Category Archives: Technology

Cloud Infographic – Cloud Currency

Cloud Infographic – Cloud Currency

Cloud Currency Opportunities

We’ve written a bit along the lines of cryptocurrency and crowdfunding in the past, and anticipate that we’ll be writing more about these subjects in the near future. Take a look at Six Things You Didn’t Know about Cloud-Currency surrounding cryptocurrency as well as another useful infographic by Entrepreneur.com which takes a closer look at the industry growth of Crowdfunding in 2014.

Included is an infographic provided by currencyfair.com which consolidates both cryptocurrency and crowdfunding into one extensive piece titled: “The World Of Alternative Finance” .

The World of Alternative Finance-currency

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud

The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart, meticulous, took care of everything mundane and even had a sense of humor. It kept track of everything in the home and would spend its day monitoring, analyzing, troubleshooting and fixing problems. Despite the grueling work, it managed to greet the owner every evening with a drink and a status report. Who wouldn’t welcome this ideal of perfection into their lives?

robot-housekeeper

Today, the advent of internet of things and home automation has led to a ubiquitous array of smart gadgets for the home. The smart devices work to solve simple daily problems for us. The devices continuously collect data and take decisions. At the heart of them, each of these smart devices is built around sensors. The smart device relies on the data from the sensors being mined before the decision is made. To build an aware home, several sensors are placed.

Analyzing And Mapping Personal Habits

Smart devices will also learn about the user. They may, for instance, learn that the owner returns from work at 8pm so at 7:45pm the porch light should turn on, and living room should start heating. Other sensors in the home collect further information, time the residents wake up, routes they take to work, what’s missing in the refrigerator or pantry, how long they used the stove every day of the week, etc. etc. The smart home will strive to make the owner’s life smoother by checking the traffic conditions, ordering the groceries, controlling the lights, setting the water pressure et al.

The structure, the appliances, the furniture around us will no longer be passive. They will be built to be adaptive and incessantly learning. Along with the data collected by the sensors, a smart home will generate and use the home’s personal analytics to make decisions.

A full range of expert service applications to mine the data will be available via the cloud. The cloud above our homes will continually process all the data collected by the sensors, analyze it and recommend actions. It will be actively engaged at all times. Although today, most smart devices don’t work cohesively, the cloud will enable a comprehensive approach to an aware home. The information can be shared across and more qualified decisions can be made by the smart devices.

The home’s resources are used efficiently and more effectively for the home owners. It is a win-win scenario. Many home automation concepts are already becoming prevalent and are gaining adoption.

Securing Our Things

home-security

One major barrier to the adoption of the smart home is the very legitimate concern about security. The data from the sensors is sent to the cloud to gather input from expert applications. Once out of our homes where is this data stored? Simplistically, can thieves find out when I am not in town by tracing trends off of my thermostat? Or perhaps, which people are in my home at what times? Most smart devices today work in silos and they each have their policies for the treatment of the data they collect. If a standard framework for a secure smart home is not laid out in advance it is naive to believe that we can patch up security later.

Another concern for consumers is the privacy of their home data. The expert applications that service the smart device will likely reside clouds hosted by the device or service provider. To keep the cost of the service low, the providers might use the consumer data to generate and sell target market leads. The old adage goes, ‘if you are not the customer you are the product’. We see this today with all the free mail, photo sharing applications we use. This approach will be an extension to the same philosophy. The users give up more of their privacy for cost and convenience.

The concerns are in effect no different than what we are facing on the internet and social media. The dissimilarity is that now it’s personal, and it’s making its way inside homes. Consumer’s want automated housekeepers, not spies.

Despite the barriers, home automation advantages are too big to ignore. As the costs of fitting homes with smart devices comedown, we will see further widespread adoption. The cloud above our homes, neighborhoods, schools and workplaces are here to stay. The convenience of the consumers will continue drive the need to create secure and useful automated home solutions.

By Pallavi Sharma

Cloud Infographic – Cloud Investment Spending

Cloud Infographic – Cloud Investment Spending

Cloud Investment Spending

Cloud acceptance and adoption continues to grow at a brisk pace. IDC (International Data Corporation ) predicts that, the worldwide Internet of Things (IoT) market will grow from $1.3 trillion in 2013 to $3.04 trillion in 2020 and contain nearly 30 billion connected “things.” This certainly bodes well for the Cloud computing industry as thousands of new IOT devices will be connecting to the cloud via API where company developers and engineers will be producing, analysing and storing great levels of data. With the lower costs of cloud based services, it will be more and more difficult for companies to not consider adopting a service.

Attached is an excellent infographic provided by IDG which takes a closer look at the current state of the cloud.

infographic-cloud-idg

Cloud Pinup: Cloudifile – Beyond Encryption

Cloud Pinup: Cloudifile – Beyond Encryption

Beyond Encryption: Solving the Problem of Cloud Security

CloudifileWhen you store your data on the cloud, you’re entrusting it to a company that may be located hundreds of miles away. You’ll probably never see their servers in person, nor will you ever shake hands with the engineers responsible for protecting them. And there’s no mistaking the risks: hackers could find electronic back doors to access your data; a corrupt employee could compromise the system maliciously; an intermediary could intercept the data while it’s being transmitted to or from the cloud server; or the physical servers themselves could even be stolen or damaged. Even widely-trusted services like Dropbox are being hacked on a regular basis, rendering millions of users vulnerable. How can you trust that your sensitive data is safe in the cloud when so much of the process is out of your control?

Clearly, simple password-protection isn’t enough. A Google Drive or Dropbox account may gain a small amount of protection this way, but any competent attacker can get around a simple password requirement. In addition, most people allow their computers to log them into these services automatically, so if a thief steals the computer the whole storage system will be easily accessible.

Encryption

cloud_99

The most basic supplement to password protection is encryption, which scrambles server data so that hackers cannot read it. However, for encryption to work the encryption key itself must be protected. That’s why the more advanced security services, such as Cloudifile from Cloud Labs, employ a multi-layered system of data protection. This begins with the data encryption: Cloudifile’s free encryption system is in line with basic industry standards, combining RSA asymmetric encryption (2048 bits) and a Blowfish algorithm (256 bits). On top of that encryption, Cloudifile does not store the encryption key on its own servers, meaning the entire data center could be compromised and it would still be impossible for an attacker to access any sensitive data. Clients store their own keys, and so any attacker would have to get into two secure systems simultaneously in order to steal the data.

Even an advanced encryption system, however, can leave data vulnerable if the client has to open a brand-new storage account and manually import all the relevant data. Not only is the data-transfer process itself vulnerable to attacks; but residual data on the original storage server may persist in unsafe locations even after the files are “deleted,” making the secure cloud storage irrelevant. Advanced security solutions have overcome this problem by integrating familiar technologies, and here again Cloud Labs’ free Cloudifile service is a good example. Cloudifile is a Dropbox tie-in rather than a stand-alone storage service. Clients can continue using their familiar cloud storage system, but have it protected from all angles. Cloudifile users simply select which files and folders they want to protect, and the service covers them – so whereas many cloud-storage security services are akin to placing files in a secure lockbox, Cloudifile is more akin to drawing a protective boundary around whatever container the files are already in.

By Gustav Steinhardt

Monetization of the Internet of Things – Q&A With Brendan O’Brien

Monetization of the Internet of Things – Q&A With Brendan O’Brien

Q&A With Brendan O’Brien, Co-Founder of Aria Systems (Part 1)

Monetization of the internet of things (IoT) is one of the most exciting and challenging issues facing the industry today, so we spoke with Brendan O’Brien to learn more.

Brendan is the Co-Founder of Aria Systems, who are one of the leading innovators in recurring revenue management. He has written regularly pieces for tech publication ‘Wired’, looking at issues as diverse as the importance of the IoT and how capital is disrupting it, and is also a well-known public speaker who has recently given talks at Salesforce.com’s Dreamforce 2014 Conference and CTIA’s MobileCON.

1) What are the key challenges facing monetization of IoT?

Firstly, there is the initial challenge of absorbing the massive data IoT devices are expected to generate, which is necessary for accurate analytics of a customer base and wise go to market strategies.  Secondly, the mind-set of the IoT world remains largely centered on the devices themselves, despite the fact that the real monetary value lies in the recurring service potential those devices are enabled; it’s the old hardware vs. software mind-set clash all over again, and getting people’s minds attuned to focusing on the services rather than the devices is still a challenge.

2) What is the potential from the monetization of IoT?

It’s astronomical.  The commoditization via Mohr’s law of the underlying technologies that are making IoT a reality is happening at the same time that many markets and businesses are adopting recurring revenue business models, and IoT services lend themselves quite naturally to a recurring revenue business model.  It’s a perfect storm and Aria’s thrilled to find itself in the middle of it.  With IoT-enabled devices expected to hit 50 billion in 15 years, and with recurring revenue business models being adopted at an accelerating rate, it’s a pretty obvious place to want your business to be.

3) At what speed is the monetization of IoT growing?

It’s happening today, but it’s still relatively slow.  Despite studies that say 40-50% of enterprises are already embarked on some kind of IoT strategy, my anecdotal experience says it’s far lower than that in truth.  Most enterprises are talking about it, but so far few are doing much that’s material.

4) What sectors/industries are best placed to take advantage?

Connected cars, home automation and security, and wearables are the prime movers today.  But I’d say that healthcare as a sector is probably the one that is the most ripe to take advantage of IoT capability.  The same could be said for utilities.  Unfortunately, healthcare and utilities are two sectors that are notoriously slow to move, so it’s not surprising that, despite the promise IoT holds for those sectors, there isn’t massive movement in either of them just yet.

5) How did Aria become a leader? When did you recognize the potential?  

Among Aria’s enterprise customers are IoT services in the automotive, home security, and healthcare industries.  We built our system to be able to handle the far more complex world of usage/consumption billing (in addition to the far simpler subscription billing model), and that capability was a primary reason for being selected as a vendor by the companies I’m referencing.  If we know one thing about IoT, it’s that it produces a huge amount of data about the customers using those devices and you can’t effectively monetize for the customers without being able to manage that data.

Stay tuned for part two of our interview with Brendan later this week.

By Daniel Price

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense

Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to fill the buckets and 5 minutes for one person to carry the buckets, empty the bucket and return to the well to get more water. The unit of work is one person and 10 minutes to move two buckets of water. If you have two people operating and assume they talk more because there is two of them let’s say, two people can move four buckets of water in 10 minutes and 30 seconds.

buckets-challenge

When will the two person team be ahead of the one person team in terms of units of work? It occurs by the 2nd trip or 30 minutes (8 buckets versus 4). Now you can in the end speed up the process in the wrong way (such as having a person filling the buckets for the person when they return from each round trip). But like CSP’s we have many options. The first and most immediate way to speed things up is to have two people moving the water. The next quickest way is to have more than four buckets and having a third person fill the buckets while the other two are walking. Of course, we can also have many more buckets and many more people to move this along even faster.

All of these are considerations in building out your cloud portfolio. For solutions that require speed and throughput you may select a different CSP than for solutions that require ubiquitous access (network and device), but don’t require speed. One of your selection criteria should be the value of the above equation. How much water does your workload need to move?

The Reality of Security

The next consideration is the reality of security. All the CSP’s I’ve worked with actually leverage a different security model. They all report issues the same way, but they use a different model both for evaluation of threats and protection of that. The more CSP’s you have, the greater your risk of missing something from a security perspective. This may be the single “why a cloud broker?” argument. The broker would connect to your enterprise and from there would abstract the cloud services you were connecting to. They may provide identity management services, and they will provide a unified security POS (Point-of-Sale).

Eventually, as the tools play catchup, the broker may even provide the great white whale of portability. The broker is giving you the ability to move your solution effortlessly between Cloud Service Providers without disruption of service or productive time lost.

With a broker, you can change the equation above. First off the broker will give you the ability to connect directly to the well without having people moving the buckets of water. So now you can pump water from the broker at a much faster rate. Secondly the security of the water is increased as it is under your partner’s control (broker) or your control longer. Finally, the broker gives you the ability to move your water source (eventually when the tools catchup) without having to dig a new well.

Cloud Diversification Strategies

Many analysts project that organizations will have more than one cloud and more than one type of cloud going forward. Hybrid Cloud represents a mix of one or more cloud types and one or more cloud providers.

multi-clouds

When customers ask me, I always tell them one thing. Every CSP you connect requires three distinct connections

  • Directory
  • Network
  • Security Operations and Monitoring

In the end a Hybrid Cloud solution that supports a private cloud solution, and two or more public cloud solutions would have three of each of the connections above. Or if you implement a cloud broker one connection for each – and you can continue to add CSP’s forever without making more connections.

It’s why in the end Cloud Brokers make sense. Please excuse me for a moment while I go back to bailing the water out of my basement.

(Image Sources: Shutterstock)

By Scott Andersen

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud 

In theory, migrating to cloud computing should be easy. Choose a cloud provider, move the files to the data server and everything is good to go. While that may work for the personal cloud, migrating into a business cloud format is a lot more complicated.

As Ann Bednarz pointed out in a CIO.com article, companies are dealing with IT legacy systems that have been in place for years, and this makes switching to a cloud format all the more difficult.

Here are five issues to watch out for when turning to cloud computing:

Migration TimeTable 

Christopher_Messer
Christopher Messer

Complications may arise if organizations don’t take ample time to plan out their migration path and clearly identify their needs. “Complications usually revolve around overly aggressive migration timetables and not having enough time to sync large amounts of data, or not enough cycles being allocated to mapping out the new workflow for employees on the new cloud platform,” said Chris Messer, vice president of technology at Coretelligent.

It’s critical to not attempt to migrate multiple services, data-sets or interconnected and complicated services with a large number of dependencies without careful planning and a clear understanding of how all the services will operate on the new cloud platform, Messer added. “Most cloud migration challenges can be easily avoided by allocating ample time to both the planning and execution and migration phases of the project. Businesses need to ensure that they’re working with an experienced vendor, or that their IT team is leveraging a proven method or product for the migration

Security 

Even though security within the cloud has improved over the past few years, it remains one of the more complicated issues involved with cloud migration. As Asaf Cidon, CEO of Sookasa, pointed out, business owners need to think not just about the security of their data in the cloud, but also the security of the data on the devices accessing the cloud.

A move to the cloud will not magically improve security around your application or service, nor will it automatically maintain the good security controls and procedures you have in place presently. “Your organization needs to bring all the stakeholders to the table and think about what will change and what will remain the same with regard to security,” Hazdra from Neohapsis said. These stakeholders typically include the line-of-business manager, IT application development team leads, your information security team, and potentially representation from legal and compliance teams.

Shadow Cloud

shadow-it-cloud

Before the cloud migration even happens, IT departments need to realize a simple fact: employees are already using the cloud. And they are already storing corporate data there. They aren’t waiting for the company to use cloud computing, and the use of Shadow Cloud can great a lot of headaches for IT, Rajiv Gupta, CEO of Skyhigh Networks explains. IT departments need to investigate how their employees are already using the cloud and then work to migrate that use from Shadow Cloud formats into the organization-designated cloud.

Picking the Right Provider 

When it comes to cloud computing, the service provider is one of the most important elements. Choose the wrong provider, and it could cost the company thousands of dollars in security-related costs, lost or compromised data, too much down time, and other headaches. According to Stephen Pao, GM of Security Business at Barracuda, before moving to the cloud, IT decision makers need to ask questions such as: What are the agreement service levels and agreement objectives? Are there any additional service charges or hidden fees? Is there a service level objective or does it cost extra to have more services? Read the best cloud reviews. The way to avoid problems is to know what the provider can do for your company – and what it cannot do – before signing any formal agreements.

Flexibility of Infrastructure Choices 

david-bio
David W. Hsieh

One of the best things about the cloud is the number of choices available. One of the worst things about the cloud is the number of choices available. The cloud can actually reduce the amount of flexibility a company has over its infrastructure choices, according to David Hsieh, VP of Marketing at Instart Logic. “Cloud providers offer a menu of choices, but you have to choose from their options — there’s usually no ‘substitutions’ or ‘secret menu’ items you can choose from. This can cause a certain degree of inefficiency because you can’t fully tailor your infrastructure to meet specific needs.”

There will always be some manner of risk involved with migrating business functions to the cloud, but as companies become more reliant on the cloud – especially as mobile access increases – there will be risks with not moving to the cloud, as well.

It is highly beneficial for all of the teams mentioned above to analyze, assess and present what they view as the benefits and risks so effective business decisions can be made,” said Hazdra. “Cloud migration projects offer an excellent opportunity to review and improve upon the security controls present in your organization.”

By Jeremy Page

The Internet of Nano Things: It’s a small world after all

The Internet of Nano Things: It’s a small world after all

The Internet of Nano Things

Many people are familiar with the term Internet of Things (IoT), which has been used for many years to describe the interconnectedness of machines, but fewer may know about the Internet of Nano Things (IoNT), a market that focuses on the much smaller world of nanotechnology.

According to a report published recently by the research firm MarketsandMarkets, the IoNT market is expected to be worth $4.26 billion by 2016, and reach $9.69 billion by 2020, growing at a projected Compound Annual Growth Rate (CAGR) of 22.81% from 2016 to 2020.

Nanotech is built into mobile phone technology as well as the infrastructure that routes it; Nanosensors are used in scales and transactional devices, and as well and entire field of medicine is opening up in which nanotechnology takes a less invasive and more intelligent approach to diagnosis and cure.

Nanoparticle Sensors

For example, a report from Engadget demonstrates how researchers at MIT have developed nanoparticle sensors “that could eventually be used to monitor tumors or other diseases, as well as act as a tool to diagnose illnesses. These nanoparticles are made of polymer chains that can bind to the sensors a doctor needs. For instance, in the scientists’ tests, they used an MRI contrast agent called nitroxide along with Cy5.5, which glows when it encounters vitamin C, as sensors.”

A similar story, from LabManager demonstrates how nanoparticles can be developed that bond to the RNA of pests such as mosquitoes and cockroaches, which destroys the creatures without harming any other nearby lifeforms.

These are merely two of thousands of examples of the deployment of nanotech, and the potential for explosive growth in all areas of commerce, communication and science is huge, not merely in the development of new solutions and tools, but also in their reduced demand for bandwidth and energy. As the MarketsandMarkets report states, “such technologies reduce the existing pressure on the communication infrastructure and increase the pace of communication at the speed of light. IoNT also focuses on the expansion of storage capacity at lower costs which will result in local accessibility of most of the information required by people or things/objects. This can be coupled with improved processing capabilities and always-on connectivity, increasing the role of terminals in communication.”

By Steve Prentice

CloudTweaks Comics
Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The CloudTweaks Archive - Posted by
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…