How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]
Passwords are generally considered the first line of defense between cyber criminals and your data. In order to help prevent…
Protect Your Data From Backdoor Attacks [VIDEO]
Imagine your computer system is a house. In your house you keep valuables such as TVs, jewelry, family heirlooms, and…
Oracle Has Sunny Forecast for Cloud Computing
At Oracle’s recent cloud computing analyst summit in sunny Palm Springs, the company’s executive team insisted that it sees clear…
It’s Time to Ditch Scarcity Thinking
In J.R.R. Tolkien’s “The Hobbit,” Smaug the magnificent dragon sits on his nearly unlimited hoard of treasure and coins and…
Emerging Cloud Technologies
The cloud is an ever-changing infrastructure that is continuously being applied to different facets of life in order to provide…
Big Data Is Nothing Without Its Little Brother
We sometimes get so caught up in the hype of big data – the huge, fast moving, complex and diverse…
Is Cloud Computing Secure for Financial Services Industry?
My recent article for Seeking Alpha predicts a significant uptick in cloud adoption in financial services, thanks My recent article…
How To Maximize Performance and Scalability Within Your Hadoop Architecture
In its infancy, Apache Hadoop primarily supported the functions of search engines. Today, it is used throughout dozens of industries…
Collaboration in the Cloud: The Continuity Advantage
Real-time communication doesn’t always seem quite fast enough, not in an economy where the most successful businesses have to not…
Architecting Big Data Solutions
In this article I would like to outline, at a high level, the overall thought process for "architecting" big data…