Twitter Feed
Great Leaders Are Ambidextrous, Are You?
By: Melvin Greer Managing Director, Greer Institute There are many important characteristics of great leaders. Team players, good listeners and visionary are clear hallmarks. But being ambidextrous is required now…
Cloud Computing Advantages and Disadvantages
What is Cloud Computing & what are its advantages & disadvantages. Join us for this installment of our Technical Insight series as expert Learning Tree instructor Kevin Jackson examines the…
Ingram Micro Honors Veterans with a $10,000 Gift to Veterans 360
On Veteran’s Day, hundreds of military veterans, active-duty service members and retirees were recognized and celebrated along with family members at the third annual Ingram Micro Veterans Day ceremonies held…
What Are You Waiting For? The Cloud Era is HERE!
by Kevin L. Jackson (This post first appeared at https://blog.learningtree.com) The revolutionary business aspects of cloud excite me every day, but the business diversity is even more exciting. This fact…
Schizophrenic About Cloud?
By Kevin L. Jackson This week Dell released its first Global Technology Adoption Index (GTAI). This survey of more than 2,000 global organizations took a close look at how organizations…
Why You Need to Pay Attention to Cloud Computing
(This post was originally published by Learning Tree International https://blog.learningtree.com/why-you-need-to-pay-attention-to-cloud-computing/ ) The adoption of cloud computing is revolutionizing today’s business. This trend has also elevated the importance of IT and…
Thriving in a Cloud, Big Data, Mobility and Security World
“The next generation of technology solutions will transform lives, businesses and economies.” This is the theme at this year’s Dell World opening keynote and this view is supported by Gartner’s…
Vets360 Founder Rick Collins Being Honored at the ‘Champions’ Leadership Conference
Veteran’s 360 and Rick Collins, Founder & Executive Director of Vets 360, Inc., are being honored at this year’sChampions Leadership, and Research Conference™ . This event, November 6th-7th, 2014 at…
“Cloud Musings” Joins Dell Content Provider Network
Cloud Musings, a GovCloud Network Property, is proud and honored to announce that we will now be serving over 3 Million Dell Community online daily viewers. Our content will focus…
Grounding the Cloud: Basics and Brokerage
“Picture Ben Franklin attempting to harness energy from a lightning-filled sky. The key tied to his kite was the middleman between electricity and the ground. This book details how using…
- Using highly automated and economic cloud infrastructure to deliver proactive and predictive monitoring and threat interception in cybersecurity;
- Leveraging cloud computing device independence to enable real-time social media analytics that coordinate delivery of context driven information and commercial offers across multiple marketing channels;
- Establishing connectivity across over 6.4 billion sensors so that analytics and cognitive computing programs can provide actionable insight from real-time and historic data; and
- Hybrid Cloud data architectures that use cognitive computing capabilities to maintain content traceability and lifecycle management to enable the auditable management of licenses, terms of use, and changes to third-party data.
Cognitive systems understand by interaction, reason by generating recommendations and hypotheses, and learn from human experts and data. Since they never stop learning they also never stop providing business value. With this blending of cloud infrastructure and cognitive applications, the impossible can suddenly become easy!
- Develop a cognitive strategy by deciding which of your products, services, processes and operations should be infused with cognition. Your strategy should include identifying your organizations data needs and picking the experts to train the cognitive system.
- Collect and curate the data that is most useful to driving your business model. This step will help in creating an organizational foundation of data and analytics.
- Use cloud services that are designed specifically for your industry vertical. Such services will incorporate the application programming interface (API) building blocks necessary to power your future cognitive products and services.
- Acquire hybrid cloud service broker expertise and develop a hybrid infrastructure transition plan that combines your current IT systems with private and/or public clouds. This combination will serve as a backbone of your cognitive business.
- Establish and build-in a data-centric security model from the start. This focus will give you the ability to secure every transaction, piece of data and interaction as cognitive systems make their way into the Internet-of-Things (IoT). Secure systems ensure trust in the entire system and ultimately, the organization’s reputation.
Industry
|
Cloud Computing
|
Cognitive Computing
|
Cyber security
|
Highly automated and economical infrastructure platforms that encompass the implementation and enforcement of “brutal standardization” – IaaS
|
Enables the advancement of operational cyber security is from threat detection via signature-based identification to proactive and predictive monitoring and threat interception powered by analyzing user behavior
|
Marketing
|
Ubiquitous access to compute, storage and networking services independent of device
|
Delivery of social media analytics that promise the coordinated delivery of context driven information and commercial offers across multiple channels to targeted individuals
|
Process Industries
|
Connectivity to over 6.4 billion sensors collecting and storing real-time data
|
Analytics and cognitive computing programs that provide actionable insight from real-time and historic data
|
All industry verticals
|
Transform from the delivery of labor hours and physical goods to the delivery of information and services (Uber, Air B&B, Travelocity, etc)
|
In the case of IBM Watson, the consumption and processing of billions of API calls per month across 80,000 programs developed by 500 companies in 36 countries (https://www.tomsitpro.com/articles/ibm-cloud-hyrid-storage-watson,1-3158.html)
|
Consulting / Analytics
|
Voice-driven command and control
|
Applications that understand natural language and generate personalized insights that learn with every user interaction
|
Consulting
|
Economic and secure collection, transport, processing and storage of massive amounts of structured and unstructured data
|
Ability to pull non-obvious insights out of massive amounts of multi-structured data through the discovery of patterns and relationships. This enables the economic use of dark data, described as “information assets that organizations collect, process and store in the course of their regular business activity, but generally fail to use for other purposes.”
|
Distribution / Publishing / Content Management
|
Hybrid Cloud data architectures that ensures that, when multiple data zones are in use, compute power is moved to the data, rather than compute workloads being moved in a way that could violate institutional policies, regulatory guidelines or governmental laws around data location.
|
Data Fabric technology that maintains the traceability and lifecycle of content enabling the auditable management of licenses, terms of use, and changes to third-party data.
|
Education / Research
|
Global SaaS/PaaS business models and platforms
|
Creation of Analytic Fabrics that combine and orchestrate different analytics engines that deliver an ability to create composite or cognitive insights across first-part and third-party data. This can also be used to combine natural language queries with structured data analytics.
|
Healthcare / Public Safety
|
Global SaaS/PaaS business models and platform
|
Cognitive Graphs that can represent entities, relationships, and attributes in a probabilistic way, not just a deterministic way, so that users can do inferencing and generate hypothesis. This also delivers an ability to normalize many different data types as well as learn from data over time. With this capability, when something changes somewhere in the graph that may affect something elsewhere in the graph, every specific change is recognized at every point it touches.
|
( This post was brought to you by IBM Global Technology Services. For more content like this, visit Point B and Beyond.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes