Brand Identity Is Now The Crux Of Technology And Business

Brand Identity Is Now The Crux Of Technology And Business

Identity, Technology and Business When Tim Cook and Apple pushed back against the FBI’s iPhone hack request, the resulting conflict hit on where we are, and where we’re going, with technology and business. It’s not just about useful tools people can use for convenience and entertainment anymore. It’s about identity. Apple pushed back because the…

Did You Know That There Is A Real SHIELD?

Did You Know That There Is A Real SHIELD?

The Real Shield You cannot make this up. The ODNI (Office of the Director of National Intelligence), an Act of Congress and a European Commission special “working group” known as Article 29 are all involved. Blame it on Edward Snowden. The Europeans are “concerned” (meaning: terrified) about the privacy protections surrounding any of their data…

Netflix And Net Neutrality

Netflix And Net Neutrality

How Netflix went against net neutrality For years, Netflix has been claiming that its videos have been deliberately slowed down by carriers so that they could protect their own TV services. But, guess what? It all turns out, things were the other way around. Netflix has finally admitted that for the past five years the…

This Week In Tech: Streaming TV Wars, Tesla and EMCWorld

This Week In Tech: Streaming TV Wars, Tesla and EMCWorld

EMCWorld takes over Las Vegas The world of streaming content got a lot more interesting this week, following the revelation that Google has been plotting a web TV service since 2012, and now is scheduled to launch it in 2017. According to Bloomberg Technology, “YouTube is working on a paid subscription service called Unplugged that…

The 2016 Open Source Jobs Report: Companies Hungry For Professional Open Source Talent

The 2016 Open Source Jobs Report: Companies Hungry For Professional Open Source Talent

The 2016 Open Source Jobs Report Fifth Annual Report Expands Scope Beyond Linux to Examine What Motivates Open Source Professionals and How Companies Are Attracting and Retaining This in Demand Talent NEW YORK, NY and SAN FRANCISCO, CA–(Marketwired – May 05, 2016) –  Recruiting open source talent is a top priority for hiring managers focused…

Samsung Making Strides In IoT Innovation

Samsung Making Strides In IoT Innovation

Samsung IoT Innovation Samsung’s recent Developer Conference highlighted a few key concepts the organization plans to cultivate going forward, not least of all plans to simply produce more of everything. But the conference’s logo, “connecting the future everywhere you look”, is perhaps eloquently expressive of some strong initiatives Samsung is making in the Internet of…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…