Facebook’s ‘Preventative Health’ tool has a flaw that’s impossible to ignore

By CloudBuzz | November 4, 2019

Facebook has created a tool that reminds users to get cancer screenings, routine checkups and flu vaccines. It also lets users keep track of doctor appointments within the Facebook app, and share their status with friends. Unveiled in October 2019,

VPN Technology

VPN in the World of Modern Technology

By Cloud Syndicate | October 30, 2019

VPN Technology In the modern world, more and more people think about online safety. Cybercrime is developing rapidly: malware attacks, suspicions that a global cyberwar is unfolding between states, Internet users, private data thefts, numerous hacker attacks, as well as

Cloud Flare

50 Years of The Internet. Work in Progress to a Better Internet

By CloudBuzz | October 29, 2019

It was fifty years ago when the very first network packet took flight from the Los Angeles campus at UCLA to the Stanford Research Institute (SRI) building in Palo Alto. Those two California sites had kicked-off the world of packet

Dana Gardner

How Unisys and Microsoft team up to ease complex cloud adoption for governments and enterprises

By Dana Gardner | October 29, 2019

Unisys and Microsoft team up The path to cloud computing adoption persistently appears complex and risky to both government and enterprise IT leaders, recent surveys show. This next BriefingsDirect managed cloud methodologies discussion explores how tackling complexity and security requirements

Cisco News

Data Gravity: Driving Design for Intelligent Mission Fabric

By Cisco | October 28, 2019

What is Data Gravity? The term ‘Data Gravity’ was generated by Dave McCrory in 2010. In his blog post he asserted that, analogous to gravitational pull between objects in space, “. . . as data builds mass there is a

Ronald van Loon

Build an Analytics Strategy for an AI Driven Future with the Hybrid Cloud

By Ronald van Loon | October 25, 2019

Build an Analytics Strategy As a long-time part of this industry, I have spent a good part of the last decade talking about the digital transformation. Call it the digital transformation or the data-led transformation, but this transformation has been

BBC Tech

Google claims ‘quantum supremacy’ for computer

By BBC Tech | October 23, 2019

Google says an advanced computer has achieved “quantum supremacy” for the first time, surpassing the performance of conventional devices. The technology giant’s Sycamore quantum processor was able to perform a specific task in 200 seconds that would take the world’s

Bill Schmarzo

Leverage AI to Create Autonomous Policies that Adapts without Human Intervention

By Bill Schmarzo | October 22, 2019

Leverage AI to Create Autonomous Policies Policies are the foundation for any successful organization.  Policies are the rules, or laws, of an organization.  Policies document the principles, best practices and compliance guidelines that aid decision-making in supporting the consistent and repeatable operations

IBM News

IBM Cloud Pak for Data 2.5: Bringing open source to the core

By IBM Big Data | October 22, 2019

It’s been an exciting time for IBM. We recently made the biggest software acquisition in history. Very rarely have I seen any big organization move so quickly and decisively to embrace open source and build a prescriptive methodology to modernize IT

Ajay Malik

Explainable Intelligence Part 2 – Illusion of the Free Will

By Ajay Malik | October 21, 2019

Illusion of the Free Will Explainable Artificial Intelligence (XAI) is getting a lot of attention these days, and like most people, you’re drawn to it because the very nature of neural networks – opacity induces the feeling of deprivation that arises


Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker (CASB) Cloud is the new address for businesses nowadays. The number of applications, hosted on the ...
John Pientka

China Ascendant? Maybe, Maybe Not

China seems to be beating us at leadership in tech in just about every category. In a decade they are ...
Caroline McCauley

The Security of Cloud-Based Software and Client Communication

Cloud-Based Software Security The fear of not having a secure cloud-based software should far outweigh the fear of switching to a ...
Top Security and IT Priorities To Pay Close Attention To

Top Security and IT Priorities To Pay Close Attention To

Top Security Priorities By 2019, cybercrime is expected to cost businesses over $2.1 trillion globally according to Juniper Research. Needless ...
How Blockchain Has Unexpectedly Improved Big Data Integrity

How Blockchain Has Unexpectedly Improved Big Data Integrity

Big Data Integrity Blockchain technology was developed to improve the integrity of bitcoin. However, as bitcoin became more popular, its ...