Cloud Infographic – Graphene And The Internet of Things

Cloud Infographic – Graphene And The Internet of Things

Cloud Infographic – Graphene And The Internet of Things – All Is Yet To Come! “I got very interested in people who had discovered something more significant than … intellectual, abstract understanding.”  – Steve Jobs As you may know, in 2013 the European Union’s Future and Emerging Technologies or FET announced its $2.3 billion grant. The…

Basing Your Hybrid Cloud Plans On A Robust Private Cloud

Basing Your Hybrid Cloud Plans On A Robust Private Cloud

A Robust Private Cloud For companies in the midst of planning or reviewing their cloud strategy, the inevitable triumvirate of public, private and hybrid cloud often dominates. Often times these three concepts are seen in isolation, with their relative merits (security, accessibility, maintenance etc.) assessed separately. But according to Mike Verdugo, Senior Director, Worldwide Product…

Modern Education In The World Of Cloud Computing And Internet Of Things

Modern Education In The World Of Cloud Computing And Internet Of Things

“Internet of Things will stump IT until clouds and big data come aboard.”  Stephen Lawson Increasingly, we are being inextricably linked to high technology tools and innovations. We are products of a culture where our personal and professional growth cannot be viewed apart from high tech advances. Therefore, it is critical to be able to…

Frost & Sullivan: Cloud Computing Set For Exponential Growth In South Africa And Kenya

Frost & Sullivan: Cloud Computing Set For Exponential Growth In South Africa And Kenya

Enterprises are increasingly opting for hybrid models to place non-core applications in the cloud CAPE TOWN, South Africa, Sept. 10, 2014 /PRNewswire/ — Rapidly expanding bandwidth capacities, following the landing of undersea cables, have led to the proliferation of data centres and established a solid platform for the development of cloud computing services in South Africa and Kenya. Enterprises…

Big Data’s Potential For Social Change

Big Data’s Potential For Social Change

Big Data’s Potential For Social Change A popular article on Huffington Post about homelessness stats sheds light on the fact that providing homeless people with a place of residence would save taxpayers money. It’s easy to understand why the article went viral so quickly. That is, data have proven it’s financially expedient to do what’s…

Smartphone Security And The Potential Pitfalls

Smartphone Security And The Potential Pitfalls

Smartphone Security And The Potential Pitfalls Smartphones, with advanced computing ability and connectivity, have dramatically changed the computing landscape. Smartphones run complete operating system software that provides a standardized interface and platform for a large number of applications in the marketplaces such as the Apple App Store, Android Market, and Amazon App Store. Android Market…

CloudTweaks Comics
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…