Two studies made by SAP and Microsoft brings light to the long standing economic crisis as cloud computing creates jobs and fuels the business market. Sand Hill Group who conducted the study said that the trendsetters for cloud computing will be the mobile cloud, data storage and social networking. The group said that the influence…

CloudTimes is proud to announce the sponsorship of the upcoming Data 2.0 Summit in San Francisco. The summit will be held on April 3rd, 2012 and is the largest Cloud Data conference in 2012. Why is the next technology revolution a Data Revolution? Connect to speakers from Microsoft, Yahoo, Salesforce Data.com, Experian, Intuit, Battery Ventures,…

Startups, we want to hear your pitch at the Satellites! Featuring the most promising startups in Asia. A 6 city hunt, and we are putting you in our sights. Satellites are the most important prelude in a promising startup’s journey to Echelon 2012, Asia’s longest running web tech conference. Pitch at the Satellites, which will…

CloudTimes is pleased to be supporting the Cloud Analytics Summit which will provide an executive forum for corporate decision-makers to learn about the latest Cloud-based business intelligence (BI) and analytics solutions and strategies that can help them harness their ‘Big Data’ sources and integrate their systems and applications into a more productive enterprise-wide resource to achieve their corporate objectives. The Cloud…

Last year, billions where spent on deals between the enterprise and emerging companies.  Visa invested in Square, Jive partnered with SalesCrunch, Salesforce acquired Rypple and the list goes on and on.  Partnerships, investments, and acquisitions seem rampant when you read the tech blogs, however, startups will tell you it’s not exactly reality. Finding the right…

Small and medium businesses are increasingly challenged to provide comprehensive security for their mobile infrastructures without sacrificing the productivity it was designed for in the first place. For many, the problem is not so much about understanding the primary security issues, such as prevention, detection and response, but rather how to provide that type of…

Traditional IT projects have followed a “Define-Design-Develop-Deploy” mindset, where most or all of the computational resources were owned, operated, and maintained by the developing organization. Cost estimates for system acquisition were often wrong, and virtually always unrealistically low.  Some of the reasons for the inaccurate forecasts included: Changing requirements; cost increases from system production changes;…