CloudTimes is proud to be a media sponsor of this year’s TC3 conference, organized by the Telecom Council. Telecom’s most important innovation strategy executives will gather this September for TC3 2013:  A 2-day summit which highlights the relationship between the companies building communication networks, with the people innovating new solutions, services, and applications. 400+ telecom…

VMware vCloud Hybrid Service will be the first and so far the only cloud provider that will be fully SUSE Linux Enterprise Server ready before the year-end. The partnership was announced by the vice president for global alliances and marketing for SUSE, Michael Miller. The alliance was made to make SUSE Linux Enterprise more appealing…

With a bright idea and a credit card, hundreds of startups and small businesses have launched and scaled in the last few years thanks to affordable cloud solutions like Amazon, Box, and Salesforce. The cloud continues to deliver these advantages today, but it now has credible story to tell prospective customers in the enterprise, and…

By Vic Nyman “Cloud Computing!”  Is it the savior of IT or the bane of our existence?  Cloud computing has extreme potential, especially for achieving operational efficiencies and cost savings.  Unfortunately, with that potential is the potential for business disaster – outages in places you can’t control impacting customer satisfaction or even sales results.  Imagine…

People are accustomed to using their beautifully-designed and easy-to-use productivity tools in their everyday life. As employees, they now have the same expectation for their work environment. Companies are allowing employees to use their own devices (BYOD) and adopt low-cost SaaS-based solutions to save IT substantial costs but this now renders concerns around security and…

by Erik Grueter What if your software could detect when it was under attack? What if files reported when, where and by whom they were opened? Intelligent digital assets are behind an agile new security style called Information Based Security.  Developed in response to an increased use of file sharing services, personal devices, and niche business applications….

Now that cloud computing technology has already gone past the infancy stages, many industries have already realized the benefits it provides, and have already started adopting and integrating the technology to their businesses. One key sector that stands to benefit a lot from the cloud is marketing, as it has the ability to drastically change…

Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add to this array…