San Diego Facebooking — Say Cheese!

Brian Wood Blog

America’s Finest City is the proud home of many wonderful assets. Qualcomm.  ServiceNow. San Diego Zoo. SPAWAR. UCSD. Point Loma. Mission Bay. Now add a facial recognition pilot program used by law enforcement. We all knew that this was coming — Vanilla Sky showed us so. Article by Lisa Vaas in Naked Security. Emphasis in red added by me. Brian …

CIOs: Using Power & Manipulation Against Colleagues

Brian Wood Blog

We have met the enemy and he is us. Or maybe the enemy is the CIO –that is, if he subscribes to the recommendations of Gartner fellow Tina Nunno. Wow. Article by Pam Baker in FierceBigData. Emphasis in red added by me. Brian Wood, VP Marketing ————- How to become ‘The Machiavellian CIO’ and use data against your colleagues Yes, …

Disrobing the Truth About Senior Executives

Brian Wood Blog

“The emperor wears no clothes!” Oh wait, maybe I meant to say, “The emperor looks at websites of people who wear no clothes!” Summary article by David Weldon in FierceCIO, original article by Steve Ragain in Network World. Emphasis in red added by me. Brian Wood, VP Marketing ——— From phishing to adult content, many CEOs benefit from analyst cover-ups …

Gartner: Cloud Security Market Growing

Brian Wood Blog

Growth be good. Article by Saroj Kar in CloudTimes. Emphasis in red added by me. Brian Wood, VP Marketing ——— Gartner Sees Cloud Security Market is Worth $3.1 Billion by 2015 In spite of the widespread belief that bringing data on the systems to an external service provider would create doubts on security, Gartner believes that the market for cloud …

IDC Growth Predictions for 2014

Brian Wood Blog

IDC’s annual IT spending forecast is summarized below. Big winners: Worldwide tech spending: 5% increase Cloud Computing will surge by 25% Big Data will enjoy a 30% increase Summary article by David Weldon in FierceCIO, original by Connie Guglielmo in Forbes. Emphasis in red added by me. Brian Wood, VP Marketing ———– Get Ready for IT in 2014 Expect the …

Back to School: The 80/20 Rule

Brian Wood Blog

We keep hearing and reading about it over and over. 80% of cybersecurity threats can by prevented by good hygiene and best practices — while the other 20% requires a bit more sophistication. We’d all be better off if we looked in the mirror and started with ourselves. Even the longest journey starts with a single step. By Sara Abraham …

Big Data in Education: Profiling or Empowering?

Brian Wood Blog

Any discussion of data mining almost necessarily leads to a discussion of profiling. In essence, profiling is what big data is all about: finding patterns, gleaning insights, forming a picture — and making predictions. I think the “summary article” is more alarmist than necessary; to me, the original piece in Fast Company is more about how WSU is using big …

Main Event: IBM vs. AWS

Brian Wood Blog

Say it ain’t so, Joe! Can IBM really neuter Amazon’s meteoric rise in cloud computing? Who says that elephants can’t dance? Article originally posted on November 8, 2013 by Rob Enderle in CIO. Emphasis in red added by me. Brian Wood, VP Marketing ———— Why IBM Will Win the War With Amazon Web Services Amazon dominates the cloud, but IBM, …

Cloud Service Level Agreements

Brian Wood Blog

Insurance exists to help the policy holder recover from damages / loss after an incident occurs. Insurance does not prevent the damage / loss from occurring. Insurance companies require the policy holder to file a claim after an incident occurs. And as with all things in life, you never get more than what you pay for. SLAs are no different. …

Baby Monitor Hacked, Home Network Attacked

Brian Wood Blog

WiFi-enabled consumer products — light bulbs, refrigerators, thermostats, baby monitors — are convenient, fun, and … insecure. Just because a device is “smart” (i.e., connected) doesn’t mean that it is “smart enough” to prevent unintended consequences. What’s a modern parent or homeowner to do? Article by Dan Goodin in Ars Technica. Emphasis in red added by me. Brian Wood, VP …