Guest Author
Latest from Guest Author
Alistair Croll on Big Data and Lean Analytics for Startups
Most aspiring startup founders take completely the wrong approach when it comes to courting investors, according to Alistair Croll, an emerging technologies expert and noted author. He’s worked with myriad startup accelerators and learned that venture capitalists aren’t as concerned about whether you can build what you’ve suggested. They’d rather know whether anyone will really ...
Bouncing Back After a Security Breach
Knowing your sensitive data is in the hands of an unknown source can be a terrifying experience for anyone. IT security professionals do their best to defend and protect their organizations’ intellectual property from a myriad of threats, including hackers, insiders, and even simple misconfigurations that can leave sensitive, or regulated data inadvertently exposed. Today, ...
Silicon Valley’s Unique Cycle of Wealth Creation and Transfer
Disruption in the technology industry is not new, but the agents of change will surprise you. By Gary Griffiths, CEO of Trapit A while back, Dan Lyons quoted longtime Silicon Valley investment banker Sanu Desai, who’s forecasting a “trillion-dollar transfer of wealth in Silicon Valley.” This tsunami, as Desai sees it, will come from the ...
Secrets of a DevOps Ninja: Four Techniques to Overcome Deployment Roadblocks
While the term DevOps is relatively new, not everyone is a DevOps white belt. The reality is that there are many companies that have practicing DevOps for many years. In fact, there are four established techniques and tools to help guide anyone on the path to becoming a DevOps Ninja. Two key areas that will ...
User Relationship Tips for Developers from Scott Weller, CTO SessionM
When app developers talk about success, they often reference the number of downloads. But that doesn’t tell the whole story. The reality is that the average mobile user will only use 40 percent of the apps they’ve downloaded in a given month. So how can you guarantee your app will not fall prey to the ...
DevOps Is Not an All-or-Nothing Proposition
DevOps has kicked off a lot of discussion in IT management. Some love it, some hate it. But even that reaction is far too binary. The fact is that DevOps is not an all-or-nothing proposition. There is a measured approach you can take, emphasizing small experiments validated in short, low-risk bursts. Here, we’ll take a ...
The Forgotten Security Risk: Data Sharing
Data breaches come in many varieties, from hacked servers to stolen laptops, but one risk that people tend to forget about is the danger of having a shared file go AWOL. Inadvertently send an email to the wrong recipient, upload private data to a public server, or use a consumer-grade cloud file sharing service, and ...
Searching for Dark Data
We live in a highly connected world where every digital interaction spawns chain reactions of unfathomable data creation. The rapid explosion of text messaging, emails, video, digital recordings, smartphones, RFID tags and those ever-growing piles of paper – in what was supposed to be the paperless office – has created a veritable ocean of information. ...
These Privacy Laws Could Drastically Change Your Social Life in 2013
Technology evolves faster than just about anything on the planet. The government isn’t quite so quick, though. This results in the government enforcing laws that are ages behind the development of mobile; thus, putting our security, privacy and rights at risk. For better or worse, the following laws are on the table to change your ...
The Highway and the Private Drive: The Case for Single-Tenant SaaS Solutions
Marketers today find they need increasingly nuanced solutions for their IT needs – in fact, Gartner has predicted that on average, marketing departments will have bigger IT budgets than IT departments in 2013. Increasingly, we see a career path for IT professionals inside the marketing organization, and many CMOs are appointing their own VP of ...