Cloud For Business From a Stealth Startup

Harry Trott

Subscribe to Harry Trott: eMailAlertsEmail Alerts
Get Harry Trott: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Harry Trott

The growing popularity of IoT has spawned the debate on privacy once again. Last year, Samsung stoked controversy by warning customers that their Smart TV Voice Recognition system was capable of “listening” to personal and sensitive information spoken by customers. Not only this, all of this intercepted information is transmitted over a non-encrypted connection to be stored in a third party server. Although the company was quick to change its policy wordings and issue clarification, Samsung is hardly the only one. ‘Hello Barbie’, a WiFi connected doll from Mattel intercepts children’s conversations which is then processed over a third party server to analyze the child’s likes and dislikes. Nest Cam, a security camera made by Google-owned Nest Labs, comes with a feature to track “unusual noise” such as those of an intruder - this is made possible by intercepting and... (more)

Traits of a Successful Startup Businesses | @CloudExpo #API #Cloud

Startup businesses are popping up at every opportunity. It seems that there are endless ideas that could become potential businesses. However, not all businesses will be successful. Here are some of the top traits of successful startup businesses. The Business Meets a Need One of the most important factors of determining the success of a business is the necessity for that business. Although it's unfortunate, great ideas will sometimes end up as a failed business. There must be a need for the product or service provided. Before you seek out investors, spend time analyzing the nee... (more)

Global Cloud Security Market | @CloudExpo #DataCenter #Storage #InfoSec

Global Cloud Security Market Expected to Grow Exponentially Over the Next Few Years According to a study the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems to 20 percent CAGR over the next four years. Adoption of cloud computing services has risen and so have the security risks associated with them. According to a study published by Technavio Research, the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems over the next few years. Growth has been pegged at 20 pe... (more)

Getting Automation Right with Big Data | @BigDataExpo #BigData

Big data automation can mean writing dozens of scripts to process different input sources and aligning them in order to consolidate all this data and produce the required output. Why exactly do you need big data for your enterprise projects? Many industry observers have been noting that although a lot of enterprises like to claim that their big data projects are aimed at "deriving insights" that replace human intuition with data-driven alternatives, in reality though, the objective appears to be automation. They point out that the role of data scientists at a lot of organization... (more)

Fighting Crime on the Invisible Cloud | @CloudExpo #Cloud

Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. The cloud brings unique advantages to individual and business users alike and this explains the exponential adoption rate that cloud has seen in the past decade. There are also numerous security challenges with the cloud especially in the areas of privacy and data theft that has concerned stakeholders for a long time. However, with sophisticated encryption technologies, the instances of cloud data getti... (more)