What the Cisco Cloud Fusion Buzz Says About Snowballing Cloud Privacy Concerns
Last week, the Wall Street Journal profiled Cisco’s “Cloud Fusion” project, the company’s foray into the hybrid cloud. Hybrid solutions are a combination of public clouds with private clouds maintained...
View ArticleCloud BI or BS (1 of 5): Obtaining Market Clarity
As cloud solutions represent a growing constituency within the analytics space, Blue Hill Research has identified an increasing need for clarity regarding cloud vendors. This is the first of five...
View ArticleGood Technology Unwraps it’s BoxTone Acquisition at MWC14
On the eve of the start of Mobile World Congress (MWC) in Barcelona Spain, Good Technology made headlines with its announcement of a definitive agreement to acquire BoxTone. BoxTone is a privately held...
View ArticleThe Internet of Things and M2M - Some Predictions for a Bubbly Next Few Years
In my last blog post I focused on enterprise security. In particular I considered the issue of knowing (or more accurately, “not knowing”) where mobile security holes lurk within any given business....
View ArticleApple's new iOS 8 & Yosemite Continuity & Handoff are Great Enterprise Additions
Sometimes it’s better to take a step back rather than take an immediate plunge. This truism can be applied to literally any tech event, but I have Apple’s World Wide Developer’s Conference (WWDC) that...
View ArticleBlackBerry's Power Punch aka Encrypted BBM
Yesterday, BlackBerry Limited (NASDAQ: BBRY) announced the availability of BBM™ Protected, the first solution in the eBBM™ Suite for secure enterprise-class messaging. BBM Protected offers regulated...
View ArticleSamsung's KNOX 2.0 to be Embedded in Android L - Should Your Enterprise Care?
Back near the end of January 2014 Google and Samsung signed an important mobile cross-licensing agreement. Yes, they had of course been long time partners as far as Android is concerned, but there have...
View ArticleMobile Content Management, BYOx and the Game of Thrones
Though many companies still struggle with the notion of “Bring Your Own Device” or BYOD, a significant preponderance of businesses has now adopted BYOD as standard operating procedure. The grassroots...
View ArticleTaking Stock of the Legal Cloud (2/2): Paths to a Secure Legal Cloud
Previously, I observed how the evolution of the cloud has led to considerable growth in cloud solutions within legal environments. At the same time, concerns about the security and privacy of cloud...
View ArticleInformatica, Permira, Canada, and $5.3 Billion Dollars
Today, Informatica announced a definitive agreement to be acquired by a company controlled by the Canada Pension Plan Investment Board and the Permira funds for about $5.3 billion. This agreement has...
View ArticleLiving with Legacy in an Era of Innovation – A Security Story
Legacy is a perception of investment, and of value. Unfortunately, legacy in the digital transformation era is seen to be a re-investment is what has been, but not what will necessarily be useful...
View Article
More Pages to Explore .....