Start-ups focused on micro data centres could fill a void created by growing demand to process IoT data closer to the network edge.
Stories by Jeff Vance
With few enterprises using purely private or purely public cloud infrastructure, a range of startups has emerged to meet unique hybrid-cloud needs for management, storage and virtualisation
With few enterprises using purely private or purely public cloud infrastructure, a range of startups has emerged to meet unique hybrid-cloud needs for management, storage and virtualization. Here are 10 hot hybrid cloud startups to keep an eye on.
The Big Data space is heating up
Now that the holidays are over, reality has set in and you probably have a resolution or two to live up to. If any of your resolutions are along the lines of "be more efficient at work" or "find ways to boost productivity," you're in luck. These apps will help you meet and even exceed your work-related resolutions in 2014.
The market for cloud security tools is expected to grow significantly in the coming year. Here are 10 cloud security startups that could help boost cloud adoption in 2014 and beyond.
It's time to look at apps that make these mobile devices even more powerful for business users.
Running a small business isn't easy. I know. I run one. As a freelance writer, I’ve learned that you need to run your writing career as if you were running a business.
When CIOs worry about the Bring Your Own Device (BYOD) trend, one of the things that most concerns them is their lack of control over mobile apps. Rogue apps packing malware are a major concern, but many malware-free apps pose risks too.
After the recent security breach that hit professional social networking site LinkedIn, social media companies are scrambling to patch over their poor security practices. Wait too long to address known security holes, and CIOs should worry about seeing their companies targeted, hacked and eventually vilified in the press.
Social media is taking up more and more of our time, both at home and work. Many enterprises have even started to treat social media tools as mission-critical, meaning that if you don't start mastering them, your lack of knowledge could impede your career.
Despite all of the hand wringing over cloud security, major Cloud security breaches haven't been grabbing headlines. The past year has seen major breaches, such as the ones that hit Sony and Epsilon, but we haven't heard much of an emphasis about the Cloud being a weakness.
IPhone users love to brag about their phones. They line up around the block and stand in line for hours when a new one is released. Yet, for many users, Android is clearly the superior platform. Yes, its Achilles' heel is a big one: security. Android's openness and large market share mean that it's a juicy target for attackers.
Hoarding shows are popular these days. Hoarders, Hoarding: Buried Alive, Confessions: Animal Hoarding and on and on. The images are consistent: Boxes stacked to the ceilings. Piles of newspapers dating back to the Nixon era. Feral cats skittering behind furniture. Empty cans of cat food, beans and soup scattered everywhere.
Personal information belonging to a full third of Massachusetts residents has been compromised in one way or another, according to the state's attorney general, citing statistics gleaned from a tough new data breach reporting law.