A relatively new term is gaining steam as dominant technology trends converge into an entity that is larger than even the Internet: the digital economy.
Sharing threat intelligence is an old idea that appears to be earning new credibility. Researchers, security professionals and government entities have long informally shared information about vulnerabilities. And there are several organized threat exchange platforms, notably Microsoft's Interflow exchange, AlienVault's Open Threat Exchange and the Health Information Trust Alliance (HITRUST) Cyber Threat Xchange.
Marketing is a hot topic for small business owners, which is why we spend a lot of time thinking and writing about it over at Small Business Computing. While marketing comes easily to some small business owners, others show more enthusiasm for scheduling a root canal.
Ownership can take on many forms.
I recently called a plumber to my home, but he arrived two hours late because the previous customer had a complicated and unusual problem. When I asked what the problem was, he told me that she had dropped her iPhone in the toilet and it got stuck. The plumber told the customer that the only way to get the phone out was to break the toilet and install a new one. She agreed, and he spent a couple of hours dealing with that mess. She, in turn, spent a lot of money—without even knowing if the phone would work again!
When Gartner speaks, the cloud computing market listens. In the fractured, still immature cloud market, the research firm's annual Magic Quadrant for Cloud Infrastructure is widely considered the authoritative report on trends and vendor ranking. The moment it's released, vendors trumpet it or spin it, and pundits tweet and pontificate about it voluminously. One of the report's three authors, Lydia Leong, is arguably the cloud's leading authority. The report is a hefty tome whose complexity reflects the cloud market's many technologies, with a handful of vendors combining/developing a variety of emerging technologies. Amid the report's dense verbiage, here's a summary of the two market giants that are most shaping the market.
When it comes to the public cloud, Amazon Web Services (AWS) is the clear winner today. Outside of the public cloud, the winner on the private side is also clear and it's the open-source OpenStack cloud platform. Simply put, no other cloud technology platform is as widely supported or deployed as OpenStack. OpenStack got its start in 2010 as a joint effort of NASA and Rackspace and in the last five years has grown well beyond its origins. The biggest names in technology now all support OpenStack. HP, IBM, Intel, Cisco, Dell, EMC, VMware, Symantec, Huawei and Yahoo are among its members.
The old saying "may you live in interesting times" is a blessing or a curse, depending on how you look at it. These times are indeed interesting. "Transition" and "transformation" are pervasive themes in the channel and elsewhere in IT. Business Transformation is the Buzzword to Know A recent report from CompTIA outlines those themes: "Business transformation will remain the buzzword of the moment as channel firms of all stripes continue to assess the direction of their companies in the age of cloud computing, mobility, managed services, big data, social media and other market and technology forces. Navigating new routes to market and evolving customer buying habits will challenge channel firms to focus just as much on their own branding and marketing as they will on elevating their tech skills."
It is no longer just a matter of simply using touch, voice, and keyboards to provide your computer with information. Going forward, how you interact with your computer is going to change. More importantly, your computer will be able to perceive what is happening around it and take that into consideration as well. Perceptual computing is not new. It has been in the mainstream consumer market for half a decade, thanks to Microsoft and the Microsoft Kinect. Perceptual computing, however, is not just a toy for gaming consoles; it is quickly about to become a part of computing systems across the ecosystem.
"If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." - Sun Tzu, The Art of War There was a time not so long ago when the word "hacking" conjured up the image of fifteen-year-old writing viruses that presented a message like "You've been hacked by badboy45". If the individual was particularly malicious, they might go so far as to reformat your C drive. While extremely inconvenient, acts such as this merely enforced the case for performing regularly-scheduled backups. It is only in the recent past that organizations have taken to the systematic targeting of business and governmental agencies in order to carry out highly nefarious deeds – with devastating success.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
The digital economy and the traditional economy are merging so successfully that it can be difficult to see where they separate. Read More »Smiley Faces and Symbols
A text smiley face is used to convey a facial expression or emotion in texting and online chat conversations. This Webopedia guide shows you how... Read More »29 Free Android Apps for Cash-Strapped Students
From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »Computer Architecture Study Guide
This Webopedia study guide describes the different parts of a computer system and their relations. Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the current devices that we use today. Read More »