What is the future of Big Data?

Posted on August 18, 2016 by

Big data has seen big growth during the past few years. But what is it? Google simply says it’s “extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.” But big data can never be that simple. Rather than just providing information about people’s beliefs through something such as an election vote, big data also gives insight about people’s behaviors—who they are, who they associate with, the things they …

What is shadow IT?

Posted on August 10, 2016 by

Causes of shadow IT Let’s say you’re an employee at a medium size organization, and you’re doing some internet surfing when you come across a new application that allows you to share and store your documents more easily than your current one—and you can connect it to any email account. You’ve been looking for just such a solution! You immediately download it and tell your colleagues about it, and they think it’s the best thing since sliced bread. You start …

After Safe Harbor, the international data transfer law used by the U.S. and the European Union, was invalidated in October 2015, the Department of Commerce and the EU Commission worked to draft a new agreement that gave Europeans more rights about their personal information in the U.S. On July 12, the EU-US Privacy Shield law was passed. Why did this agreement come about in the first place? When the EU Court of Justice ruled Safe Harbor invalid, it had two …

What does the future look like to you? Does it include flying cars and meals in the form of pills? Will we no longer have diseases to worry about, or will robots be serving our every whim? Maybe it’s not quite like the Jetsons now, but thanks to the Internet of Things, that future is coming faster than you think. In a nutshell, the Internet of Things allows anything with a WiFi connection to be connected to the Internet. This …

There is a fundamental shift happening to IT right now, and it’s changing the way we think about the department: IT as a Service. What is it? It’s an organizational model that corporate and internal IT departments must recognize and adapt to or risk falling behind the curve. But how has this concept revolutionized the industry? Internal IT has changed because its role in business has changed–drastically. Historically, IT has been viewed as a cost center, slow to respond, and …

You already know that there are three major types of clouds: Public, Private and Hybrid. Now, there’s a newer player in the game: Virtual Private Clouds. What makes these different from public and private clouds, and what is the benefit? Is it just a fancy name for public cloud, or is it a private one? Virtual Private Clouds (VPC) are related to the public cloud, but they are not the same. Instead of sharing resources and space in a public infrastructure, …

Picture this: The second quarter of 2008. My sales vice president and I were doing a pipeline review with our sales team. Every person reported that most of their IT disaster recovery opportunities were in a holding pattern. Companies were defunding DR in preparation of tough economic times. In other words, our prospects were saying disaster recovery was not necessary to continue collecting revenue. Why was this important in our Q2 2008 pipeline meeting? Because as the bottom fell out …

The European Commission has announced the new EU-US Privacy Shield law, which replaces Safe Harbor effective immediately. The new ruling addresses European concerns about US access to the data of Europeans and gives Europeans more options to file concerns regarding the use of their data. U.S. companies may certify compliance beginning Aug. 1. Tech companies praised the new agreement, saying it restores trust that’s needed after the Edward Snowden leaks of 2013. “Our members are ready to implement the new …

Recently, Yan Ness and Bill Frohriep of Online Tech held a thought leadership event with a dozen business and IT executives at the Grosse Pointe Yacht Club. The main topic on the agenda was Shadow IT, or “IT behind the scenes.” Shadow IT refers to companies who implement IT projects without the department’s knowledge (or permission, in some cases), usually because the internal IT department is too slow or doesn’t have enough resources to respond to requests. An example of …

A key component of a successful disaster recovery plan is testing it. Testing once a year is usually not enough, and you’ll want to make sure you can run a proper failover when you need to. A failover is when you move from one environment to another. In disaster recovery terminology, it’s used to mean the transfer from a production environment to a recovery one. A failover is a huge process, and there are many complications that can arise from it. …

Get started now. Exceptional service awaits.

Live Chat