Kiril Kirilov

The Importance of Open Source Security

By Kiril Kirilov | March 20, 2018

Open Source Vulnerabilities Open source software is rapidly gaining popularity with 93 percent of organizations using open source software and 78 percent performing all or part of their business operations on open source platforms, according to the Tenth Annual Future

What are Smart Contracts?

The State of Smart Contracts: Many Challenges Ahead

By Kiril Kirilov | February 28, 2018

The State of Smart Contracts With blockchain technology expanding into a growing number of industries and its applications broadening by the day, organizations and individuals are to witness self-executing smart contracts in literary any field of business. Decentralized apps, or

blockchain credit security

Blockchain Companies Seek and Find Funding Outside the U.S.

By Kiril Kirilov | November 27, 2017

Blockchain Companies Seek Funding Outside the U.S. Blockchain companies are actively seeking funding deals outside of traditional tech hubs such as Silicon Valley, according to a report by CB Insights and other analysts. Bitcoin is generating a lot of buzz

AI

Autonomous Vehicle Startups Attract 76% of All Auto Tech Investment

By Kiril Kirilov | November 22, 2017

Autonomous Vehicle Startups Automotive tech startups are attracting close to $4 billion worth of investment since the start of 2017, according to a report by CB Insights. However, two-thirds of the amount, or 76 percent, are going into the pockets

Fake Digital Currency

How to Spot Fake Digital Currency

By Kiril Kirilov | November 20, 2017

Fake Digital Currency With the Bitcoin currency skyrocketing to levels above $8,000 per bitcoin and initial coin offerings emerging on a daily basis, a growing number of individuals and institutional investor look at cryptocurrencies as an alternative to more traditional

Record Number of VC Funds Target AI

How AI Changes Investment Decisions We Make

By Kiril Kirilov | November 9, 2017

AI Investment Decisions Artificial intelligence and machine learning are changing the way investors make decisions both at corporate and individual level. Institutional investors are using computing machines to make smarter investment decisions for years. Proliferation of predictive analytics, machine learning,

Can Waymo Retain Their Lead in Self-Driving Tech

By Kiril Kirilov | November 6, 2017

Waymo Self-Driving Tech Media people expected to see a working self-driving technology by Waymo this month but Alphabet’s daughter company is reluctant to elaborate when a commercial service will be available across the United States. Waymo CEO John Krafcik told

2017 Sets a New Record for Travel Tech Exits

By Kiril Kirilov | October 30, 2017

Travel Tech The number of travel tech exits backed by venture capital grew from 11 in 2013 to 20 in the first three quarters of 2017, according to a report by CB Insights. It is fair to say that further

DevOps tools

Cloud Security Solutions Still Puzzle Businesses

By Kiril Kirilov | October 24, 2017

Cloud Security Solutions Roughly one third of enterprises in North America experience troubles maintaining their cloud security due to the fast progress in cloud technologies and the complex nature of the cloud, a report by Threat Stack and the Enterprise

Should Businesses Fear the Power of Amazon and Google?

By Kiril Kirilov | October 19, 2017

Amazon and Google Amazon is replacing Google as the most cited company, according to the number of mentions in publicly available corporate conference calls. The news passed largely unnoticed although this is quite a news bearing in mind that both

THOUGHT LEADERSHIP ARCHIVE

Don’t Forget Networking In Your Travel Plans To The Cloud

By Mike Johnson

Don’t Forget Networking The term “cloud” was first used by the telecomm industry in early schematics of the Internet to identify the various, non-specific uses data was put to at the end of their cables. The transmission of data was

Marc Malizia

Virtualization + Cloud Equals Perfect Storm For Recovery Services

By Marc Malizia

Data Recovery Services Not very long ago disaster recovery was a luxury afforded by only the very large companies due to the prohibitive cost and effort required. Frequently even these large companies were unable to justify the investment and went without

How artificial intelligence and analytics helps in crime prevention

By CloudTweaks

How Artificial Intelligence Helps Crime Prevention According to a study released by FBI, there is an annual increase of 4.1% in violent crimes and 7.4% in motor-vehicle thefts in the United States in 2016. Despite having stringent laws and intense

Do Not Rely On Passwords To Protect Your Online Information

By John Barco

Do Not Rely On Passwords Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

By Kris Lahiri

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS

Online File Sharing And The Importance Of Security

By Charles Mount

Online File Sharing Security Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at

Outsourcing Agile Cloud Development: A New Frontier

By CloudTweaks

Outsourcing Agile Cloud Development The rise in cloud popularity has brought a corresponding increase in the number of companies outsourcing their cloud software development. Yet things can get a bit complicated when a business sets out to find a compatible

Preventing Disastrous Events Through The Power of Anomaly Detection In Machine Data

By CloudTweaks

Preventing Disastrous Events Through the Power of Anomaly Detection in Machine Data In August, a single server failed and the NASDAQ went down for three hours. In January, GlobalPayments reported that a hack compromising millions of credit card accounts cost

Cloud Gaming Is Ready: The Games Industry Isn’t

By CloudTweaks

Cloud Gaming The current perception of cloud streaming technology in the Games Industry, particularly in the Massively Multiplayer Online (MMO) marketplace, is to put it mildly ‘mixed’. Recent comments at Gamescom 2013 have only cemented for some that while Cloud Gaming

Mitigating the Downtime Risks of Virtualization

By Paul Mercina

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean angry communications from employees and the C-suite and often a Twitterstorm of customer ire. See the recent Samsung SmartThings dustup

How to Improve the Backup Success Rate of Data Centers?

How to Improve the Backup Success Rate of Data Centers?

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing ...
What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality? Net neutrality is a concept that has been the centre of a lot of debates recently, ...
How to secure personally identifiable information (PII) of customers

How to secure personally identifiable information (PII) of customers

Secure Personally Identifiable Information Information security has been a constant challenge for enterprises. Especially in a software test environment, enterprises face ...
Adopting An Industry-Wide Red Line Movement

Adopting An Industry-Wide Red Line Movement

Red Line Movement Recently, I’ve been calling for an industry-wide adoption of the red line philosophy to help with the ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...