Welcome!


From the Blogosphere

With cybersecurity on the everyone's mind, 2017 will be see the emergence of True Fog Computing and Programmable / Intelligent Edge Devices with the strongest security measures to-date. As 2017 kicks into full gear and a particularly interesting 2016 fades into the rearview mirror, we ...
This week's news brings us further reminders that if you're betting on cloud, you're headed in the right direction. The cloud is growing seven times faster than the rest of IT, according to IDC, with a 25% spending increase just from 2016 to 2017. SaaS still leads the pack, with an est...
The insurance industry is well aware that digital transformation is coming, even if some CIOs can’t really say what their individual companies will look like at the end of it all. In a survey of thousands of C-level execs around the world, insurance came in among the top five industrie...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and ...
Last week I mentioned to one of my U.S.-based colleagues that I would be out of office for three days at the Irish National Digital Week (NDW16), taking the opportunity because the event was being held in Skibbereen, just a few kilometres down the road from my home office. He asked, "S...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and a...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then...
JavaScript redefined web applications ushering in a new era of dynamic websites with fluid responsive designs. It has gained a strong following among developers, popular libraries and frameworks like JQuery and Angular JS are all built with JavaScript. The endless design possibilities ...
Has there ever been a better time to be in DevOps? TV shows like “Person of Interest” and “Mr. Robot” are getting better at showing what developers actually do, using chunks of working code. Movies like Michael Mann’s “Blackhat” (2015) won praise from Google’s security team for its Dev...
Fingerspitzengefühl is a German word used to describe an ability to maintain attention to detail in an ever-changing operational and tactical environment by maintaining real-time situational awareness. The term is synonymous with the English expression of "keeping one's finger on the p...
SaaS use is growing in enterprises all the time, with the ease of consumer apps meeting the full-featured nature of typical business software. Google added new tools earlier this week to G Suite that are designed for enterprise IT. The announced features include additions to security a...
Service desk managers and CIOs are key decision makers who need insight from their data to formulate better strategies. For instance, by tracking including technician performance, service desk responsiveness, IT user preferences, customer satisfaction, SLA violation rate, and other cri...
Okay, I am weird (tell me something that I don’t know, say most of my friends). For Christmas I wanted a Nike Apple Watch to go with my existing FitBit and Garmin fitness trackers (I look sort of like a cyborg in the photo below…which is always cool).
Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms...
The evolution of JavaScript and HTML 5 to support a genuine component based framework (Web Components) with the necessary tools to deliver something close to a native experience including genuine realtime networking (UDP using WebRTC). HTML5 is evolving to offer built in templating sup...
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of ...
Known on the global stage for its indisputable domination in IT, India is at the cusp of a digital revolution, finally on home ground. With its strong push for a digital economy, the Union Budget for 2017, presented by the Finance Minister recently, has only validated this claim. As a ...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that tra...
2016 has been an amazing year for Docker and the container industry. We had 3 major releases of Docker engine this year , and tremendous increase in usage. The community has been following along and contributing amazing Docker resources to help you learn and get hands-on experience. He...
As good Venn diagrams always show it's the intersection areas that offer the sweet spot for trends and markets, and an especially potent one is the intersection of Cloud computing, with the blockchain and also digital identity, particularly when considered within contexts such as Digit...
One minute of utilized operating room (OR) time can be worth more than $70 in revenue and one minute of staffed OR time can cost $50 or more, making underutilized OR time a huge problem. Each year, roughly 51 million surgeries are performed in the 5,000+ hospitals and 5,000+ surgery ce...
I work from Boston 4 days a week and we're in the middle of a blizzard. (Note: I commute to Boston. I live 4 days a week at Unitrends' Boston/Burlington offices and 3 days a week at Unitrends' Columbia South Carolina offices. So it's fair to note that given my South Carolina roots t...
I recently read an MIT Sloan Management Review article by Clayton Christensen’s recent book titled “The Hard Truth About Business Model Innovations.” While the article is full of great observations about business model transformation, the most important motivation for business model tr...
My son Max is home from college and that always leads to some interesting conversations. Max is in graduate school at Iowa State University where he is studying kinesiology and strength training. As part of his research project, he is applying physics to athletic training in order to...
Whenever you connect anything to the internet, there is risk involved. Just ask the millions of IoT zombies infected with Mirai. Sure, there have been various stories over the years about hacking thermostats, refrigerators, cameras, pacemakers, insulin pumps and other medical devices a...
We asked 50 futurists, professionals employed to review trends and develop strategy, to identify and rank the top five ways they believe digital transformation will drive value generation between now and 2020. These top five value generators offer significant business advantages; but...
With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse. Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our su...
Companies are migrating infrastructure to the cloud in order to achieve advantages and agility that they need to remain competitive. However, they may have difficulty achieving one extremely important benefit of cloud computing as they attempt to run their MySQL databases in the cloud ...
Presidents are powerful people facing and dealing with complex nation, market and economy sized problems. Making good decisions and managing these deeply complex systems and organizations requires massive amounts of data, analysis, experience and understanding. They must process and an...
Partnering with the business is no longer good enough. In fact, it’s a dot-com era holdover, from when organizations first came to realize that the Internet and the Web in particular were strategic assets. Digital transformation represents the next generation of change. Partnering with...
Thanks to the Internet of Things (IoT), our world is more automated and connected than ever before. Just about everything, from cars to refrigerators, to coffee machines, has the ability to connect to the Internet, allowing us to micromanage each individual device. This type of automat...
Synthetic monitoring is hardly a new technology. It’s been around almost as long as the commercial World Wide Web has. But the importance of monitoring the performance and availability of a web application by simulating users’ interactions with that application, from around the globe, ...
Specifically, in 2017 we predict that machine learning will show up in new and exciting ways. Some people believe that machine learning is the same as artificial intelligence, but what you are really looking at is this concept of being able to be more human with your IT infrastructure....
Imagine how difficult it would be to use the Internet if you had to remember dozens of number combinations to do anything. The Domain Name System (DNS) was created in 1983 to enable humans to easily identify all the computers, services, and resources connected to the Internet by name—i...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., and Logan Best, Infrastructure & Network Engineer at Webair, focused on real world deployments of DDoS mitigation strategies in every layer of the network. He gave an overview o...
Cyberthreats have become more sophisticated over the years, improving methods to take advantage of software information and even completely shut down systems to hold data ransom. As a result, developers and testers must be able to ensure that their programs have the necessary protectio...
It wasn't too long ago that cloud computing had more detractors than supporters. Companies (especially in the enterprise world) just weren't ready to relinquish control of applications and business processes. And yet, the light of cloud benefits has slowly drawn the business world in ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used t...
Application downtime is an enterprise's worst nightmare. On top of that, it's fairly common. According to a survey conducted by Dun & Bradstreet, 59 percent of Fortune 500 companies experience a minimum of 1.6 hours of downtime per week. Each time a business application fails, the IT a...
In 2016, cloud computing started to dominate many IT market segments. As a business, Synergy Research Group reported that industry revenue for the four quarters ended Sept. 30 grew 25%. Operator and vendor revenue for six segments of cloud computing reached $148 billion during that per...