Wearable Technology Can Help with Public Speaking

Wearable Technology Can Help with Public Speaking

Speaking in public is the top fear for many people. Now, researchers from the Human-Computer ...

Have You Found the Best Way to Manage Your Data Centers Yet? Part 2

This is a continuation from Part 1. Comprehensive data center operations support When DCIM emerged as a segment, people did not get it. DatacenterKnowledge reported that Gartner published its first Magic Quadrant (MQ) report on DCIM in 2014.  No single vendor satisfied all the required DCIM functions, and some started to partner with others to [...]

Read full story Comments { 0 }

Have You Found the Best Way to Manage Your Data Centers Yet? Part 1

I have covered the field of data centers for some time, and I’ve heard many subjects discussed, from comatose servers, cooling technologies/methods, modular structures, and monitoring to asset management. Over time, many tools to assist each subject area have been developed and presented. The most recent are called data center infrastructure management tools, known as [...]

Read full story Comments { 0 }

Good Survey Session of Network Security Software @MacITConf – Part 2

This is a continuation from Part 1.   Network utilities ŸBasic security module (BSM):a security audit API and file format originally developed by Sun. ŸOpenBSM: portable, open source implementation of Sun’s BSM. ŸTcpdump: common packet analyzer that runs under the command line and works on most Unix-like operating systems, including OS X. ŸNetwork utility: available [...]

Read full story Comments { 0 }

Good Survey of Network Security Software @MacITConf – Part 1

I wish I could handle MAC, but I’ve been a PC guy since abandoning Unix (not Linux) in 1995. Because MAC OS X is based on Unix, I would like to move my computing platform there some day. That won’t be an easy task, never mind the additional investment on hardware. However, iPhone and iPad [...]

Read full story Comments { 0 }

Positioning of Future Facilities in the Data Center Market

I met and talked with Sherman Ikemoto four years ago at the mini Future Facilities (FF) conference in 2011. Before that, my understanding was that FF was a computational fluid dynamics (CFD) company focused on the data center market. It is well known that cooling takes a significant portion of energy (roughly 33%) in data [...]

Read full story Comments { 0 }

Future Computer Architectures for AI

I borrowed this blog title from a session at the recent Fujitsu Laboratories of America Technology Symposium 2015. As we know, software gets more attention than hardware does these days. Marc Andreesen said that software was eating the world. Some even say data is eating the worldinstead, as data is being given more attention. In [...]

Read full story Comments { 0 }

Is Artificial Intelligence Going to Make It This Time?

In the past, AI was talked about for its potential in the computing market, but it was deemed not usable or applicable for a long time. Now AI is being seen in a new light. Some people, like Stephen Hawking, Elon Musk, and Bill Gates, have warned that AI may take control over humans and [...]

Read full story Comments { 0 }
Insider Data Breaches: Invisible Threats to Your Business

Insider Data Breaches: Invisible Threats to Your Business

The threat of insider data breach is not new for the online business world. In 2005, a former AOL software engineer stole 92 million screen names and e-mail addresses. This past January, major financial services company Morgan Stanley admitted that the information of 350,000 wealth management clients was stolen in an insider data breach — [...]

Read full story Comments { 0 }
Our Connected Data

Our Connected Data

  Over the last few weeks, an outstanding series produced by ARTE called “Do Not Track Me” has become available and is getting quite a bit of social media attention. The different episodes explore and highlight the technologies, algorithms, data mining and aggregation of our online information through digital devices, tools, ecosystems and environments. Each [...]

Read full story Comments { 0 }
Is the Cloud Safe Enough for Your Business Communications?

Is the Cloud Safe Enough for Your Business Communications?

Security Concerns of VoIP CXOs have many valid concerns regarding hosted phone and communications platform: learn about the main security considerations that professionals need to consider when evaluating the risks of cloud phone systems, and how to deal with them. This paper covers concerns such as: Security, encryption and access management Ability to control, manage [...]

Read full story Comments { 0 } Download Whitepaper