Fri.Aug 18, 2017

Cloud computing reversal: From ‘go away’ to ‘I can’t miss out’

David Linthicum

Isaac Asimov once said, “I do not fear computers. I fear the lack of them.” That quote has stuck with me to this day. There’s no doubt that computers and computing have changed our lives. Without them, we would be slaves to processes and paper. I was reminded of Asimov’s quote when I saw the results of a recent poll done by Comvault of 100 IT leaders. More than two thirds said that they were worried about keeping up to date with the latest products and iterations across the major cloud providers.

Leveraging Social Media to Expand Business Data Globally


Social media has become an integral part of society, and having a presence on these platforms is a must for businesses in the present world. Barely a decade ago, only a small proportion of the globe were exposed to social media. A few years later, the list of social media networks has continued to grow […]. CTO Cyber Threats News

Media 135

Maersk Says June Cyberattack Will Cost It up to $300M

Data Center Knowledge

Its IT systems were disabled, preventing the shipping line from taking new orders for several days. Read More. Business Security

System 169

Box uses Google’s AI to support image recognition in the enterprise

Computer Weekly

Optical character recognition and automated generation of image metadata is now possible, thanks to Google Cloud AI

Cloud 154

More Trending

Researchers find potentially lethal car hack with no quick fix

Computer Weekly

Security researchers have discovered a supplier-neutral and stealthy smart car hack that can drastically affect the performance and function of the vehicle

8 Ways Your Devices Can Be Hacked

IT Toolbox

The IoT is here to stay, which means our devices are able to communicate better, improving lifestyle management, but also giving hackers easier access to every detail of our lives and information.


Contactless payments through mobile phones no longer a novelty

Computer Weekly

The amount of contactless payments made through mobile devices increased by 336% compared with 2016, according to figures from Worldpay

Mobile 149

SQL Challenge 19: Larger Test Data

IT Toolbox

Fortunately, I've done this before

Data 135

In Moving Production Workloads to Cloud, VMware Professionals Prefer AWS, Azure

Data Center Knowledge

Report finds most VMware professionals plan to have moved workloads to cloud by 2018 Read More. Cloud VMware

Vmware 121

5 Ways Small and Midsized Manufacturing Is Using IoT Data

IT Toolbox

The Internet of Things (IoT) is by all definitions a big concept. Different people have different opinions about the specifics, but the big picture of sending lots of data about lots of different factors from a wide array of devices and sources is consistent. Most companies look to the IoT to tell them what internal operations look like. Food storage coolers are more easily monitored

Benelux organisations must ensure IT staff are content or else risk exodus

Computer Weekly

Organisations in the Benelux region could face IT staff leaving in large numbers if they don't remain attractive to employees


7 Tips to Protect Your Business From Cyber-attack

IT Toolbox

This post looks at ways to protect your business from attacks


IDG Contributor Network: Can the U.S. Senate secure the Internet of Things?

Network World

As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the Internet of Things (IoT) and the open web that enables it. It appears those voices have been heard, as the U.S. Senate may be taking steps to secure the IoT's future. So, what exactly is the U.S. Senate up to, and how might its actions impact the health of the IoT?

.Net 72

Understanding Big Data Architecture - Part 1

IT Toolbox

Part 1: Basic Big Data

Three Big “Hows” to Improve Digital IT Maturity

Future of CIO

IT leaders must grasp both the strategic “HOW” about IT potential, priority, and differentiated business advantage; and the tactical “HOW” about the IT management methodology and the next IT practices. IT continues to grow in importance to organizations, both operationally and strategically.

Ranking the Most Technologically Advanced Cities in the World

IT Toolbox

Technology is a booming industry and in the recent decades we have seen many cities emerge as giants in this area. With futuristic infrastructure and widespread advancements in public transportation and digital accessibility, it's incredible to watch the

The New Book “Digital Boardroom: 100 Q&As” Quote Collection I

Future of CIO

The board composition should be synchronized with the digital perspective of the business. The purpose of the book “Digital Boardroom: 100 Q&As “is to share 100 insightful questions for rejuvenating the boardroom to get digital ready.

4 Ways to Deal with Rising Enterprise Resource Planning Security Risks

IT Toolbox

As companies and organizations grow and technology integrates all aspects of business processes, enterprise resource planning (ERP) systems continue to expand in an attempt to keep pace. One thing that hasn’t changed is the need for superior security to protect sensitive information and financial investments. Traditional security measures such as firewalls and encryption are still

If you're really concerned about browser security, Incognito isn't enough

Tech Republic Security

If you assume your browsing is private and secure, think again. Jack Wallen offers up what he believes is your best bet to safeguard your browsing sessions and data

Data 70

Critical software licensing pitfalls to avoid when moving to the cloud

Tech Republic Data Center

When starting on your cloud migration journey, pricing competition and license portability should be paid close attention to

CIO Jury: 75% of companies have moved to hybrid cloud

Tech Republic Cloud

Companies are increasingly turning to hybrid cloud models to combine the stability of the private cloud with the on-demand capabilities of the public cloud. Here's why

Video: Hacker claims to have decrypted Apple's Secure Enclave, destroying key piece of iOS mobile security

Tech Republic Security

The hack exposes firmware code, and could be a major blow to iOS security, a key component of Apple's hardware strategy

Guide to implementation of Client suitability and appropriateness framework for MiFID II


The genesis of the Client suitability and appropriateness framework lies in Markets in Financial Instruments Directive (MiFID II) regulation. MiFID II is scheduled to be implemented in January 2018.

Microsoft cloud cybersecurity attacks up 300% in last year, report says

Tech Republic Security

In volume 22 of Microsoft's Security Intelligence Report, the Redmond giant outlined some of the biggest cyberthreats facing its users

50% of companies still in process of implementing DevOps, report says

Tech Republic Data Center

Asaf Yigal, co-founder of big data firm, discusses the top DevOps trends for 2017

Serious about online privacy? Try these 2 browsers

Tech Republic Security

Browsing in private or incognito mode isn't enough to keep all your data safe. For better security, try the Tor and Epic browsers

Chelsio Storage over IP and other Networks Enable Data Infrastructures

Storage IO Blog

Data Infrastructures exist to protect, preserve, secure and serve information along with the applications and data they depend on. With more data being created at a faster rate, along with the size of data becoming larger, increased application functionality to transform data into information means more demands on data infrastructures and their underlying resources. The post Chelsio Storage over IP and other Networks Enable Data Infrastructures appeared first on StorageIOblog.

New Faketoken Android malware records calls, intercepts texts, and steals credit card info

Tech Republic Security

A new version of Faketoken was identified by Kaspersky and poses a huge threat to anyone who stores bank card information for in-app purchases