Twitter Feed
What has NIST done for me lately?
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security…
Future Ready in the API economy
The world of business is software. No matter the industry vertical or business model, effective software is the key to business success. An even more important aspect of this reality…
Teradata: Embrace the Power of PaaS
Platform-as-a-Service (PaaS) has always been the unappreciated sibling of the cloud computing service model trio. Existing in the dark shadow of the most widely adopted Software-as-a-Service (SaaS) and foundationally powerful…
Why cloud changes everything
How is cloud computing bringing society and its ideas closer together? This got me thinking. Last week the President of the United States started following me on Twitter. Now I…
The future of data security: An interview with Dell Fellow Tim Brown
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished…
Hybrid IT Governance: Automation is Key
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just…
Endpoint device management: Protecting the enterprise front door
Mobility and cloud computing have combined to obliterate any so-called network security perimeter. Corporate data has now been let loose to roam in a world of cyber thieves, manipulators and…
20 hybrid cloud insights from top industry experts
One cloud does not fit all organizations. That’s true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that…
Security requires long haul planning
On Tuesday, October 6th, the European Court of Justice (ECJ), invalidated the U.S./EU Safe Harbor Framework. This framework, in place since 2000, gave blanket permission to data transfers from the…
Cybersecurity through enterprise risk management
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in…
In covering unfolding events in Iran, the world’s most powerful news outlets have been entirely dependent on the Twitter-provided flow of text, images, and video. While this has definitely showcased the power of Twitter, Facebook and You Tube as an information channel, it also prompted me to re-read some of my September 2008 blog posts:
9/9/08 The Cloud Wins in Minneapolis at the RNC!
- Little did I know that while I was watching the Republicans cheer their standard bearer inside the Xcel Energy Center that the cloud infrastructure was outside defeating the forces of civil obedience!
- From “The revolution will be Twittered“: “A free and public social-media website called Twitter, which publishes brief messages sent in from cell phones and computers, was a game-changer for protesters, organizers, and journalists covering the event. ….What developed was an ad hoc information system that provided a vast amount of first-hand accounts, insight and the opportunity for rumors and misinformation.”
- This wouldn’t be possible without wireless connectivity, a virtualized IT infrastructure and open source application technology. In short, it wouldn’t be possible without the underlying cloud computing technologies.
9/10/08 Ambient Awareness. The cloud killer app?
- In the September 5th New York Times article, “Brave New World of Digital Intimacy“, Clive Thompson really got me thinking about how cloud computing, social networking sites like Facebook and adhoc information networking tools like Twitter are combining to mold our future social interactions.
- This social transformation may also provide new tools to address situational awareness requirements within the national security community.While a Twitter stream of consciousness may, on the surface, seem useless, the paradox of ambient awareness may make such technologies incredibly useful.
9/23/08 Google, GeoEye, Twitter. What a Combination!
- According to their press release, GeoEye-1 will be able to collect images with a ground resolution of 0.41-meters or 16 inches in the panchromatic, or black-and-white mode, and collect multi spectral, or color imagery, at 1.65-meter resolution. (Under current government rules, the company can only offer the public half-meter images.)…
- All you need now is some real-time queuing from a Twitter-powered ad-hoc information network and you really got something going.
Follow me on https://Twitter.com/Kevin_Jackson
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes