Wired

Hackers Could Decrypt Your GSM Phone Calls

MOST MOBILE CALLS around the world are made over the Global System for Mobile Communications standard; in the US, GSM underpins any call made over AT&T or T-Mobile's network. But at the DefCon security conference in Las Vegas on Saturday, researchers from the BlackBerry are presenting
/
Cisco News

Managing your SAP Digital Transformation Journey

Digital Transformation. We’ve heard the words, but have you wondered what it is all about? Digital Transformation is a strategic directive to redefine your business practices and processes to gain competitive advantage. It is all about making the inevitable tide of change work for you,
/

Infographic – Internet of Things (IoT) Will Be Top Technology Investment

Internet of Things Investment

Investors are jumping all over the opportunities abound when it comes to the Internet of Things and Big Data. There is simply way too much money at stake to ignore the potential that is going to truly define how we live and do business in the future.

IDC predicts: “A transformation is underway that will see the worldwide market for IoT solutions grow from $1.9 trillion in 2013 to $7.1 trillion in 2020. IDC defines the Internet of Things as a network of networks of uniquely identifiable endpoints (or “things”) that communicate without human interaction using IP connectivity – be it “locally” or globally.”

As markets for wearables, smart TVs, connected cars and the smart home begin to mature, the venture capitalists are sensing the time for them to take the plunge is ripening. “The connected car and home are as big an opportunity as the connected phone,” said Venky Ganesan, a managing director at Menlo Ventures.

Included is an infographic by IDG which explores IOT adoption.

Internet of Things Investment

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services.

Contact us for a list of our leading brand and thought leadership exposure programs.

IBM News

Six Major Data Breach Trends

Major Data Breach Trends It seems like the moment the security industry collectively comes to grips with the latest publicly disclosed data breach, another bigger ...
Cloud Security Tools

10 Useful Cloud Security Tools For Your Business

Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense ...
Jon Roskill

Going Global With The Cloud: SME’s, Anywhere, Anytime Access

SME's Anytime Access Lots of companies have offered 24/7 availability of systems and data to their customers and employees for years. What else is new? ...
How Can We Use Artificial Intelligence When We Can't Handle Real Intelligence?

How Can We Use Artificial Intelligence When We Can’t Handle Real Intelligence?

Artificial Versus Real Intelligence In this article we will be discussing the pitfalls of societal disillusionment with facts, and how this trend may become troubling ...
Breached Data

New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report

/
It has been coming for some time, but now the major breach of a biometric database has actually been reported—facial recognition records, fingerprints, log data and personal information has all ...
Cisco News

Managing your SAP Digital Transformation Journey

/
Digital Transformation. We’ve heard the words, but have you wondered what it is all about? Digital Transformation is a strategic directive to redefine your business practices and processes to gain ...
MIT tech review

MIT – Facebook paid people to listen to voice recordings, too

/
It’s the fifth big tech company forced to admit to the practice this year. The news: Facebook paid contractors to listen to, and transcribe, audio clips generated by people using its ...