HP

The Lurking Threat Called Passivity

By Steve Prentice | February 22, 2016

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around

Security: The Goodwill Virus That Keeps On Giving

By Steve Prentice | February 11, 2016

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced.

Hybridization: A Mindset Approach

By Steve Prentice | February 3, 2016

The Social Data Cloud One of the most amazing attributes of the cloud and its related technologies is its sheer openness. New companies and ventures spring up daily, fueled, in some cases, by one single good idea. They launch first

Hybridization: The Executive Roundtable

By Steve Prentice | January 27, 2016

Hybridization When discussing migration to the cloud, the use of hybrid cloud and all other cloud-related issues, people generally place the focus on the technology itself. What sometimes gets overlooked is the group of individuals who are — or at

conferencing cybersecurity

Video Meetings And The Face To Face Conundrum

By Steve Prentice | December 17, 2015

The Face To Face Conundrum Meetings have been a scourge on business productivity for many decades. British comedy genius John Cleese released a corporate training film back in 1976, entitled Meetings, Bloody Meetings, which not only became an instant classic,

The Blended Mindset – Converging Through The Screen

By Steve Prentice | December 7, 2015

The Blended Mindset It has been a long time since a phone was just a phone. In fact, people start to show their age when they refer to their device as a “cellphone.” It is far more than that. The

Furthering Business By Seeing Beyond

By Steve Prentice | October 22, 2015

Furthering Your Business Here is a typical customer service story that illustrates the gap between the power of modern commerce and the struggling mindset of business. John is a retail customer, who, like many people, enjoys shopping at specific stores.

POPULAR

V2V? Platoons? Your First Taste of Robocar is a Truck

V2V? Platoons? Your First Taste of Robocar is a Truck

Robo Trucking You are driving down the interstate. Ahead is an 18-wheeler struggling up the grade. You swing out to ...
Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has ...
Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were ...
Cyber Warfare

Politics 2.0: The Age of Cyber Political Warfare

Cyber Political Warfare Do you remember the last time hackers and cybercriminals determined the outcome of a presidential race? Of ...
PODCAST - EPISODE 2: Trains, Security and AI

PODCAST – EPISODE 2: Trains, Security and AI

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using ...
Technology and the Future of Cognitive Computing

Technology and the Future of Cognitive Computing

Cognitive Computing Recently popularized by IBM's highly intelligent Watson supercomputer, which competed on the hit game show Jeopardy, cognitive computing ...
Lessons for Corporate Board Members from the Colin Powell E-mail Hack

Lessons for Corporate Board Members from the Colin Powell E-mail Hack

Corporate Board Member Security It’s every company’s worst nightmare: waking up to find your confidential company information plastered across The ...
IoT developers

For Uber and Waymo’s Initiatives to Thrive, IoT Needs 4.5 Million Developers by 2020

IoT Developers Imagine it’s December, 2016, and you’re Uber boss Travis Kalanick. One of your self-driving Volvos in SF just ...
GDPR – A Change in the Making

GDPR – A Change in the Making

Organizations all over the EU must be aware by now that the Data Protection Act (DPA) will be changed into ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...