Guest Author


Latest from Guest Author

The Internet of Things needs a network of clouds

The confluence of social, mobile and cloud has created an “app-etite” for all things tech, laying the groundwork for the next big tech revolution: the Internet of Things (IoT). The IoT has the power to transform lowly mechanical and electronic devices into modern marvels, disrupting entire markets in the process. With disruption comes dollars. According ...

7 steps for moving apps from the data center to the cloud

It’s widely understood that cloud-based environments can bring significant benefits to enterprises including improved cost savings and business agility. In fact, 82 percent of US businesses reportedly saved money by moving workloads to the cloud last year. In its 2014 State of the Cloud report, RightScale reveals that enterprises are adopting cloud computing in record ...

Public clouds befuddled by SLAs? Nonsense!

Bert Latamore wrote recently on SiliconANGLE about Qubole’s Big Data as a Service (BDaaS) offering and echoed some points made by Jeff Kelly on Wikibon who wrote that “[t]he value proposition for Qubole is clear [and] the public cloud is indeed an attractive environment for data scientists and analysts looking to perform large-scale exploratory analytics”. ...

What do the Oculus Rift, self driving cars + the Cloud have in common?

Facebook surprised quite a few people when the tech giant purchased Oculus Rift for $2 billion. It wasn’t immediately clear to everyone why Facebook would make this acquisition. Valve, a popular SaaS gaming company, would have been the more logical choice to make such an acquisition. Gamers know and love Valve’s popular gaming platform and are anticipating their upcoming ...

Inevitably imperfect : Security through vulnerability management

The discovery of a flaw that allows would-be hackers to reuse old security tokens to to access Snapchat services and send bulk messages crippling user’s iPhones (AKA denial-of-service attacks) shows that security problems with Snapchat’s API run deeper than first thought. The flaw was discovered by security researcher Jaime Sanchez earlier this year and highlighted ...

How to communicate IT risk to the business

Managing risk is an essential component of any successful security program. But with the deluge of vulnerabilities discovered on a regular basis, it is a never-ending, uphill battle to mitigate all of the risk within an enterprise network or data center. Ironically, some organizations even shy away from scanning or patching critical data center applications and servers because ...

Invest more in metadata to make more of your data

Companies spend millions of dollars to get an edge from the data they own. However, all too often their efforts are out of balance. Data is hoarded without a clear purpose, and not nearly enough time is invested in capturing and analyzing the data about the data: the metadata. The fact of the matter is ...

Software development : Staying ahead of the game with continuous delivery

It’s hard to look at a tech blog these days without seeing something about “continuous” this and “continuous” that. Market pressures and consumer demand are prompting businesses to adopt Continuous Delivery (CD), a design practice used in software development to automate and improve the process of software delivery. Right now, adoption rates for CD are ...

Chasing unicorns : Analyzing talent at the fastest growing companies

In “Welcome To The Unicorn Club: Learning From Billion-Dollar Startups,” Aileen Lee suggested that only .07 percent of venture-backed consumer and enterprise software startups ever achieve billion-dollar valuations. That’s one in every 1,538 companies that have taken seed funding since 2003. The lesson is that while venture capital produces many singles and doubles, home runs are incredibly rare occurrences. ...

Diving into Big Data : Data lakes vs. data streams

Data lakes and data streams are becoming common analogies in the discussion around analytics and potential enterprise big data strategies. The analogies are appropriate from several aspects beyond just visualizing different approaches to accessing useful information. As in nature, both lakes and streams have their individual characteristics and are each important to the overall ecosystem. The question is not whether one ...