Welcome!


Latest Blogs from @CloudExpo
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global clou...
Hostway Services, Inc. and WSM International have partnered to deliver trouble free migration services for any organization that wishes to bring their IT infrastructure to Hostway's Azure managed cloud services. WSM is the leader in providing turn-key IT migration services since 2003 ...
Government organizations, utility companies and private individuals are using big data to fight crime, maintain bridges and prepare for natural disasters. Unless you are an IT manager, understanding all of the technical details of how big data technology — such as Hadoop Hive or Apac...
Machine learning, cloud services, and artificial intelligence-enabled human agents are all combining to change the way that companies can order services, buy goods, and even hire employees and contractors. To learn more about how new trends are driving innovation into invoicing and s...
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformat...
This is another topic that has taken me a long time to write, but several conversations with Peter Burris(@plburris) from Wikibon finally helped me to pull this together. Thanks Peter! I’ve struggled to understand and define the Intellectual Capital (IC) components – or dimensions – o...
The next BriefingsDirect security market transformation discussion focuses on the implications of the European Parliament’s recent approval of the General Data Protection Regulation or GDPR. This sweeping April 2016 law establishes a fundamental right to personal data protection for E...
Since we launched our Agile Digital Transformation Roadmap poster two weeks ago, several hundred people around the globe have downloaded it – but it’s not clear how many of them have taken the time to work their way through it. Haven’t seen it yet, you say? No worries – you can down...
Human interaction has long been altered by the introduction of new technology. In the world of today those alterations have been rapidly accelerated by technology that incubates the creation of new and innovative applications that interconnect people. Specifically, properly secured clo...
If your organization has moved to a public or private cloud you’ve had the conversation about the scope of development environments. Should every developer get an environment in the cloud? Traditional test environment management has focused on QA and staging environments for the quali...
"IoT is the core expertise for our company. We make home automation products. We don't require a Hub in our products so if you have Wi-Fi in your house that's the only investment you have to make - a Wi-Fi router and you buy our products and they automatically connect to the Wi-Fi rout...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feas...
Enterprises have been struggling for years to develop applications that are agile and quick to change. Microservices architecture provides a way to address this challenge and has therefore caught the attention of enterprise IT teams. Beyond the initial enthusiasm, proof of concepts and...
As more emphasis is placed on user experiences and the application of consumer-like processes in business-to-business (B2B) commerce, a softer side of software seems to be emerging. The next BriefingsDirect technology innovation thought leadership discussion focuses on new user exper...
Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue. Layering inherently global cloud services on top of a globally fractured networking infrastructure just doesn’t work. Incompatibilities abound and enterpris...
In the world of agile development, it is still important to plan and design. Of course, you want to avoid detailed design of the entire application - if you did that, you'd be right back in the world of waterfall, which isn't where you want to be, is it? So you want to get started qu...
Cybercrime costs the global economy as much as $450 billion each year. And, the median cost of cybercrime has increased by nearly 200% in the last five years. Meanwhile, collaboration has become the cornerstone of successful organizations. But collaboration often comes with a risk. ...
Over the years, marketing in general has shifted from outbound “interruption-based” marketing to inbound “get found” marketing. This means demonstrating thought leadership while creating remarkable content, and sharing it through channels in which people with interest can find it. This...
Mitigating downtime requires good workflows, human response and – most importantly – proper alarms to alert relevant individuals when things go wrong. Proper incident notification is crucial to effect management of IT downtime. Proper IT management requires proper incident management...
FalconStor Software has announced that organizations using FreeStor® to seamlessly migrate, protect and recover data in the cloud are able to do so without being tied to specific hardware, networks or protocols, making it an ideal solution for businesses that are looking to cut costs a...
So you’ve heard how click-to-call widgets can really enhance a website’s potential for customer interaction and you want to try it out for yourself. Or you’re considering offloading pieces of your VoIP infrastructure, but want to see how that would unfold first. Where can you find this...
With the pace of technological development and the complex needs of ERP, it can be difficult to choose the right SAP HANA hosting or upgrade strategy. There are unexpected benefits of moving to the cloud, but also risks in outsourcing mission-critical applications. Here are some of the...
The U.S. Army Intelligence and Security Command (INSCOM) has awarded BAE Systems a five-year contract worth as much as $75 million to provide enhanced geospatial intelligence technical and analytical support. The award was issued under the INSCOM Global Intelligence indefinite deliver...
In order to deal with disruptive business environments – as well as introducing disruption intentionally to shake up the competition – organizations must become better at dealing with change generally. In other words, change itself must become a core competency. Furthermore, the E...
Dialogic has announced that ZVRS chose Dialogic® PowerMedia™ XMS software media server as part of its latest video relay and translation service offering. ZVRS uses Dialogic’s PowerMedia XMS technology to provide a robust solution that supports a broad range of legacy devices and any-t...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cogniti...
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high...
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Host...
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Exce...
xMatters for the Enterprise DevOps toolchain stitches together the disparate operational tools to help orchestrate hand-offs between the tools and team members. Customers like us because we understand the need for DevOps or NoOps automation at enterprise scale and recognize that humans...
Advances in thin clients, desktop virtualization (VDI), cloud management services, and mobile delivery networks are allowing both increased security and edge applications performance gains. The next BriefingsDirect thought leadership panel discussion focuses on the heightened role of ...
Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because th...
Karen Field, Penton Communications' IoT Institute director, in her article "Start Small to Gain Big," postulated an oil drilling platform with 30,000 sensors would generate about 1 Terabyte of data per day. She also stressed that only 1% of that data would likely be used. From a system...
It is my firm belief that developers today are not focused on security during periods of head-down development. I would love to know the percentage of web developers that know about the Open Web Application Security Project or OWASP. This non-profit organization is simply focused on th...
IoT networking requirements are vastly different from those supported by today's cloud network. The processing and transport levels are multiple orders of magnitude higher than ever seen before. More importantly though, societal economic and the safety ramifications of making mistakes ...
Consider the following integration scenarios: Moving medical records between EMR systems; financial information between banking systems; HR information between ERP systems; and software development information between SDLC tools. At first glance the approaches required for these integ...
The "Internet of Things" depends on the "Cloud" for the processing and storage of data. The Cloud's backbone, however, is the network. This logic train reveals the importance of professional rigor and solid System Engineering (SE) of the network. Imagine a sea of sensors, put out in...
Social gaming company Playtika uses big-data analytics to deliver captivating user experiences and engagement. We'll learn how feedback from massive user action streams can be analyzed in bulk rapidly to improve the features and attractions of online games and so help Playtika react w...
The pace of technology today means organizations are increasingly tasked with delivering applications that are fast, efficient, and capable of doing more than ever to keep up with the demands of the business. They’re looking to improve existing applications and add new ones. But how ca...
An expert panel discussion examines the value and direction of The Open Group IT4IT initiative, a new reference architecture for managing IT to help business become digitally innovative. IT4IT was a hot topic at The Open Group San Francisco 2016 conference in January. This panel, cond...