cloud computing

  • Why Cloud Computing Will Shake Up Security Crunch Network

    Why Cloud Computing Will Shake Up Security

    As the curtain opens on 2016, you can expect massive changes in the security landscape. Technology providers such as firewall vendors, switching vendors and others will fade as new solutions better suited to the cloud computing environment emerge. On the flip side, companies that provide encryption and anti-malware technologies will continue to see their fortunes rise because the demand… Read More

  • 5 Things That Will Disappear In 5 Years Crunch Network

    5 Things That Will Disappear In 5 Years

    Just five years ago the world was a very different place. In 2010, the iPad had just made its debut, Kickstarter was introducing a new form of venture capitalism that would change the face of fundraising and Square was letting vendors of any size accept payment with a swipe of a card on a mobile device. And we haven’t looked back. The next five years will no doubt unleash products… Read More

  • What’s The Half Life Of A Unicorn? Crunch Network

    What’s The Half Life Of A Unicorn?

    Cybercorns are companies that have surpassed the magical $1 billion valuation. Several of these extraordinary ventures are Okta, Sophos, Tanium, Palantir, FireEye, Splunk, Zscaler, Lookout, CloudFlare, Illumio and AVAST. But in a world where technology is changing rapidly, and in which attackers are agile and focused, which of these unicorns will survive? What is the half-life, perhaps measured… Read More

  • The Cloud’s Biggest Threat Are Data Sovereignty Laws Crunch Network

    The Cloud’s Biggest Threat Are Data Sovereignty Laws

    The beauty of the cloud is the promise of simplification and standardization — without regard to physical or geographic boundaries. It’s this “any time, any place, any device” flexibility that is driving rapid adoption. However, new government regulations on data sovereignty threaten to complicate the delivery model that has made cloud computing attractive, presenting… Read More

  • If You’re Launching A Tech Startup In 2016, Focus On Privacy And Fast Data Crunch Network

    If You’re Launching A Tech Startup In 2016, Focus On Privacy And Fast Data

    Enterprises over the last decade have devoted large portions of their IT budgets to collecting, securing and analyzing huge volumes of big data. Or at least trying to. But heading into 2016, the increasing complexity of networks, and the sheer number of connected devices that are constantly streaming data over those networks, will create a paradigm shift in how enterprises secure and… Read More

  • Afero Is An IoT Dev Platform Play Built By Danger Co-Founder Joe Britt

    Afero Is An IoT Dev Platform Play Built By Danger Co-Founder Joe Britt

    Remember Danger? The mobile maker Microsoft acquired for $500 million back in 2008 in the hopes of firing up its mobile fortunes? Things didn’t pan out quite so well for Microsoft of course, but Danger co-founder Joe Britt is doing just fine. In fact he’s uncloaking his new startup today — one he’s presumably been ploughing some of his unspent Danger money into. Read More

  • The Golden Age Of Open Source Has Arrived Crunch Network

    The Golden Age Of Open Source Has Arrived

    In the new economy, it’s not the code that matters — it’s how you use it to connect people to things they need. From 3D printers to Docker, open-source-based innovation is fueling some of the hottest digital capabilities of our time. Finally — the golden age of open source has arrived. Read More

  • Dispel’s Privacy-As-A-Service Platform Keeps Your Internet Connection Secret And Safe

    Dispel’s Privacy-As-A-Service Platform Keeps Your Internet Connection Secret And Safe

    Most security services today give you virtual private networks that encrypt your connections (if you work for any sizable company, you probably use some kind of VPN client to log in to your intranet). New York-based Dispel, which is now coming out of stealth after more than two years of development, offers all of these features but then layers a number of other security tactics on top of… Read More