Contributors

Learning to Code is as Useful as Learning Ancient Greek

By John Pientka | November 29, 2017

Your children will be left behind if they don’t learn to code. Really? What if coding as we know it is already a dying language? What if most programs in the future will be coded by Artificial Intelligences? Where do

5 Predictions for Data in the Cloud and Cloud Platforms

By Daren Glenister | November 29, 2017

5 Predictions for Data in the Cloud 2017 has proven to be a big year for migrating data to the cloud and cloud platforms: from Google to Microsoft and IBM to Oracle, enterprise organizations have recognized the importance of migrating

Network security in the era of hybrid cloud

By Mark Casey | November 28, 2017

Hybrid Cloud Network Security Protecting networks and the data that traverses them might seem to be an impossible task these days. Whether it’s a nation-state-sponsored infiltration that seeks to tamper with industrial systems or a criminal organization planting ransomware for profit,

The AWS Cloud Goes Underground at re:Invent

By Cloud Syndicate | November 24, 2017

As you wander through the AWS re:Invent campus, take a minute to think about your expectations for all of the elements that need to come together… Starting with the location, my colleagues have chosen the best venues, designed the sessions, picked the

Why does the concept of airspace matter in the drone world?

By Scott Andersen | November 23, 2017

The Airspace Drone World Recently I was invited to continue a discussion started last year. The conversation was a roundtable of now High School Seniors. All of them participate in the technology program of a Maryland School District. The originally

This Amsterdam Bank Wants To Hack … Itself?

By Kayla Matthews | November 21, 2017

Bank Wants To Hack … Itself? With instances of professional hacking and data leaks making the news every year, it’s no secret that cybersecurity has become a major concern. How does a corporation ensure its cybersecurity remains impenetrable in a world

Data Catalog: Enabling Self-Service Analytics

By Cloud Syndicate | November 21, 2017

Enabling Self-Service Analytics A Chinese proverb says, “The best time to plant a tree was 20 years ago; the second-best time is now”.  Let’s assume you’re already up and running with a big data Hadoop platform for advanced analytics use-cases. 

Survey: 87% of Businesses Are Confident About Cybersecurity

By Daniel Matthews | November 20, 2017

Businesses Confident About Cybersecurity In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey reveals 87 percent of businesses are “confident in their cybersecurity preparedness.” The survey, from SolarWinds MSP, included 400 businesses from

AI In Telecom: Intelligent Operations is the New Norm

By Ronald van Loon | November 17, 2017

Intelligent Operations The move towards an intelligent world is faster and more rapid than it ever was before. The increase in this transition has been propagated through the role of several high key stakeholders that have redefined the way we

Endpoint Security

WordPress Security 101 – Endpoint Security And Disaster Preparedness

By CloudTweaks | November 17, 2017

Endpoint Security And Disaster Preparedness Continued from part 4 Setting up a secure password for your admin dashboard is a tactic that sets you on the right track to a robust WordPress security. But one smart tactic, or a combination

POPULAR

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
4 Open Source Business Intelligence Tools For Big Data Reporting

4 Open Source Business Intelligence Tools For Big Data Reporting

Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...