Twitter Feed
Mobile device security: A new frontier for hackers
Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized…
Learn How To Buy Cloud From GovLoop & ViON
“Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since…
A VETS 360 BENEFIT – LATINO FILM INDUSTRY POST OSCAR PARTY
GUESS WHO SUPPORTS VETS 360? You can support them too at the: THE OFFICIAL LATINO FILM INDUSTRY POST OSCAR PARTY The Veterans 360 mission is to support our young combat…
South Asia’s Biggest Tech Event – “Digital World 2015”
I am proud and honored to announce that I have been added as a speaker at SouthAsia’s biggest tech event “Digital World 2015” , 9th – 12th February, 2015 at…
Fear Hackers? First invest in an IT security culture change
by Kevin L.Jackson With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew…
CloudCamp Bangladesh In Dhaka! – February 11, 2015
Did you know that….. Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) – a list of eleven countries having strong potential for becoming the world’s largest economies…
Agile is not the absence of ITIL!
by Jodi Kohut ITIL (formerlyknown as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations. The 5 stage framework:…
Cloud Security: Understanding the Cloud Computing Threat Landscape
In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy…
Federal Cloud Computing Summit on January 14-15, Washington, DC
The Federal Cloud Computing Summit will be held on January 14-15, 2015 at the Marriott Metro Center in Washington, D.C. (Complimentary government and academic registration) This educational symposium will feature cloud computing…
CONGRATULATIONS! Inaugural Cloud Computing Class at Mira Costa College Graduates!!
Anthony Dorrah, Jose Chapman, Mike Chatelain, Lisa Heiden, Ginelle Johnson, Robert Minson, Alfredo Morales We are so proud of the success of out first cloud computing training class. This group…
- Using highly automated and economic cloud infrastructure to deliver proactive and predictive monitoring and threat interception in cybersecurity;
- Leveraging cloud computing device independence to enable real-time social media analytics that coordinate delivery of context driven information and commercial offers across multiple marketing channels;
- Establishing connectivity across over 6.4 billion sensors so that analytics and cognitive computing programs can provide actionable insight from real-time and historic data; and
- Hybrid Cloud data architectures that use cognitive computing capabilities to maintain content traceability and lifecycle management to enable the auditable management of licenses, terms of use, and changes to third-party data.
Cognitive systems understand by interaction, reason by generating recommendations and hypotheses, and learn from human experts and data. Since they never stop learning they also never stop providing business value. With this blending of cloud infrastructure and cognitive applications, the impossible can suddenly become easy!
- Develop a cognitive strategy by deciding which of your products, services, processes and operations should be infused with cognition. Your strategy should include identifying your organizations data needs and picking the experts to train the cognitive system.
- Collect and curate the data that is most useful to driving your business model. This step will help in creating an organizational foundation of data and analytics.
- Use cloud services that are designed specifically for your industry vertical. Such services will incorporate the application programming interface (API) building blocks necessary to power your future cognitive products and services.
- Acquire hybrid cloud service broker expertise and develop a hybrid infrastructure transition plan that combines your current IT systems with private and/or public clouds. This combination will serve as a backbone of your cognitive business.
- Establish and build-in a data-centric security model from the start. This focus will give you the ability to secure every transaction, piece of data and interaction as cognitive systems make their way into the Internet-of-Things (IoT). Secure systems ensure trust in the entire system and ultimately, the organization’s reputation.
Industry
|
Cloud Computing
|
Cognitive Computing
|
Cyber security
|
Highly automated and economical infrastructure platforms that encompass the implementation and enforcement of “brutal standardization” – IaaS
|
Enables the advancement of operational cyber security is from threat detection via signature-based identification to proactive and predictive monitoring and threat interception powered by analyzing user behavior
|
Marketing
|
Ubiquitous access to compute, storage and networking services independent of device
|
Delivery of social media analytics that promise the coordinated delivery of context driven information and commercial offers across multiple channels to targeted individuals
|
Process Industries
|
Connectivity to over 6.4 billion sensors collecting and storing real-time data
|
Analytics and cognitive computing programs that provide actionable insight from real-time and historic data
|
All industry verticals
|
Transform from the delivery of labor hours and physical goods to the delivery of information and services (Uber, Air B&B, Travelocity, etc)
|
In the case of IBM Watson, the consumption and processing of billions of API calls per month across 80,000 programs developed by 500 companies in 36 countries (https://www.tomsitpro.com/articles/ibm-cloud-hyrid-storage-watson,1-3158.html)
|
Consulting / Analytics
|
Voice-driven command and control
|
Applications that understand natural language and generate personalized insights that learn with every user interaction
|
Consulting
|
Economic and secure collection, transport, processing and storage of massive amounts of structured and unstructured data
|
Ability to pull non-obvious insights out of massive amounts of multi-structured data through the discovery of patterns and relationships. This enables the economic use of dark data, described as “information assets that organizations collect, process and store in the course of their regular business activity, but generally fail to use for other purposes.”
|
Distribution / Publishing / Content Management
|
Hybrid Cloud data architectures that ensures that, when multiple data zones are in use, compute power is moved to the data, rather than compute workloads being moved in a way that could violate institutional policies, regulatory guidelines or governmental laws around data location.
|
Data Fabric technology that maintains the traceability and lifecycle of content enabling the auditable management of licenses, terms of use, and changes to third-party data.
|
Education / Research
|
Global SaaS/PaaS business models and platforms
|
Creation of Analytic Fabrics that combine and orchestrate different analytics engines that deliver an ability to create composite or cognitive insights across first-part and third-party data. This can also be used to combine natural language queries with structured data analytics.
|
Healthcare / Public Safety
|
Global SaaS/PaaS business models and platform
|
Cognitive Graphs that can represent entities, relationships, and attributes in a probabilistic way, not just a deterministic way, so that users can do inferencing and generate hypothesis. This also delivers an ability to normalize many different data types as well as learn from data over time. With this capability, when something changes somewhere in the graph that may affect something elsewhere in the graph, every specific change is recognized at every point it touches.
|
( This post was brought to you by IBM Global Technology Services. For more content like this, visit Point B and Beyond.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes