Category Archives: Uncategorized

Effective Security Management In A Software Defined World

Effective Security Management In A Software Defined World

Effective Security Management Software defined infrastructure (SDx) along with use of private and public cloud technology is completely changing the way IT departments manage enterprise data centers and application workloads. Automation is a key component of software defined networking (SDN), bringing network, server, storage, security management and other IT functional teams together to transform the data…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

HP and Paramount Pictures Partner in Star Trek Beyond

HP and Paramount Pictures Partner in Star Trek Beyond

Hewlett Packard Enterprise and Paramount Pictures  HPE Film Integrations and New Ad Campaign Feature Futuristic Concept Technologies Inspired by The Machine PALO ALTO, CA–(Marketwired – Jun 6, 2016) – Hewlett Packard Enterprise (NYSE: HPE) has teamed with Paramount Pictures to imagine technology 250 years into the future for the upcoming Star Trek Beyond feature film…

The Week In Tech: Twitter, Apple and Microsoft Make Waves

The Week In Tech: Twitter, Apple and Microsoft Make Waves

Week In Tech In a sign that multi-national corporations are assuming more of the roles once associated with government, Facebook and Microsoft teamed up this week to announce plans to lay 4 000 miles of cable under the Ocean from Virginia Beach, USA to Bilbao, Spain. “The companies said the system — designed to support…

The Microsoft And Facebook Cross Atlantic Internet Connection

The Microsoft And Facebook Cross Atlantic Internet Connection

Facebook and Microsoft are laying a massive cable across the middle of the Atlantic. Dubbed MAREA—Spanish for “tide”—this giant underwater cable will stretch from Virginia to Bilbao, Spain, shuttling digital data across 6,600 kilometers of ocean. Providing up to 160 terabits per second of bandwidth—about 16 million times the bandwidth of your home Internet connection—it will…

Google Enters The Personal Assistant Fray

Google Enters The Personal Assistant Fray

The Week In Tech Let’s take a look back at some of the biggest stories in tech this week. The Google Assistant Siri, Alexa and M have got company. But the new guest at the party has no name, choosing instead to go by the moniker “Google Assistant”. On Wednesday this week, Google parent company…

New Google ‘Waze’ Enters Ridesharing Market

New Google ‘Waze’ Enters Ridesharing Market

Google Waze There’s a new heavy hitter in ride-hailing. Google-owned Waze on Monday unveiled a carpooling service for commuters in California’s Bay Area. The pilot program is limited to about 25,000 employees of companies including Walmart and Adobe Systems, the Wall Street Journal reported. Waze will match riders with drivers already heading along similar routes…

RightScale Releases Trends in Follow-Up to State of the Cloud Report

RightScale Releases Trends in Follow-Up to State of the Cloud Report

Docker Spreads All the Way to Production and Is Used Alongside Chef, Puppet, and Ansible SANTA BARBARA, CA–(Marketwired – May 11, 2016) – RightScale® Inc., a demonstrated leader in enterprise universal cloud management, today announced the results of the RightScale 2016 State of the Cloud Survey: DevOps Trends. The fifth annual RightScale State of the…

This Week In Tech: Streaming TV Wars, Tesla and EMCWorld

This Week In Tech: Streaming TV Wars, Tesla and EMCWorld

EMCWorld takes over Las Vegas The world of streaming content got a lot more interesting this week, following the revelation that Google has been plotting a web TV service since 2012, and now is scheduled to launch it in 2017. According to Bloomberg Technology, “YouTube is working on a paid subscription service called Unplugged that…

Microsoft And The Public Cloud Boom

Microsoft And The Public Cloud Boom

The Microsoft Public Cloud According to JP Morgan analysts Doug Anmuth, Sterling Auty, Philip Cusick, Rod Hall, and Mark Murphy, the cloud computing movement is “entering a new phase.” Implications are apparently positive for Amazon, though weak for Oracle, SAP, and other traditional IT vendors. Based on a survey of 207 CIOs at organizations with…

CloudTweaks Comics
Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Comparing Cloud Hosting Services

Comparing Cloud Hosting Services

Cloud Hosting Services Cloud hosting service providers are abundant and varied, with typical structures affording the reliability of virtual partitions, drawing resources externally; secure data centers; scalability and flexibility not limited by physical constraints; pay-per-use costing; and responsive load balancing for changing demands. While high end (and high price) services offer an extensive range of…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…