Big Data For Better Data

Big Data For Better Data

“Data are becoming the new raw material of business.” – Craig Mundie Today, having more and more data at our disposal, we are granted the opportunity to see new things in the surrounding world. More data enables us not only to see more of the same thing we have been looking at, but, most importantly,…

Stopping Multi-Platform Cloud Problems Before They Start

Stopping Multi-Platform Cloud Problems Before They Start

Multi-Platform Cloud The hybrid cloud continues to gain traction as a viable option for companies looking to realize the economic benefits of cloud while still retaining a level of security and comfort that comes from their existing infrastructure for mission critical applications. But creating and maintaining separate platforms comes with its own set of problems…

Information Security Breach – When does Yours Take Place?

Information Security Breach – When does Yours Take Place?

It seems that security breaches are becoming a daily occurrence. At least in how frequently they are being reported.  In the last few days we heard more regarding Home Depot, and just yesterday there was a story regarding eBay. I wonder who else will be in the press later this week.  As I went to…

BlackBerry Unveils Passport Smartphone

BlackBerry unveiled the Passport, a larger square-screen device the company is counting on to revive its fortunes against Apple and Samsung that now dominate the smartphone market. Read the source article at online.wsj.com

Adobe Refreshes Elements Lineup With New Editing Tools

Adobe Refreshes Elements Lineup With New Editing Tools

For creatives who want the editing power of Adobe Photoshop or Premiere but don’t want to pay for a Creative Cloud subscription, the company’s Elements line offers many of the features of its two flagships, but without the obligation of a subscription. Both Elements applications were updated Wednesday with new effects and editing tools and for…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…