completely altruistic. The more people on the web, the more people who can sign up for Facebook and use Google Search, among other things.

Now, Facebook has announced that it will work with France’s Eutelsat Communications to expand internet into Africa. Forget fiber optic lines and all that, Facebook is looking to use a satellite instead. The project, which is housed under the company’s organization, is already under construction and is currently slated to be launched in 2016.


The satellite will be called AMOS-6, and it will help provide Internet access to large parts of West, East and Southern Africa. Despite the immense proliferation of the web, Facebook points out that as much as two-thirds of the world’s population lacks access to the Internet.

Facebook Internet Provides Mobile Accessibility To Millions

Little is known about the satellite itself. No exact launch date has been given, nor has a price tag been disclosed. It’s also unclear how people will access the web, though people close with the project have said that users will be able to use off-the-shelf equipment.

Africa offers a huge potential for growth for Facebook. So far, only about 20 million Africans are on the social network, but Facebook is expanding its efforts. Besides the aforementioned project, the company also opened its first office in Africa, this one located in Johannesburg.

Building the basic infrastructure to grant Internet access, such as fiber optic cables, is expensive. At the same time, some regions, including much of Africa, as sparsely populated. Thus, there would be no economic access to connect tiny, poor villages to the web, at least not through traditional means.

That’s why companies like Google, Microsoft, and Apple are all working so hard to get creative. Google has been developing technologies to use with satellites, blimps, and microcells, for example. Numerous other companies and organizations are working on a wide range of technologies that could help deliver the web to poor, rural areas.

Facebook Mobile Apps

So far, Facebook’s activities through have been somewhat limited. The company did launch an app through the program that contained a stripped down version of Facebook and other valuable Internet services, such as Wikipedia. In theory, this app was easier to use on low-powered cellphones with limited web access, and helped introduce new users in poorer regions to the power of the Internet. Still, the satellite program offers a serious step forward.

(Image Source: Shutterstock)

By Brian Brinker

Amazon Web Service To Launch Big Data Analytics Service

Amazon Web Service To Launch Big Data Analytics Service

‪Amazon Web Services‬ – Space Needle

Amazon is planning to launch a new analytics service for its cloud computing platform, sources told the Wall Street Journal. The business intelligence tool, dubbed Space Needle, is expected to be announced this week at the company’s AWS re:Invent conference in Las Vegas.

Amazon Web Services (AWS) is made up of computing services, which operate across eleven geographical regions around the world. AWS includes Amazon S3, Amazon Elastic Compute Cloud, and Amazon CloudFront, the company’s very own content delivery network. Amazon declined to comment on the report.

Space Needle, as it is reportedly called, allows IT professionals and system administrators to transfer and copy data faster to AWS. If the amount of data is too huge to migrate to the cloud, Amazon will be sending storage devices to customers so they could manually store any data. The storage devices, along with the data, are sent back to Amazon.

However, the business intelligence tool isn’t free. Sources familiar with Amazon’s plans said there will be a monthly subscription fee, although the final pricing wasn’t revealed. Business intelligence services are booming. Pringle & Co. estimates the business intelligence market to be worth around $143 billion in 2016.

Amazon’s foray into the data analytics market poses a threat to tech companies like Microsoft, IBM, SAP, and Tableau Software, who already launched their own business intelligence programs. Microsoft released its Power BI software in July. Seattle-based Tableau Software also introduced new features to its tools earlier this year.

According to Boris Evelson, an analyst at Forrester Research, Amazon is in a strong position because it can offer the tool as an add-on service. He says that Space Needle is like the “new 800-pount gorilla in the BI market,” adding that the immaturity of the data analytics market compelled Amazon to create its own tool.

Amazon Web Services has a long list of high-profile clients, including Nike, Netflix, Airbnb, and Pfizer. The Wall Street Journal notes that Space Needle will help Amazon lock in more AWS customers into the platform. But, more importantly, it will allow non-technical professionals, such as business managers and marketing employees, to use what was once considered to be a complex platform.

By Brian Brinker

CloudTweaks Comics
A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

Security and the Potential of 2 Billion Device Failures

Security and the Potential of 2 Billion Device Failures

IoT Device Failures I have, over the past three years, posted a number of Internet of Things (and the broader NIST-defined Cyber Physical Systems) conversations and topics. I have talked about drones, wearables and many other aspects of the Internet of Things. One of the integration problems has been the number of protocols the various…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…


Sponsored Partners