Twitter Feed
Cloud Acquisition Strategy, Customized to the Right Cloud Model
by Melvin Greer Managing Director, Greer Institute This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing…
Women leading us to the cloud
By Jodi Kohut Government Cloud Computing Professional By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our…
CSCC Cloud Privacy Summit – Reston, VA March 26th
Please join the Cloud Standards Customer Council in Reston, Virginia on Thursday, March 26th for the Cloud Privacy Summit. This all day symposium will stimulate lively, interactive discussion and deliver…
Bangladesh: A country transforms with IT
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of…
Introducing CloudTek University
Visit us at https://www.CloudTekU.com Cloud Computing Basics https://sqz.co/Fs34AaX Cloud Technologies https://sqz.co/s2ACt68 Cloud Security https://sqz.co/Mp7m3TE Business Innovation https://sqz.co/j4NZb37 Cloud Computing Pilots https://sqz.co/e5HFy24 Cloud Operations https://sqz.co/p5CJo24 CloudTek Overview https://sqz.co/k9S4Ewt ( This content…
The Emerging Science of Digital Forensics
By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains…
African-Americans and STEM careers: Getting a foot in the door
By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the…
U.S. Department of Defense sets its cloud security guidelines
By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines…
Circles are good for the economy
Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout…
2015 National Chief Information Security Officer Survey
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The…
- Using highly automated and economic cloud infrastructure to deliver proactive and predictive monitoring and threat interception in cybersecurity;
- Leveraging cloud computing device independence to enable real-time social media analytics that coordinate delivery of context driven information and commercial offers across multiple marketing channels;
- Establishing connectivity across over 6.4 billion sensors so that analytics and cognitive computing programs can provide actionable insight from real-time and historic data; and
- Hybrid Cloud data architectures that use cognitive computing capabilities to maintain content traceability and lifecycle management to enable the auditable management of licenses, terms of use, and changes to third-party data.
Cognitive systems understand by interaction, reason by generating recommendations and hypotheses, and learn from human experts and data. Since they never stop learning they also never stop providing business value. With this blending of cloud infrastructure and cognitive applications, the impossible can suddenly become easy!
- Develop a cognitive strategy by deciding which of your products, services, processes and operations should be infused with cognition. Your strategy should include identifying your organizations data needs and picking the experts to train the cognitive system.
- Collect and curate the data that is most useful to driving your business model. This step will help in creating an organizational foundation of data and analytics.
- Use cloud services that are designed specifically for your industry vertical. Such services will incorporate the application programming interface (API) building blocks necessary to power your future cognitive products and services.
- Acquire hybrid cloud service broker expertise and develop a hybrid infrastructure transition plan that combines your current IT systems with private and/or public clouds. This combination will serve as a backbone of your cognitive business.
- Establish and build-in a data-centric security model from the start. This focus will give you the ability to secure every transaction, piece of data and interaction as cognitive systems make their way into the Internet-of-Things (IoT). Secure systems ensure trust in the entire system and ultimately, the organization’s reputation.
Industry
|
Cloud Computing
|
Cognitive Computing
|
Cyber security
|
Highly automated and economical infrastructure platforms that encompass the implementation and enforcement of “brutal standardization” – IaaS
|
Enables the advancement of operational cyber security is from threat detection via signature-based identification to proactive and predictive monitoring and threat interception powered by analyzing user behavior
|
Marketing
|
Ubiquitous access to compute, storage and networking services independent of device
|
Delivery of social media analytics that promise the coordinated delivery of context driven information and commercial offers across multiple channels to targeted individuals
|
Process Industries
|
Connectivity to over 6.4 billion sensors collecting and storing real-time data
|
Analytics and cognitive computing programs that provide actionable insight from real-time and historic data
|
All industry verticals
|
Transform from the delivery of labor hours and physical goods to the delivery of information and services (Uber, Air B&B, Travelocity, etc)
|
In the case of IBM Watson, the consumption and processing of billions of API calls per month across 80,000 programs developed by 500 companies in 36 countries (https://www.tomsitpro.com/articles/ibm-cloud-hyrid-storage-watson,1-3158.html)
|
Consulting / Analytics
|
Voice-driven command and control
|
Applications that understand natural language and generate personalized insights that learn with every user interaction
|
Consulting
|
Economic and secure collection, transport, processing and storage of massive amounts of structured and unstructured data
|
Ability to pull non-obvious insights out of massive amounts of multi-structured data through the discovery of patterns and relationships. This enables the economic use of dark data, described as “information assets that organizations collect, process and store in the course of their regular business activity, but generally fail to use for other purposes.”
|
Distribution / Publishing / Content Management
|
Hybrid Cloud data architectures that ensures that, when multiple data zones are in use, compute power is moved to the data, rather than compute workloads being moved in a way that could violate institutional policies, regulatory guidelines or governmental laws around data location.
|
Data Fabric technology that maintains the traceability and lifecycle of content enabling the auditable management of licenses, terms of use, and changes to third-party data.
|
Education / Research
|
Global SaaS/PaaS business models and platforms
|
Creation of Analytic Fabrics that combine and orchestrate different analytics engines that deliver an ability to create composite or cognitive insights across first-part and third-party data. This can also be used to combine natural language queries with structured data analytics.
|
Healthcare / Public Safety
|
Global SaaS/PaaS business models and platform
|
Cognitive Graphs that can represent entities, relationships, and attributes in a probabilistic way, not just a deterministic way, so that users can do inferencing and generate hypothesis. This also delivers an ability to normalize many different data types as well as learn from data over time. With this capability, when something changes somewhere in the graph that may affect something elsewhere in the graph, every specific change is recognized at every point it touches.
|
( This post was brought to you by IBM Global Technology Services. For more content like this, visit Point B and Beyond.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes