Can You Trust Your Current Operating System to Protect You?
Software, including operating systems, increases your level of assurance in the environment and can mitigate – if not remediate – most of the exposure from the...
Living in the Cloud: Cool vs. Critical
The critical elements you need to fully understand before living in the cloud are the physical attributes of the cloud center: staffing, patrols, power,...
Nothing New in Cloud Security
Many in the business and academic communities have been up in arms that security risks are too high in cloud implementations, and therefore the...
IT – The New Business Unit
Over the past few weeks I have been in a number of meetings with current and prospective customers talking about the growth challenges they...
How to Secure Federal Data in the Cloud
Yesterday we discussed how predictive analytics and big data will be critical components of the 2012 bid for the White House. Today we will...
Expanding Universe of Events…
Forrester analyst Jon Rymer is asking for examples of increasing volumes of events being exploited in companies.
We've gathered examples from logistics and supply chain...
Example of Events in the Cloud… tibbr
A few months ago we speculated that events (and event processing) "in the cloud" would probably appear best suited to some social networking type...
Cloud Governance – a CEP Application?
EBizQ had an article on cloud governance that raised the issue of the particular needs for governance in cloud applications: if you are to...
Community and Cloud Event Processing…
A post on exploiting (in this case for air quality monitoring) the ultimate live sensor grid - the world's cellphone population - reminded me...
NOW looking into the cloud, as well as CEP
Not really too CEP-related, except that events and event processing can take place anywhere: TIBCO's Cloud Computing initiative is an announced agenda item for...