Blog

August 9th, 2014

Ever since the conception of The Cloud, businesses have striven to utilize its potential. This has proven to be more complicated than was originally thought. Not only is the world of The Cloud extremely complex, but there are also numerous cyber security issues involved. Despite these issues, statistics show that online data storage mechanisms have been growing exponentially. IT is more popular than ever. Where is all of this leading to? Ultimately we’re unsure. But what we’re sure of is that it will revolutionize technology as we know it.

Read the full article here:
http://cloudtweaks.com/2014/07/view-cloud/

August 9th, 2014

Hospital readmission is a big, expensive problem–so expensive that the Affordable Care Act has created incentives to encourage hospitals to improve their readmission rates. Another approach has been developed by researchers at the University of Washington who have created a Risk-O-Meter especially aimed at heart patients. The meter estimates a patient’s readmission risk based on medical signs as well as demographics. In addition, the Risk-O-Meter allows healthcare providers to monitor the patient’s changing risks and to understand what treatments work best.

Read the full article here:
http://gigaom.com/2014/07/14/how-machine-learning-is-saving-lives-while-saving-hospitals-money/

August 8th, 2014

A New York hotel tried to control its social media reviews by threatening to fine the guests of marrying couples. When confronted, the hotel insisted it was a tongue-in-cheek statement. What the hotel fails to understand is that it is impossible to control what is posted about you on the internet, and trying to do so will only make the situation worse. The hotel should have addressed the customers’ reviews immediately, been honest at all times, and kept an eye on the hotel’s online presence in order to see how their performance could be better.

Read the full article here:
http://jackiehuba.com/2014/08/lessons-from-the-hotel-that-fines-customers-500-for-negative-online-reviews.html

August 8th, 2014

Fonterra used an Application Performance Monitoring APM tool to find the extra training for employees, which was necessary to speed up SAP transactions. Yet some employees didn’t pass the reports due to custom T codes. The process is critical and shows the milk sources processed and when it was received and left. But recently employees complained about how long it took to get scanned

Read the full article here:
http://opensource.sys-con.com/node/3031997

August 7th, 2014

For as long as The Cloud, or online data storage, has been available, there have been people debating whether to utilize its potential, or to stick with the more familiar physical storage devices (USB, Hard drives, floppy discs, and the like). However, Mary Branscombe, a freelance tech journalist poses one question: Why not both?

Read the full article here:
http://www.zdnet.com/cant-decide-behind-in-house-or-in-the-cloud-why-not-choose-both-7000031511/

Topic Cloud Trends
August 7th, 2014

The cloud is merely a conduit to a greater destination; solving problems in business. By allowing instant access to a shared pool of resources, the cloud provides value to its users. However, if not kept in check, applications and services can be spread throughout the cloud unchecked, causing serious mayhem to a business.

Read the full article here:
http://opensource.sys-con.com/node/3115161

Topic Cloud Trends
August 6th, 2014

In a large company, Sales and IT often have different priorities. One essential  way to bridge the gap is to focus on the customer. Sales and IT should collaborate closely so that the customer does not receive mixed messages. Before making any promises to the customer, the CMO and CIO should make sure that they are in agreement.

 

 

 

Read the full article here:

http://www.1to1media.com/weblog/2014/08/bridging_the_cmo_and_cio_gap_w.html

August 6th, 2014

Many businesses would like to offer a BYOD policy (an acronym for Bring Your Own Device). However, there are many security risks involved when doing so; corporate espionage, data theft, and viruses are a few. Here are our top seven points to consider when developing a Bring Your Own Device policy.

Read the full article here:
http://www.techopedia.com/2/30293/it-business/it-management/7-points-to-consider-when-drafting-byod-security-policies

August 5th, 2014

IT monitoring is an extremely difficult thing to do. One must monitor performance, storage capacity, the network, potential threats, applications, capacity, and much more. However one program, up.time, can do all of these tasks at once and more. Elizabeth White, a frequent publisher on tech related issues, offers her top five reasons to choose up.time.

Read the full article here:
http://opensource.sys-con.com/node/3119253

Topic General Tech
August 5th, 2014

The most important factor when using Bitcoin is to know how to keep your funds secure and safe. Safety precautions involve knowledge of cold storage, diversification of your digital wallets and using multiple computer addresses. Checking on your Bitcoin provider and your existing accounts is important. Be sure to consider security when choosing who to use as a provider.

 

Read the full article here:
http://www.techopedia.com/2/30254/technology-trends/bitcoin/how-safe-is-your-bitcoin-wallet