Category Archives: Uncategorized

Can You Hear It? Connecting With Amazon Echo

Can You Hear It? Connecting With Amazon Echo

Connecting With Amazon Echo

Amazon is invading your home, although not with its cardboard shipping boxes and books.

The e-commerce giant expanded its line of connected home devices on Thursday including a smaller version of its voice-controlled Echo that comes with a virtual assistant that can answer questions, turn on lights, and order items like diapers. The company also debuted a wireless speaker that allows you to play music from your phone and more.

Echo Dot

Similar to the Amazon Echo, Echo Dot is a Wi-Fi-connected, voice-activated personal assistant. The biggest difference with the new model is its small size—it’s about as big as a hockey puck versus a 9.25-inch tall cylinder for the Echo—and that it comes with only a tiny speaker. Instead, users who want high quality sound must connect the device wirelessly to third-party speakers through Bluetooth or through a cord…

Full Article Source: Time

News: Apple And FBI Continue Fight

News: Apple And FBI Continue Fight

Apple Inc and the U.S. Federal Bureau of Investigation will make their cases before a congressional panel on Tuesday regarding a court order to force the technology company to give the FBI data from the iPhone belonging to one of the San Bernardino shooters.

On Thursday, Apple filed a motion to vacate the court order, maintaining its stance that Apple Chief Executive Tim Cook said he would be willing to take all the way to the Supreme Court.

Apple’s general counsel, Bruce Sewell, will argue Tuesday that creating a tool to unlock the phone would weaken the security of hundreds of millions of Apple devices, according to Sewell’s prepared remarks before the U.S. House of Representatives Judiciary Committee.

Hackers and cyber criminals could use this to wreak havoc on our privacy and personal safety,” he said in those remarks.

Sewell will testify directly after FBI Director James Comey, who told lawmakers last week that creating an unlocking technique would “unlikely to be a trailblazer” for setting a legal precedent and would not be useful for breaking into later generation Apple devices…

Read Full Article: Reuters 

Dell Announces Launch Of The Dell SonicWALL Ahead Of RSA Event

Dell Announces Launch Of The Dell SonicWALL Ahead Of RSA Event

Dell Security Multi-Engine Approach Advances Sandboxing Beyond Threat Detection to Complete Prevention with New SonicWALL Capture Advanced Threat Protection (ATP) Service

SAN FRANCISCO–(BUSINESS WIRE)–Dell today at RSA announced the launch of the Dell SonicWALL Capture Advanced Threat Protection Service, which enhances organizations’ ability to safeguard against today’s shape-shifting cyber threats. Taking a first-to-market, adaptive, multi-engine sandboxing approach, Dell Security is incorporating the VMRay third-generation Analyzer threat detection analysis engine with the Lastline Breach Detection platform and the Dell SonicWALL Sonic Sandbox threat analysis engine, to deliver a three-layer level of defense that organizations need to safeguard against today’s unknown threats. This new cloud offering reinforces the commitment Dell Security has made to delivering comprehensive protection against the meteoric growth of zero-day attacks targeting businesses today, as identified in the Dell Security 2016 Threat Report. The Dell SonicWALL Capture Service will be showcased this week at RSA.

Shift Cybersecurity Investment to Detection and Response

Today, organizations of every size are targeted by a diverse range of cyber criminals who continually seek, find and exploit security holes in applications and infrastructure to gain access to the network, often perpetrating serious harm within minutes. According to the newly published 2016 Dell Security Annual Threat Report, the Dell SonicWALL Threat Research Team documented a 73 percent increase in unique malware samples collected over the previous year. Most of these threats were targeted, evasive and zero-day attacks found across computing systems and devices.

With smarter threats and malware often designed to detect the presence of a virtual sandbox and evade discovery, organizations need an intelligent, advanced threat detection system that not only analyzes the behavior of suspicious files, but also uncovers hidden malware without being detected itself.

Industry analyst firm Gartner stated, “IT risk and security leaders must invest in technical, procedural and human capabilities to detect when a compromise occurs. They must provide the tools for first responders to react quickly and investigate the source and impact of breaches, compromises and incidents…”

Read Full Release: Businesswire

IBM Makes Major Moves This Week

IBM Makes Major Moves This Week

Major Cloud Announcements

Is it possible to reach out and define your part in the cloud? IBM is doing just that. IBM has partnered with Vmware and others to mark out its lead in the cloud territory. Hosting its own InterConnect event in Las Vegas, IBM unveiled several large partnerships with Apple, Vmware, GitHub, Bitly, and Siemens. These partnerships will change IBM’s future in the growth of mobile and cloud services.

IBM and Apple

Collaborating since 2014, IBM and Apple have been developing enterprise mobility solutions together. Today, their collaborations and deals are surrounding their developer tools, specifically Apple’s programming language Swift and IBM’s current role in making it accessible in the cloud. It wasn’t long after Apple open sourced its Swift programming language that IBM launched its free browser-based online sandbox to help developers write code more easily. For the runtime environment, the IBM Swift Sandbox uses a Docker container, which allows Swift to live in the cloud. This makes it the first cloud provider to enable app development in Swift.

According to statements, IBM’s Swift Sandbox is now being used by 100,000 developers and has over half a million code runs. IBM is bringing this all together with its partnership with Apple to create a preview of a Swift runtime and a Swift Package Catalog to create enterprise apps.

IBM and VMware

IBM and VMware recently expanded their partnership to carve out a bigger role in cloud computing for both companies. The agreement will make it faster and easier for companies who use VMware’s virtualization products, to deploy and run them on one of IBM’s new cloud data centers. The idea is so those companies can directly connect their own data center to the cloud, making IBM’s services that much more attractive to VMware’s customers. Both sides will get better cloud access, and attract more clients.

VMware’s virtual services are attractive to many of IBM’s customers as they offer virtualization services. Virtualization allows one server to run many operating systems. This is cheaper and more efficient than on-premises computing, which would require the purchase, maintenance, and storage of these operating systems.

According to a recent release, ‘no two other companies can offer the same level of solutions to help customers consolidate their datacenters, run their business critical applications with confidence, and accelerate their journey to their own private cloud and the ability to leverage public cloud offerings.’

IBM and VMware share tens of thousands of customers across the globe from small businesses to multi-national enterprises. Their solution is the standard for many of the world’s top companies in their industries, including Financial Services, Retail, Manufacturing, Health Care, and Education, just to name a few.

By Tina Rose

Unlocking The Doors Of Individualized Patient Care With Big Data

Unlocking The Doors Of Individualized Patient Care With Big Data

Individualized Patient Care And Big Data

FORT WASHINGTON, PA–(Marketwired – January 27, 2016) – An unprecedented approach to clinical research, documented in the January issue of JNCCN — Journal of the National Comprehensive Cancer Network, brought together 32 researchers from 14 different institutions, including community and academic cancer centers, universities, and biotechnology and data sciences companies, to identify potential interventions for a patient with metastatic triple-negative breast cancer (TNBC) — an especially aggressive subset of breast cancer that is widely considered to be incurable. The Intensive Trial of OMics in Cancer (ITOMIC) deeply characterizes and tracks the molecular features of a patient’s tumor, aggregates experts to generate hypotheses regarding treatments that are predicted to be beneficial, allows these predictions to be tested in the patient, and learns from these experiences to help future patients. This first report from ITOMIC describes a patient with triple-negative breast cancer metastatic to bone, who had markedly elevated circulating tumor cells (CTCs) that were monitored 48 times over nine months.

Full access to the JNCCN article, titled, “A Distributed Network for Intensive Longitudinal Monitoring in Metastatic Triple-Negative Breast Cancer,” is available until February 23, 2016, on JNCCN.org…

Read Full Release: Marketwired

Microsoft’s $1 Billion Giveaway In Cloud Services To Non-Profits

Microsoft’s $1 Billion Giveaway In Cloud Services To Non-Profits

Microsoft Donates Cloud Services

Software giant Microsoft announced that it will be giving away US$1 billion in cloud computing services to non-profit organizations and researchers in order to ‘serve the public good’. Speaking at the World Economic Forum in Davos, Switzerland, Microsoft CEO Satya Nadella laid out a vision to empower “mission-driven organizations around the planet with a donation of cloud computing services — the most transformative technologies of our generation,”

The initiative is the first public declaration of intent from the newly formed Microsoft Philanthropies, a new organization within the company focused on driving digital inclusion and empowerment around the world. This program will roll out over the next three years.

The news is a massive endorsement for the transformative value of cloud services. In a press release on its News Center, Microsoft said that “Cloud computing has emerged as a vital resource for unlocking the secrets held by data in ways that create new insights and lead to breakthroughs not just for science and technology, but for the full range of economic and social challenges and the delivery of better human services.”

cloud-services

(Image Source: Shutterstock)

The more than 70 000 organizations and 900 university researchers will benefit from this initiative in three ways. Microsoft plans to serve the broad needs of the nonprofit community through access to Microsoft Azure, including its CRM Online and the suite of well-loved Office 365 Products. It will also ‘expand access to cloud resources for faculty research in universities’ in order to ‘accelerate their research on cutting-edge technologies’ and finally, to ‘reach new communities with last-mile connectivity and cloud services’. The company intends to support 20 low-cost, last-mile connectivity programs in at least 15 countries by mid-2017.

On the face of it, this seems like an incredibly smart move from Microsoft. Now only is it generous and will be tremendously helpful to countless well-meaning organizations, but it could also create a whole new market of loyal Microsoft cloud users who will be familiar with its operating systems and remember the generosity that the company has shown to help them migrate to the cloud.

By Jeremy Daniel

CES: Google Project Tango Phone

CES: Google Project Tango Phone

Getting around Vegas during CES can be a maddening experience. Casinos are vast and built to be confusing. Where’s my meeting room again?

Usually you’d have to rely on signs and people pointing you in the right direction. But Project Tango, a Google platform that utilizes an array of sensors and cameras to detect where your phone or tablet is in relation to the area around you, is here to help.

The first Project Tango phone, manufactured by Lenovo, arrives this summer for under $500. According to Lenovo, which hasn’t finalized the product yet, the phone will be less than 6.5 inches and have three rear-facing cameras so that Tango will work properly.

By adding a few extra sensors and some computer vision software, Project Tango transforms your smartphone into a magic lens that lets you place digital information on your physical world,” Google said….

Read Full Article Source: PCMag

 

Microsoft Alerting Users Of Suspected Government Attacks

Microsoft Alerting Users Of Suspected Government Attacks

Microsoft Corp experts concluded several years ago that Chinese authorities had hacked into more than a thousand Hotmail email accounts, targeting international leaders of China’s Tibetan and Uighur minorities in particular – but it decided not to tell the victims, allowing the hackers to continue their campaign, according to former employees of the company.

On Wednesday, after a series of requests for comment from Reuters, Microsoft said it would change its policy and in future tell its email customers when it suspects there has been a government hacking attempt.

The company also confirmed for the first time that it had not called, emailed or otherwise told the Hotmail users that their electronic correspondence had been collected. The company declined to say what role the exposure of the Hotmail campaign played in its decision to make the policy shift…

Full Article Source: Reuters

CloudTweaks Comics
How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

Digital Marketing Hubs And The Cloud

Digital Marketing Hubs And The Cloud

Digital Market Hubs Gartner’s recently released research, Magic Quadrant for Digital Marketing Hubs, recognizes the big four marketing cloud vendors as leaders, but also points to many challengers. Adobe, Marketo, Oracle, and Salesforce inhabit the leader’s block of the Magic Quadrant, reflecting both their growing capabilities as well as marketing technology platform scopes. Gartner believes…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…