Steve Prentice

Hybridization: A Mindset Approach

By Steve Prentice | February 3, 2016

The Social Data Cloud One of the most amazing attributes of the cloud and its related technologies is its sheer openness. New companies and ventures spring up daily, fueled, in some cases, by one single good idea. They launch first

Hybridization: The Executive Roundtable

By Steve Prentice | January 27, 2016

Hybridization When discussing migration to the cloud, the use of hybrid cloud and all other cloud-related issues, people generally place the focus on the technology itself. What sometimes gets overlooked is the group of individuals who are — or at

The Soft-Edged Cloud: A Security Challenge

By Steve Prentice | January 13, 2016

The Cloud Security Challenge The use of the term “cloud” to describe global, offsite, computing and storage technology is apt for a number of reasons; not all of them good. The metaphor succeeds largely when people visualize their data hovering

conferencing cybersecurity

Video Meetings And The Face To Face Conundrum

By Steve Prentice | December 17, 2015

The Face To Face Conundrum Meetings have been a scourge on business productivity for many decades. British comedy genius John Cleese released a corporate training film back in 1976, entitled Meetings, Bloody Meetings, which not only became an instant classic,

Competing Cloud Security Demands Call For Credentialed Professionals

By Steve Prentice | December 11, 2015

Cloud Security Demands Call For Credentialed Professionals It is not possible to stare with absolute clarity into the future. None of us has a crystal ball. But there is certainty in knowing that the path to progress on which our

The Surge Pricing Model And Free Market Economics

By Steve Prentice | December 8, 2015

From Surge Pricing To Surge Payments In a very short period of time, Uber has emerged as a world-changing business philosophy that goes well beyond cars. It represents a new approach to crowdsource-based, on-demand service. It is changing the way

Top 10 Machine Learning Algorithms

The Blended Mindset – Converging Through The Screen

By Steve Prentice | December 7, 2015

The Blended Mindset It has been a long time since a phone was just a phone. In fact, people start to show their age when they refer to their device as a “cellphone.” It is far more than that. The

The True Dangers Of Allowing Social Media In The Workplace

By Steve Prentice | November 24, 2015

Social Media In The Workplace Would you let your employees use social media on company time? The response to this question is usually an emphatic no. The reasons given make sense, at least on the surface: “People are here to

ISC 2 - CCSP

What I Have Learned: Cloud Security Insights From CCSP Pros

By Steve Prentice | November 23, 2015

Cloud Security Insights From CCSP Pros The age of cloud security gives rise to the somewhat mixed metaphor of a cat and mouse game played out on shifting sands. Cloud security professionals face a multidimensional conundrum as they try to

Cyber Security: An Ounce of Prevention

By Steve Prentice | November 19, 2015

Cyber Security Awareness A new breed of technologies now exists that takes snooping to a completely new level. Launched from ads broadcast on TV, or appearing inside or alongside a web page on your computer, they send out an inaudible

THOUGHT LEADERSHIP ARCHIVE

Problem In Customer Support – What Mobile App Developers Can Learn From AmEx

By Barry Coleman

Mobile App Developers Peanut butter and jelly, salt and pepper, marketing and… customer support? We don’t tend to consider customer support as a complement to marketing, but when an organization experiences success in retaining customers and securing customer loyalty, it’s

John Barnes

Technology Predictions of the Future

By John Barnes

Cloud Computing Predictions In 2010, we have seen a transformation of skeptics from their belief that cloud computing is suited mainly for small to mid-sized business, to a general acceptance that “the cloud” is everywhere. However, we have also seen

Backups And Disaster Recovery Are Not The Same Thing

By Ed Dryer

Backups And Disaster Recovery Most business owners are aware of the consequences of losing data. Much of the value of a modern business is in its data: customer records, analytics, marketing data, product catalogs, bookkeeping and accounting data, emails and

Your Office 365 Data Security – Is It Properly Protected?

By Jeff Erramouspe

Office 365 Data Security As more and more people collaborate and access data from outside the office and across multiple devices, the potential for SaaS data loss increases dramatically, and the damage can be catastrophic. A staggering 60 percent of

Cloud Access Management: Access Everywhere

By Dean Wiech

Cloud Access Management As the utilization of cloud applications has become a standard of using in nearly every industry, there needs to be solutions available to help manage these applications. One way for admins to effectively manage their organization’s applications

IT Transformation Journey

Self Discovery and the IT Transformation Journey

By Kevin Gruneisen

IT Transformation Journey At its most basic level, travelling along the IT transformation journey from conventional data centers to the dynamic, intelligent environments of cloud computing is an adventure in self discovery that has a way of changing you as

Preventing Disastrous Events Through The Power of Anomaly Detection In Machine Data

By CloudTweaks

Preventing Disastrous Events Through the Power of Anomaly Detection in Machine Data In August, a single server failed and the NASDAQ went down for three hours. In January, GlobalPayments reported that a hack compromising millions of credit card accounts cost

How Can Cloud Ensure Smooth Business Process Management?

By Art Landro

Smooth Business Process Management Businesses rely on the implementation of processes. Cloud-based software provides a way for easy management and alleviates issues companies face trying to improve these processes, particularly when it comes to prototyping and modeling. A question many

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

By CloudTweaks

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ in the human body. While the first, second, and third screens have historically exercised the potential of this organ to

Making Business Resiliency Part Of Business As Usual

By CloudTweaks

Business Resiliency Business continuity and disaster recovery (BCDR) have become non-negotiable requirements for virtually every IT department. Business resiliency is an umbrella concept that must address everything from basic business continuity to high-level risk management, security, crisis management, and more.

Infosec thought leaders

Why you should add a connection broker to your suite of DevOps tools

DevOps Connection Broker When staring down the DevOps path, you have no lack of tools to help you pave the ...
How Artificial Intelligence Is Revolutionizing Business

How Artificial Intelligence Is Revolutionizing Business

Artificial Intelligence Revolution 84% of respondents say AI will enable them to obtain or sustain a competitive advantage. 83% believe ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality? Net neutrality is a concept that has been the centre of a lot of debates recently, ...
Mark Carrizosa

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Record Breaches Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT ...
Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial ...