Archive
Former employees: Gone but (passwords) not forgotten
Contributed Article: by Joe Siegrist, Founder and CEO of LastPass
Security is a buzzword right now – from cyber security to password security, it’s got everyone talking. When it comes to employees and passwords, IT departments try to take all the necessary precautions to ensure the business is secure. But what happens when an employee leaves a company? What security risks should businesses be aware of after an employee leaves (either voluntarily or otherwise)? Taking action following a change in staff is important for every company, but small and micro businesses may need more help. Many smaller businesses rely heavily on technology but aren’t big enough to support full time IT employees or departments, so may not know best practices for computer and data security.
While it’s best if your company has security processes in place before an employee leaves, in the event that they aren’t implemented, there are a few steps the company should immediately take.
- Deactivate the employee’s computer and accounts. Ideally, this should be done immediately upon termination. Change passwords for accounts they had access to, including conference lines and building codes. If you wait too long to do this, the ex-employee may have time to access company information to destroy, compromise, or steal from a remote site – even if their computer and other company devices have been confiscated prior to their departure.
- Collect all company devices, including computers, cellphones, tablets, security cards, credit cards, company manuals, and any other sensitive material or anything that provides access to that information. Preferably, this should be done before the employee leaves the office for the last time. The longer it takes you to deactivate accounts and computers, the more time an employee has to alter information (like file creation dates), completely delete files (evidence of misconduct or theft), or commit fraudulent acts (entering new data, loading new software, moving data). For the safety of your employees, it may also be advisable to change the locks and security access codes.
- Debrief the employee on confidentiality. If the employee signed a non-disclosure, non-compete, or non-solicitation agreement, review the document to make sure the employee is clear on their obligation not to reveal information on the company. Now that you’ve taken care of the immediate needs of securing your company’s information, you can focus on implementing some security structures that will not only better protect your business, but will also make your life easier the next time an employee leaves.
- You need better control of your passwords. How many passwords do you have between your personal and work life? My guess is that it’s more than you even realize, and ideally each of those accounts should have a strong, unique password. Unfortunately, that is too much for most people to remember and we end up writing our passwords on sticky notes or Word documents saved on the computer. This is a habit you and your employees need to break. Keep your passwords somewhere where you, and only you, know where they are and have access to – a password manager, an encrypted file, or a similar system that works for you. Make sure it is a place you can store unique passwords for each account and keep track of them. Now that all your passwords are in one, safe location, shred those Post-Its or delete the unsecured Word document. Finally, if you haven’t already don’t so, go through your accounts and make a unique password for each of them.
- You need better passwords. Speaking of passwords, they should be stronger. Hackers use computer systems that are able to recognize the “tricks” humans are likely to use to try to make better passwords. Use a complex combination of capital and lowercase letters, numbers, symbols, and if possible, stay away from dictionary words. Using a password generator that creates random, long passwords is the ideal solution.
- Your password isn’t safe if you give it away. Although account sharing can be convenient, it’s not worth the risks. It makes the company more vulnerable to attack since accounts are accessible by multiple employees (who may or may not have clearance to the information they are accessing). In general, it is important to know who has access to what information, when, and from where. If something unfortunate happens to the company, like theft or leaked information, there will be no way of telling which employee is responsible. If you give out the password to the wrong person and they cause damage – physical or reputation – you may be liable, which leads me to my next point.
- Maintain information on employee access and perform frequent audits. Set up a system that requires employees to use unique passwords to gain access to their accounts and information – ones that make it difficult to share password information. Access rights vary because of different security levels, job descriptions, and locations across the network. Maintain a secure database that keeps track of each employee’s access level, what they have access to, and passwords associated with that access. When an employee leaves, use this to create a checklist that their supervisor can use to disable their access rights, and limit their error in doing so. Perform audits on accounts and enforce a strong password policy that requires that they are changed frequently. And remember, threats don’t always come from the outside – there can be intentional theft, lost or stolen devices, or accidental exposure. The more you are aware of what information is where and who has access to it, the more equipped you will be to handle a disaster.
- Separate personal and financial data. Implement network segmentation to restrict inter-systems access. Set permissions within your network so that employees only have access to information as needed to do their job.
- Last but not least, educate your employees. Develop an effective educational system that informs employees about the dangers of password and account sharing. Explain why security is important and essential to the functions of the company, and how they can contribute to the security through their everyday actions.
Though there is an upfront investment in taking the time and effort to put better security measures in place, the return on investment is massive when mitigating the likelihood of incidents with departing employees, which can cause untold damage to company assets and reputation.
Considering Crowdfunding? Check out The Ultimate Guide to Crowdfunding
If you haven’t heard of crowdfunding by now, it’s not too late. Even if you have heard of it, you might not really understand it. The Ultimate Guide to Crowdfunding is your one-stop source for a lot of information on crowdfunding, successful crowdfunding projects, and the best sources/sites for crowdfunding. The Ultimate Guide to Crowdfunding is an infographic that has hyperlinks to more information about each topic, each source, and each story behind it.
At the top of the infographic, there are links for finding out exactly what crowdfunding is and an analysis of whether it’s right for your business.
On the infographic, you also have a profile of 14 of the top crowdfunding sites with an associated review and a success story.
One thing to note about crowdfunding is that you have to be motivated to raise your funds. It’s not a “set it and forget it” type of thing. And I want to warn you, the results in the success stories are not typical. They are big success stories. For all the projects that get funding, thousands more do not.
Kickstarter, for example, might be the biggest name out there, but in my opinion, it’s the worst of the lot because of its ‘all or nothing’ funding scheme. Again, in my opinion, Indiegogo is a much better site for funding those types of projects. I’ve seen too many good projects go unfunded on Kickstarter that would have benefitted from Indiegogo’s partial funding successes.
In other words, if you setup a $50,000 campaign on Kickstarter and you receive $49,999, you get $0. With Indiegogo, you get $49,999 or however much your contributors pledged toward your campaign. There’s also the problem of non-payment on some of these platforms. Some, like Kickstarter, take the pledges and hold them in escrow until the end of the campaign.
I have yet to use a crowdfunding site for any of my projects, although I’m pondering doing so within the next few months. I have contributed to a number of successful and unsuccessful campaigns on Kickstarter and on Indiegogo.
To setup a crowdfunded project, you have to offer your contributors ‘perks.’ Perks are tokens of your appreciation and incentives for people to contribute to your project. I usually don’t take the perks because I want the artists to receive all the funds I send them without strings and I don’t want them hassled with having to worry about perks when they should focus their energies on the projects that I’m funding.
Crowdfunding can be a great way to get your ideas off the ground, but remember that your contributors will hold you accountable for their earned perks and the project itself, so you’d better be prepared to deliver.
Generally, there’s no payback associated with crowdfunding, although I haven’t checked out all 14 of the sites listed on the infographic. The payback is the project. People like to contribute to something that’s bigger than themselves. Some people, like myself, like to contribute to artists and filmmakers to see just what’s possible through donations. It gives me the power to help people realize their dreams that otherwise they might not have the opportunity to do so.
If I ever win the lottery, I will set aside a portion of the money for artistic projects and endowments. I think that there’s no greater achievement in this world than to create. Whether it’s a mural in the ‘hood’ or a feature-length film, I want to see it happen.
But, this isn’t about me. It’s about the projects and their creators. Crowdfunding is an excellent way to put something into action. If you have the money, go to some of the listed sites, pick some projects, select your perks (if you want them), and fund some hope. If you, on the other hand, are someone who has a project in mind that crowdfunding is a fit for, sign up on one of the sites that’s appropriate for your project and get busy.
Remember that the perks you offer can be very small, such as mention on a website as a contributor. But, as the amount of contribution rises, so do the perk values. Some people offer all expenses paid trips to large contributors, special privileges to the project, part ownership, or some other creative perk. While this is not a review of one particular site/system over another, crowdfunding is a thing and it’s a good thing.
Your mission, should you choose to accept it, is to sign up, log on, create your campaign, develop your perks, and get busy on that project. And one of the ancillary requirements of your campaigns is that you let me know about them. No, I’m not kidding. I’ll even help fund some of them.
I’d like to thank Choice Loans for sharing this infographic.
Buyer Beware: The Hidden Costs of Free Software for Nonprofits
y Gretchen Barry, of NonProfitEasy.comCloud is Reshaping the World of Business for SMBs
On Thursday, June 26, I participated in an hour-long IBM Business Insider Spreecast titled, “Cloud: Reshaping the World of Business,” where host Paul Gillin led the panel through a series of questions and thought points concerning Cloud and small to medium-sized businesses. There was also an associated Twitter Chat that used hashtag, #SMB4Cloud, that I participated in during the event. Though you can’t attend the live event now, you can click the link above and connect to the Spreecast and gain insight into the discussion that we had.
There were a few major highlights that sprang from the panel and participants. First, is the concept that mature businesses move slower to adopt new technologies than their newer counterparts do. Startups are especially onboard with new technologies, such as cloud computing, cloud storage, and Infrastructure as a Service (IaaS). Startups don’t always have the capital to purchase infrastructure and data center space that can run into the millions of dollars for the kind of computing power required to run high capacity applications, to store big data, to maintain a potentially huge number of customers, to supply adequate bandwidth, and to provide 24×7 service uptimes.
Startups have to leverage cloud computing, IaaS, and new technologies in order to get into the market and compete effectively against established businesses.
Second, cloud computing allows companies, at any stage of development, to get to market faster than is possible with traditional computing infrastructure. Provisioning times with IaaS is measured in minutes rather than in weeks or in months.
Third, using a cloud provider or managed service provider (MSP) allows a company to use expertise that might not be available within the company. MSPs also allows companies to leverage these skills that might be out of their salary range. SMBs can effectively compete on a scale and at a speed that wasn’t possible just a few years ago. Only large companies could move infrastructure, people, and skills fast enough and on a large enough scale to take on significant contracts. Cloud computing has opened up new possibilities and expanded business opportunities for SMBs.
Fourth, cloud computing offers a high level of simplicity for SMBs. There are services available that are very easy to use. If the business doesn’t require a lot of customization or specialized services, then cloud usage can be as simple as a few mouse clicks, which allows SMBs to use current employee skillsets to step into cloud services without the complexity.
Finally, the cloud transforms IT people into business people. Fixing computers and troubleshooting problems now shifts to a provider. IT people are now becoming more focused on business outcomes, customer satisfaction, and business growth rather than day-to-day break/fix and operational objectives of running an IT shop.
Panelists:
Paul Gillin – Paul Gillin Communications, Host.
John Mason – General Manager, Midmarket at IBM.
Laurie McCabe – Co-founder and Partner, The SBM Group.
Subbu Balakrishnan – CTO and Co-founder, Good.co.
One of the panelists noted that, “Cloud works for DIY and “Do It For Me” businesses alike.”
That statement covers the gamut of what cloud computing can do for businesses at whatever comfort or expertise level they have at their disposal. Although it’s difficult for some IT people, even CIOs, to see is that if your company isn’t an IT company, then there’s no reason to be in the IT business. Cloud makes it possible to be in the business you’re in, but have the computing power you need to run your business without becoming an IT business.
The conclusions from the Spreecast and the Twitter Chat can be summarized as the following:
- Established businesses must embrace cloud computing to remain relevant
- Startups and young businesses use new technologies and adapt faster
- Cloud computing enables a faster startup and faster presence for new services
- Cloud computing is transforming IT from a service to a business quality organization
- IaaS significantly shortens infrastructure provisioning times
- Cloud computing allows businesses to focus on business rather than on IT
Cloud computing, for some, is quite controversial, but few would argue that cloud isn’t transformative and a paradigm shift from business as usual. Businesses that want to remain relevant and those that want to become agile, or even virtual, should examine the possibilities of what cloud can offer them.
If you’re considering cloud computing for your business, check out IBM’s Cloud Computing Marketplace.
This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet.
I’ve been compensated to contribute to this program, but the opinions expressed in this post are my own and don’t necessarily represent IBM’s positions, strategies or opinions.
IBM’s Entry into Software-Defined Storage: Elastic Storage
By now, everyone has heard of the hot new buzzword: software-defined data center (SDDC). SDDC is the new data center paradigm where everything is software-defined: network, computers, and storage. Yes, there’s underlying hardware making the whole thing possible but what do software-defined resources really do for us? The answer is simple: It abstracts hardware into pooled resources that users can partake of in discreet slices for cloud applications and for cloud workloads.
But the real story here is IBM’s venture into software-defined storage that it calls Elastic Storage. On May 12, 2014, IBM announced a portfolio of software defined storage products that deliver improved economics at the same time they enable organizations to access and process any type of data, on any type of storage device, anywhere in the world. Elastic Storage offers unprecedented performance, infinite scale, and is capable of reducing storage costs up to 90 percent by automatically moving data onto the most economical storage device.
For example, if a company has data that’s accessed infrequently, that data will be moved to tape or to low cost disk systems for archiving. Alternatively, data that’s accessed regularly or that requires high speed access will be moved to flash storage. Data redistribution is based on policy-driven rules and data analytics. This type of automated data movement shows cost savings of up to 90 percent.
“Born in IBM Research Labs, this new, patented breakthrough technology allows enterprises to exploit – not just manage – the exploding growth of data in a variety of forms generated by countless devices, sensors, business processes, and social networks. The new storage software is ideally suited for the most data-intensive applications, which require high-speed access to massive volumes of information – from seismic data processing, risk management and financial analysis, weather modeling, and scientific research, to determining the next best action in real-time retail situations.”
Elastic Storage features and benefits:
- Enhanced security – Protects data on disk from security breaches, unauthorized access, or being lost, stolen or improperly discarded with encryption of data at rest and enable HIPAA, Sarbanes-Oxley, EU, and various national data privacy laws compliance.
- Extreme performance – Server-side Elastic Storage flash caches speed IO performance up to 6X, benefitting application performance, while still enjoying all the manageability benefits of shared storage.
- Save acquisition costs – Uses standard servers and storage instead of expensive, special purpose hardware.
- Limitless elastic data scaling – Scale out with relatively inexpensive standard hardware, while maintaining world-class storage management.
- Increase resource and operational efficiency – Pools redundant isolated resources and optimizes utilization.
- Achieve greater IT agility – Quickly reacts, provisions and redeploys resources in response to new requirements.
- Intelligent resource utilization and automated management – Automated, policy-driven management of storage reduces storage costs up to 90% and drives operational efficiencies.
- Empower geographically distributed workflows – Places critical data close to everyone and everything that needs it, accelerating schedules and time to market.
As for performance, IBM’s Elastic Storages boasts the capability of scanning over 10 billion files on just one cluster in less than 45 minutes. This type of performance as extreme implications for analytics and big data applications. IBM’s Elastic Storage solution is built for performance for big data and is based on the same technologies used in the Watson computer.
“Elastic Storage offers unprecedented performance, infinite scale, and is capable of reducing storage costs up to 90 percent by automatically moving data onto the most economical storage device.”
Part of Elastic Storage’s performance enhancement is due to IBM’s parallel data access technology: (General Parallel File System (GPFS). It eliminates the performance bottlenecks and so-called “choke” points of other data access algorithms and technologies.
What it all means is that now you have the same capability to access, analyze, and report on huge data sets in a fraction of the time it used to take to perform these analyses as large companies have. Elastic Storage puts the data where it needs to be to best serve you and your data requirements at a tremendous cost savings.
IBM Elastic Storage supports OpenStack Cinder and Swift interfaces. IBM is a platinum sponsor of OpenStack Foundation and is now its second most prolific contributor. It also supports other open APIs, such as POSIX and Hadoop.
This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet.
I’ve been compensated to contribute to this program, but the opinions expressed in this post are my own and don’t necessarily represent IBM’s positions, strategies or opinions.
The Hornet’s Nest Movie: Tribute Video
If you haven’t seen the movie, “The Hornet’s Nest,” you should as soon as it’s available in your area. It’s one of the most powerful movies I’ve ever seen. It’s the year long story of veteran war correspondent Mike Boettcher’s embedded adventures with the US military in Afghanistan. The sounds, the action, the scenes, the bullets, and the bombs are all real. The Hornet’s Nest is a slice of life from the war in Afghanistan.
During the course of the movie, Mike Boettcher captures some of the most compelling war footage ever seen. And he also captures moments with his son, Carlos. Early in the film, you’ll hear panic in Mike’s voice when Carlos is pinned down by enemy fire. Bullets buzz by like bees. Bullets hit the trees just in front of Carlos and his life is in real danger.
One mission takes Mike and a platoon into the hornet’s nest. A two-day mission that stretches into nine. Exhaustion, fear, and casualties take their toll on the group.
Perhaps the most emotional moments in the film, though, are near the end at the muster. As the Sergeant Major calls roll, you can see the pain of battle in young men’s and young women’s faces.
If you see this film, you’ll never forget it. And you’ll know why young men’s dreams are haunted by battle scenes. The range of emotion you’ll feel in this movie span everything from fear to sadness to relief to happiness. Watch all the way to the end for outtakes and tributes to the men and women who’ve made the ultimate sacrifice in service to the United States of America.
Every parent who watches this movie will go home and hug his or her children or call the ones that aren’t close enough to touch. You’ll never be the same after watching it.
It’s rated R for language and violence.
I think everyone should see this movie.
My personal message to the people of Afghanistan:
I’m sorry for what’s been brought upon you and your families. I believe that you want the same things we want: to worship God, to enjoy your families, to work, and to live peacefully without any person imposing his will on you and your people. Please know that the American people mean you no harm nor wish you any ill will. We are not your enemy and we want you to be free from oppression. Our hearts go out to yours.
May Allah protect you and bless you all the days of your life.
The Story of Storlets: IBM’s Computational Storage Model
Cloud storage vendors generally use commodity servers as the underlying storage nodes that serve large data sets to users. IBM leverages storage node processing capabilities to execute computational modules, namely storlets, close to where the data is stored. The Storlet Engine provides cloud storage with the capability to dynamically upload storlets and execute them in sandboxes that insulate the storlets from the rest of the system and from other storlets.
Interestingly, IBM proposes that a Storlets Marketplace can be used as a repository of storlets from different vendors. An application on top of the storage can mash-up and use various storlets from the marketplace to create its logic and functionality.
Storlet Benefits:
- Reduced WAN bandwidth used from fewer bytes transferred
- Enhanced security through decreased data exposure
- Cost savings from reduced amount of infrastructure
- Compliance support from improved provenance tracking
The definition of a storlet is a bit elusive but can best be described as a unit of computation where required computations are brought to the data, instead of the other way around. Storlets can analyze each object and extract its metadata, including size, subject, resolution, format, and more. Storlets are dynamically loaded code. Perhaps the primary researcher and developer of storlets, Michael Factor, Distinguished Engineer and expert on Storage Systems at IBM Research in Haifa, Israel can explain in his own words:
“A new method of storing information is called object storage. This approach stores information as objects. Each object contains the data (the bits and bytes of our documents, movies, images, and so forth), together with metadata that holds user- and system-defined tags. These smart data objects include rich information – or metadata – that describes the content of the data, how the object is related to other objects, how the data should be handled, replicated, or backed up, and more.
Although object storage can store objects, manage them, protect them, and so on – it doesn’t by itself dramatically increase the rate at which we can extract value from objects. But what if we could turn a software-defined object store into a smart storage platform?
Storlets bring the computation to the data
A new research prototype called “storlets” holds the promise of greatly increasing the value we get out of storage and the speed at which we can access what we need. A new software-defined mechanism, storlets allow object storage to move the computation to the data, instead of the system having to move the data to a server to carry out the computation.”
The significance of storlets might not be immediately apparent but the real value is that the technology allows you to process data where it’s stored. This means that there’s no over-the-network data transfer, which saves both time and money.
“Our vision is to reduce costs, increase flexibility and improve security by turning the object store into a platform, and allowing the functionality of the object store to be extended using software.”
Also known as “computational storage,” storlets introduce stored procedures for storage cloud which provide the ability to run computations (“storlets”) safely and securely, close to the data in the cloud. Storlets typically run in a sandbox, loaded as objects and triggered by events on objects (e.g., put/get) or on their associated metadata attributes.
IBM researchers in Haifa, Israel have been working on prototyping storlets for several years in the context of European Union Research projects such as ENSURE, VISION Cloud, and Forget IT.
You can view the entire 1:31 hour video that covers IBM’s software-defined storage offerings and research.
This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet.
I’ve been compensated to contribute to this program, but the opinions expressed in this post are my own and don’t necessarily represent IBM’s positions, strategies or opinions.
Clearing the Air about Windows XP’s Life Extension with 2X Software
Some people thrive on controversy. I am not one of those people, although I’m no stranger to it. On May 2nd, I posted a story on my ZDNet Consumerization blog titled, “Here’s how to extend the life of Windows XP indefinitely.” Currently, there are 75 comments and not all of them are pro Windows XP life extension. In fact, I endured a few hours of a Twitter battle about some of the product features discussed in the article covering 2X Software’s 2xLifeCyclePlus.
One of the “controversial” points was whether the 2XLifeCyclePlus product is or is not a Windows XP replacement shell. It is a Windows XP replacement shell. The shell replacement is meant to mitigate the problems arising from the fact that Microsoft no longer supports Windows XP. No longer supports means that Microsoft will no longer provide security updates, patches, or service packs to the now outdated operating system.
Who knew there could be so much controversy and angst over helping people to save money and extend the life of a beloved product? I, for one, did not.
Who knew that a project that I believe is basically commercial philanthropy could cause problems for so many otherwise normal people? Again, not I.
Several of the virtual chalk wielders stated that XP users should just “let go” of XP and let it die. To prolong it is more cruel than just sending it into the annals of history. Those who have to spend profits to accommodate Windows 7 or Windows 8 in their environments is also very cruel, especially when they already have something stable, usable, and low maintenance to use.
In this podcast, Scott Sims, 2X Software’s Sales Director, and I discuss the 2XLifeCyclePlus product and its features plus its relationship to the 2X Application Server XG product, which is similar in function to the Citrix Presentation/Application Server but at approximately 25% of the cost.
Podcast Info:
Format: MP3. Length: 13:19 mins. Rated: G
Twitter: @2XSoftware
Watson’s Mobile Challenge: What could it mean?
By now you’ve probably read all about IBM’s Watson Mobile Developer Challenge, but what you might not know is what the long term implications of such a challenge are. The primary implication is that mobile developers will be able to tap into the power of Watson via mobile applications or apps. I know it sounds like a cliché, but the implications of the mobile to Watson connection are only limited by developer ability and imagination.
I had the pleasure of speaking with Carlos Paez, IBM’s Lead Mobile Developer, MobileFirst Global Center of Competency. Carlos will be developing some reference applications to help challengers get started on creating mobile apps. You can watch the IBM Watson Mobile Developer Challenge Virtual Roundtable video (below) to get a full explanation of what’s going into the challenge and how it works.
[youtube http://www.youtube.com/watch?v=nQCfzYNHqow%5D
The video is 32:31 minutes long and also features Jen Knecht, Director for IBM MobileFirst Marketing, Sridhar Sudarsan, CTO for IBM Watson Ecosystem, Ron Norman, Chief Architect for IBM Mobile Innovation Labs.
And now back to the implications of this challenge and what it could mean for developers and users alike.
One significant implication is for driver-assisted navigation. For example, if you’re travelling by car, you could ask the app about weather reports, road conditions, hotels, gas stations, restaurants, rest areas, and points of interest without ever looking away from your steering wheel.
For television watching, not only could the app learn your watching habits, but it could also steer you toward shows and series that you want to watch based on a question such as, “I’d like to watch a comedy starring Steve Martin.” In seconds, the app would display a list of those comedies in order according to your watching habits and preferences.
Emergency responders could use an app to diagnose and treat trauma patients in car accidents, in fires, or in natural disasters. More lives could be saved and shorter recovery times might be possible by giving the proper treatment to patients in the field.
In education, a Watson-powered app could be used to drill students prior to an exam or to assist students in learning a new language. Teachers could use an app to create adaptive tests for students to assess their level of achievement on a particular topic.
“The power of Watson in the palm of your hand is a game-changing proposition, so we’re calling on mobile developers around the world to start building cognitive computing apps infused with Watson’s intelligence,” said Mike Rhodin, Senior Vice President, IBM Watson Group.” Imagine a new class of apps that deliver deep insights to consumers and business users instantly — wherever they are — over the cloud. It’s about changing the essence of decision making from ‘information at your fingertips’ to actual insights.”
But not every example of a Watson-based app has to be so practical. One could design an app to help predict March Madness outcomes or to narrow down the possibilities in a dream team challenge.
I see this new era of computing as expanding the possibilities for intelligent applications. It will allow humans to interact with computers in a natural way, via spoken or unspoken language. Wouldn’t it be cool if someone could write an app that would watch a deaf person using sign language and interpret those gestures into spoken words to a listener on the other end of a telephone conversation?
The Watson Mobile Challenge is an opportunity for creative thinkers to really show the power of their own innovative ability plus unleash the power of a supercomputer via a mobile app.
From IBM:
The IBM Watson Mobile Developer Challenge is part of the IBM MobileFirst strategy to help businesses of all sizes adopt mobile technology to better engage with customers and extend their businesses to new markets. The news also represents the latest milestone in the newly formed IBM Watson Group to fuel an ecosystem of developers, start-ups, tech companies and venture capitalists building Watson powered apps as part of the Watson Developers Cloud.
To date, more than 1,500 individuals and organizations have contacted IBM to share their ideas for creating cognitive computing applications that redefine how businesses and consumers make decisions. In fact, global developers have created and plan to go to market in 2014 with Watson apps across a variety of industries.
This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet.
I’ve been compensated to contribute to this program, but the opinions expressed in this post are my own and don’t necessarily represent IBM’s positions, strategies or opinions.
Infrastructure Matters: Cloud Infrastructure Socialcast
This post is based on the Infrastructure Matters Socialcast panel discussion that focused on midsize business cloud infrastructure. The panel included in this Socialcast is host Paul Gillin, Scott Hawkins, Cal Braunstein, and John Alday. The Infrastructure Matters Socialcast is a one-hour video discussion about key topics facing midsize businesses concerning IT infrastructure, infrastructure outsourcing, cloud solution costs, and the changing nature of information technology.About The PanelistsPaul Gillin – A veteran technology journalist and a thought leader in new media. Since 2005, he has advised marketers and business executives on strategies to optimize their use of social media and online channels to reach buyers cost-effectively.Cal Braunstein – Chairman/CEO and Executive Director of Research at Robert Frances Group, Inc. (RFG). RFG provides concierge advisory, consulting, and research services to business technology executives as well as to marketing/sales management for companies that provide IT communications services and products.Scott Hawkins – IBM’s Program Director of X86 and Pure Systems Solutions organization.John Alday – CEO of Cima Solutions Group (CSG). CSG delivers reliable and efficient IT solutions that create financial value for their clients. CSG offers its clients technology solutions from manufacturers such as IBM, VMware, Google, FalconStor, Compellent, Scale, and others.

This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet.
I’ve been compensated to contribute to this program, but the opinions expressed in this post are my own and don’t necessarily represent IBM’s positions, strategies or opinions.

You must be logged in to post a comment.