IBM Makes Cloud Computing “Fashionable” With L’Oréal Deal

loreal-logo

NEWS: IBM Makes Cloud Computing “Fashionable” With L’Oréal Deal “It is wiser to find out than to suppose.”                                                               - Mark Twain (1835-1910), legendary author and humorist. There was once a time when businesses were done through intelligence guesswork – you guessed what your customers would like and you provided it, you guessed what the demand

Enjoy Full Article

The Cloud Is Killing The PC, And Giving It New Life

desktop-virtualization

The Cloud Is Killing The PC, And Giving It New Life For several months we have been hearing about the imminent demise of the Personal Computer. After all, new computer sales dipped 14% last year, so surely the industry must be doomed, Doomed, DOOMED! The personal computer industry has certainly slumped, but these are dynamic

Enjoy Full Article

Cloud Infographic: The Cloud Is Here To Stay

FireHost-Performance-Infographic copy

Cloud Infographic: The Cloud Is Here To Stay Three factors were individually tested to measure server performance – processor, memory and storage – and each were evaluated working jointly during workloads for an overall server performance grade. A bare-metal dedicated server was used as a benchmark control. Read More Edit: An infographic provided by Firehost with statistical sources from Cisco,

Enjoy Full Article

First High Performance Cloud Benchmarks Unveiled

First High Performance Cloud Benchmarks Unveiled Study highlights need for transparency in the cloud Dallas – May 14, 2013 – Until now, there have been very little verifiable, objective cloud performance benchmarks. FireHost, the secure cloud hosting company, has again bridged an important gap for enterprises that require a cloud they can trust before they’ll

Enjoy Full Article

Google Dumps Custom Linux In Favor Of Debian For App Engine

google-app-engine

Google Dumps Custom Linux in Favor of Debian for App Engine Google has made the switch from its own custom version of Linux, which they called “Google Compute Engine Linux” to more standard and generic, Debian Linux for App Engine. The switch syncs with the announcement of Debian 7.0 codenamed “wheezy” which brings significant new

Enjoy Full Article

Cloudera Not Cutting It With Big Data Security

Cloudera Not Cutting It With Big Data Security  Cloudera is, for the moment, a dominating presence in the open source Hadoop landscape; but does it have staying power? While Cloudera’s Big Data platform is the darling of the Hadoop space, they and their open source distribution competitors have so far failed to adequately address the

Enjoy Full Article

HR Security Risk Prevention…

HR Security Risk Prevention… With the rapid adoption of the Cloud by SMEs as well as large enterprises, it has become vital to review and update HR policies to mitigate information security threats that come with this paradigm shift. Cloud systems differ from traditional, in-house IT infrastructure in a way that businesses now have less

Enjoy Full Article

IT Disaster Recovery For SMEs

image-graph

IT Disaster Recovery For SMEs According to credible estimates, an hour of outage may cost a medium sized company $70,000. Yes, that is accumulated losses when IT systems go offline. What’s interesting to note here is that in contrast to the popular belief that natural disasters constitute the primary reason for IT system failure, a

Enjoy Full Article

How Cloud Broker Software Is Accelerating Enterprise Cloud Migration

How Cloud Broker Software Is Accelerating Enterprise Cloud Migration When I say “Cloud Broker”, don’t confuse it with the official definition which is – an agent who assists cloud consumers choose or migrate to single or multiple cloud platforms. There’s a new set of software which sits on top of the Cloud stack and adds

Enjoy Full Article

Data Encryption For Education

education-data-cloud

Data Encryption For Education Schools, colleges and universities are facing data security issues on a regular basis and the nature of their IT systems present unique challenges. Balancing diverse information with required security control is complicated when the IT infrastructure is decentralized and difficult to manage. Adding to these challenges is a diverse user population and

Enjoy Full Article