Cloud For Business From a Stealth Startup

Harry Trott

Subscribe to Harry Trott: eMailAlertsEmail Alerts
Get Harry Trott: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Harry Trott

Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. The cloud brings unique advantages to individual and business users alike and this explains the exponential adoption rate that cloud has seen in the past decade. There are also numerous security challenges with the cloud especially in the areas of privacy and data theft that has concerned stakeholders for a long time. However, with sophisticated encryption technologies, the instances of cloud data getting stolen is only going to get fewer in future. But there is another aspect to cloud that has not been discussed as vocally as the security issues have been – crime. Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a... (more)

Challenges with Big Data for the IoT | @ThingsExpo #BigData #IoT #IIoT #M2M

The biggest challenge to IOT is thus big data that requires an infrastructure that is capable of processing billions or more data points each second. If you thought e-commerce revolutionized the retail industry over the past two decades, something much bigger is coming over the next ten years and that is the Internet of Things (IoT). By deploying sensors and network connectivity to everyday physical objects like cars, refrigerators, television and buildings, it is possible to remotely connect, manage and engage with these entities in ways that are not possible today. Proponents o... (more)

Fixing the Privacy Concern with the Internet of Things | @ThingsExpo #IoT #M2M #API

The growing popularity of IoT has spawned the debate on privacy once again. Last year, Samsung stoked controversy by warning customers that their Smart TV Voice Recognition system was capable of “listening” to personal and sensitive information spoken by customers. Not only this, all of this intercepted information is transmitted over a non-encrypted connection to be stored in a third party server. Although the company was quick to change its policy wordings and issue clarification, Samsung is hardly the only one. ‘Hello Barbie’, a WiFi connected doll from Mattel intercepts chil... (more)

Content Personalization Will Be Big in 2016 | @CloudExpo #Cloud #BigData

Understanding the core objective is alone not enough to find greater success with content marketing. The reason very few marketers find their content marketing strategies effective is because of the lack of personalization. Content marketing is everywhere and it is not going away anytime soon. A survey conducted by IDC found that CMOs at some of the biggest technological companies in the world regarded building content marketing competency as the second most important initiative in their organizations just behind ROI. Yet, as another study from the CMO council shows, less than 2 p... (more)

Getting Automation Right with Big Data | @BigDataExpo #BigData

Big data automation can mean writing dozens of scripts to process different input sources and aligning them in order to consolidate all this data and produce the required output. Why exactly do you need big data for your enterprise projects? Many industry observers have been noting that although a lot of enterprises like to claim that their big data projects are aimed at "deriving insights" that replace human intuition with data-driven alternatives, in reality though, the objective appears to be automation. They point out that the role of data scientists at a lot of organization... (more)