<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5365295076574010086</id><updated>2026-04-08T03:26:45.390-04:00</updated><category term="Technology"/><category term="Cloud Security"/><category term="Social Media"/><category term="#ThoughtLeadership #LeadGeneration #MarketResearch #MATServices #BusinessGrowth #SurveyStrategy"/><category term="Marketing"/><category term="APPLE"/><category term="Product Management"/><category term="box.com"/><category term="dropbox"/><category term="file sharing"/><category term="microsoft"/><category term="Big Data"/><category term="Cisco"/><category term="MAC"/><category term="US Warrant"/><category term="hacking"/><category term="jailbreak"/><category term="legal"/><category term="malware"/><title type='text'>Today&#39;s Cloud - cloud computing | cloud issues | cloud blog</title><subtitle type='html'>A Cloud Discussion about Technology, Security, Product Design, Marketing and Social Media.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>43</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-57254689157914669</id><published>2025-10-08T16:24:00.001-04:00</published><updated>2025-10-08T16:26:00.990-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="#ThoughtLeadership #LeadGeneration #MarketResearch #MATServices #BusinessGrowth #SurveyStrategy"/><title type='text'>Cloud Budgets on the Rise — What Your Next IT Survey Should Ask in 2025</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;In 2025, the cloud conversation has changed. What was once
about &lt;i&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+cloud+migration&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;migration&lt;/a&gt;&lt;/i&gt; is now about &lt;i&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+cloud+optimization&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;optimization&lt;/a&gt;&lt;/i&gt;. According to a recent
survey of 500 U.S. IT decision makers by Wanclouds, &lt;b&gt;89% of organizations
plan to increase cloud budgets this year&lt;/b&gt;, and &lt;b&gt;84% are operating in
hybrid or multi-cloud environments&lt;/b&gt;. Yet nearly two-thirds say that cost
optimization is their top priority, an intriguing contradiction that reveals
how organizations are thinking about growth and efficiency simultaneously.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;strike style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;286&quot; data-original-width=&quot;430&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiOZxp-yfMsYscJrkQQsbICuO1-U3dYDRWlMDfVIZLd7DJ0ZbHpvwC_mwNvm3qfcIcJTHevSM9sSOgZx4JZC-AIolf-AJGSk2YjcU7iFDsb1oFLz7WZKG4FE4L1iIJqTlRxsF3bt21XtNGfOzoSWRunVwbJOLweNguFnrBGEW2pPh7PP33hcDtEBrpns_o8&quot; width=&quot;320&quot; /&gt;&lt;/strike&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;That paradox presents an opportunity, not just for cloud
providers, but for anyone building technology products or services that depend
on understanding what IT leaders are actually struggling with. The best way to
uncover those insights? Ask them directly.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Why Cloud Spending Is Growing — and Why That Matters&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Cloud budgets are expanding for several reasons:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;AI
     adoption is accelerating.&lt;/b&gt; &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=Generative+AI+examples&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;Generative AI&lt;/a&gt;, model training, and data
     pipelines are driving new demand for compute and storage.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Hybrid
     work remains entrenched.&lt;/b&gt; Organizations continue to invest in cloud
     collaboration, security, and monitoring tools.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Regulatory
     complexity is increasing.&lt;/b&gt; Enterprises are balancing innovation with
     compliance, often requiring specialized cloud environments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;But these same forces make visibility, cost control, and
accountability more difficult. The rise of &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+shadow+IT&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;shadow IT&lt;/a&gt; and overlapping SaaS
contracts means CIOs need better data, and better questions, to guide
investment decisions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;A well-designed survey can help surface those answers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;What to Ask in Your Next IT Decision-Maker Survey&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;If your business serves the IT, cloud, or SaaS ecosystem,
now is the time to engage your audience with a 2025 sentiment survey. Here are
five questions to include:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ol start=&quot;1&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Budget
     Direction:&lt;/b&gt;&lt;br /&gt;
     “How is your organization’s cloud budget changing in 2025 compared to
     2024?”&lt;br /&gt;
     → Reveals whether respondents are expanding, maintaining, or cutting
     budgets, key for market forecasting.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Optimization
     Priorities:&lt;/b&gt;&lt;br /&gt;
     “Which &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+cloud+cost+optimization&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;cost optimization&lt;/a&gt; strategies are you currently exploring (e.g.,
     &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+FinOps&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;FinOps&lt;/a&gt;, AI-based monitoring, contract consolidation)?”&lt;br /&gt;
     → Highlights trends and solution opportunities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Multi-Cloud
     Maturity:&lt;/b&gt;&lt;br /&gt;
     “How many public cloud providers does your organization actively manage?”&lt;br /&gt;
     → Indicates how complex the average deployment is, and where integration
     pain points may lie.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; tab-stops: list .5in;&quot;&gt;&lt;b&gt;AI
     Integration:&lt;/b&gt;&lt;br /&gt;
     “Are you using AI or machine learning to optimize your cloud
     infrastructure or application performance?”&lt;br /&gt;
     → Captures awareness and adoption trends around emerging tools.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo2; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Vendor
     Expectations:&lt;/b&gt;&lt;br /&gt;
     “What factors most influence your satisfaction with cloud vendors, price,
     performance, support, or innovation?”&lt;br /&gt;
     → Helps vendors refine positioning and product roadmaps.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;From Data to Direction&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Collecting data is only the first step. The true value comes
from &lt;b&gt;interpreting what that data says about market direction&lt;/b&gt;. Are
customers looking to consolidate vendors? Do they trust AI-driven optimization
tools? Are cost constraints pushing innovation to the edge?&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Surveys give you early visibility into those shifts, long
before they show up in sales data or renewal trends. When analyzed properly,
they inform go-to-market strategy, content planning, and even pricing
decisions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Let &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=MAT+Services+IT+survey+programs&amp;amp;bbid=5365295076574010086&amp;amp;bpid=57254689157914669&quot; target=&quot;_blank&quot;&gt;MAT Services&lt;/a&gt; Help You Listen Smarter&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;At &lt;b&gt;MAT Services&lt;/b&gt;, we specialize in building custom
survey programs that turn feedback into foresight. From IT buyers to healthcare
executives, we design questions that illuminate what your customers need next,
and translate those insights into action.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Stop guessing what your market wants. Start asking the
questions that matter.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Emoji&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;📊&lt;/span&gt; Learn more at
MATServices.com&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/57254689157914669/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2025/10/cloud-budgets-on-rise-what-your-next-it.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/57254689157914669'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/57254689157914669'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2025/10/cloud-budgets-on-rise-what-your-next-it.html' title='Cloud Budgets on the Rise — What Your Next IT Survey Should Ask in 2025'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEiOZxp-yfMsYscJrkQQsbICuO1-U3dYDRWlMDfVIZLd7DJ0ZbHpvwC_mwNvm3qfcIcJTHevSM9sSOgZx4JZC-AIolf-AJGSk2YjcU7iFDsb1oFLz7WZKG4FE4L1iIJqTlRxsF3bt21XtNGfOzoSWRunVwbJOLweNguFnrBGEW2pPh7PP33hcDtEBrpns_o8=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-9070081149498433034</id><published>2025-09-29T09:18:00.004-04:00</published><updated>2025-09-29T09:18:31.210-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="#ThoughtLeadership #LeadGeneration #MarketResearch #MATServices #BusinessGrowth #SurveyStrategy"/><title type='text'>Stop Guessing: Let Your Customers Shape Your Next Big Move</title><content type='html'>&lt;p&gt;&amp;nbsp;In today’s hyper-competitive landscape, product decisions
can’t be left to guesswork. Yet too many companies still roll out features,
offerings, or even full product lines based on assumptions rather than customer
validation. The result? Wasted resources, missed opportunities, and sometimes,
painful missteps that could have been avoided.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgpGoNV3JZ4N-sM2DSHHulZ61L-nfiZwAJCpDqomziFeGFPmibc1WzDln1BcQJ2TaGrilgBXuNiOrzRWQE6Kdk20Zs4uj1OR1vGCuWP1XLof9rCRegbdDDZrEqqlr-SI3daNFPLEov95CRJbODKtfFr2AfdDvhe5wP-JPQ0yEyvqRVyz00pxsnwstD9gZTh&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;174&quot; data-original-width=&quot;290&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgpGoNV3JZ4N-sM2DSHHulZ61L-nfiZwAJCpDqomziFeGFPmibc1WzDln1BcQJ2TaGrilgBXuNiOrzRWQE6Kdk20Zs4uj1OR1vGCuWP1XLof9rCRegbdDDZrEqqlr-SI3daNFPLEov95CRJbODKtfFr2AfdDvhe5wP-JPQ0yEyvqRVyz00pxsnwstD9gZTh&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;At MAT Services, we believe the most powerful compass for
your business isn’t gut instinct, it’s your customer. And the fastest way to
align your direction with their needs is through &lt;b&gt;custom, targeted surveys&lt;/b&gt;
designed to reveal exactly what drives their behavior, their choices, and their
loyalty.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Why Surveys Matter More Than Ever&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The voice of the customer isn’t just a nice-to-have, it’s
the lifeblood of strategic decision-making. CEOs and founders we speak with
often share the same pain points:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Product
     teams building in the dark.&lt;/b&gt; Development cycles based on assumptions
     instead of validated needs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Missed
     market signals.&lt;/b&gt; Competitors moving faster because they’ve tapped into
     emerging trends first.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Customer
     churn.&lt;/b&gt; Teams struggling to understand why customers leave, when the
     answers are right there, if only someone asked the right questions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;A well-crafted survey flips the script. It gives leaders
real-time insight into what their market values, what frustrates their
customers, and what will make them stay.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;The MAT Services Difference&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;We don’t believe in cookie-cutter surveys. Our team works
with you to design instruments that surface the &lt;b&gt;3–5 actionable insights&lt;/b&gt;
you can take straight into boardroom discussions and product roadmaps.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Whether it’s:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2; tab-stops: list .5in;&quot;&gt;Validating
     your next product concept&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2; tab-stops: list .5in;&quot;&gt;Understanding
     why adoption rates lag&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2; tab-stops: list .5in;&quot;&gt;Gauging
     how market trends will impact your strategy&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;…our surveys deliver clarity where there was once
uncertainty.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;And because we’ve seen too many businesses waste money on
surveys that don’t deliver, we back our work with a simple promise:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;If you don’t walk away with actionable insights, you
don’t pay.&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;De-Risk Your Next Decision&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Before you commit budget, headcount, or reputation to your
next big move, ask yourself: &lt;i&gt;Do I really know what my customers want?&lt;/i&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;If the answer isn’t a confident “yes,” then the smartest
investment you can make is to find out—before the market tells you the hard
way.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;At MAT Services, we help CEOs and founders turn the &lt;b&gt;voice
of the customer into a competitive advantage&lt;/b&gt;. Ready to see how a single
survey can change your next decision?&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Segoe UI Emoji&amp;quot;,sans-serif; mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;👉&lt;/span&gt; &lt;a href=&quot;https://matsvcs.com&quot; target=&quot;_new&quot;&gt;Contact us today&lt;/a&gt; to get started.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/9070081149498433034/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2025/09/stop-guessing-let-your-customers-shape.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/9070081149498433034'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/9070081149498433034'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2025/09/stop-guessing-let-your-customers-shape.html' title='Stop Guessing: Let Your Customers Shape Your Next Big Move'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgpGoNV3JZ4N-sM2DSHHulZ61L-nfiZwAJCpDqomziFeGFPmibc1WzDln1BcQJ2TaGrilgBXuNiOrzRWQE6Kdk20Zs4uj1OR1vGCuWP1XLof9rCRegbdDDZrEqqlr-SI3daNFPLEov95CRJbODKtfFr2AfdDvhe5wP-JPQ0yEyvqRVyz00pxsnwstD9gZTh=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-1644596969680612619</id><published>2025-09-17T08:03:00.002-04:00</published><updated>2025-09-17T08:07:03.196-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="#ThoughtLeadership #LeadGeneration #MarketResearch #MATServices #BusinessGrowth #SurveyStrategy"/><title type='text'>Why Voice of Customer (VoC) Surveys Are Your Secret Competitive Advantage</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEg2jOMPqWklJHiIAF190g7TjDAOicBg65wN0sXi8qgQGyMxaYia7hLi1PvgLwAPTJLiAgLZzgHkT_d8xRy2EEa-Nf7G-aTm5WYJoionMVOU5uEhGYjwWFrxENXF_ZwQLrlF7qcltDgkgIfCUF4FWgzZMZSXaTFnXG9wc-6UsjTCifFKxNQbYQDcC8SSxGqt&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;643&quot; data-original-width=&quot;1421&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEg2jOMPqWklJHiIAF190g7TjDAOicBg65wN0sXi8qgQGyMxaYia7hLi1PvgLwAPTJLiAgLZzgHkT_d8xRy2EEa-Nf7G-aTm5WYJoionMVOU5uEhGYjwWFrxENXF_ZwQLrlF7qcltDgkgIfCUF4FWgzZMZSXaTFnXG9wc-6UsjTCifFKxNQbYQDcC8SSxGqt&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;In today’s fast-moving markets, listening to your customers
isn’t optional, it’s essential. A strong &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+Voice+of+Customer+program&amp;amp;bbid=5365295076574010086&amp;amp;bpid=1644596969680612619&quot; target=&quot;_blank&quot;&gt;Voice of Customer (VoC) program&lt;/a&gt; not
only improves relationships but also drives growth, differentiation, and
long-term success.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Drawing on insights from &lt;a href=&quot;https://customergauge.com/blog/voice-of-customer-benefits?utm_source=chatgpt.com&quot; target=&quot;_new&quot;&gt;CustomerGauge’s article on Voice of Customer benefits&lt;/a&gt;, here’s
how VoC + &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=trend+surveys&amp;amp;bbid=5365295076574010086&amp;amp;bpid=1644596969680612619&quot; target=&quot;_blank&quot;&gt;trend surveys&lt;/a&gt; can give your organization the edge, and how &lt;b&gt;MAT
Services&lt;/b&gt; can help you execute them with excellence.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;

&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;

&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;The Power of Knowing What Customers Really Want&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;CustomerGauge highlights several crucial benefits of a VoC
program:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Deeper
     Relationships and Retention&lt;/b&gt;&lt;br /&gt;
     Closing the loop on customer feedback strengthens trust, loyalty, and
     referrals.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Growth
     &amp;amp; Revenue Opportunities&lt;/b&gt;&lt;br /&gt;
     VoC surfaces unmet needs, opening upsell, cross-sell, and product
     innovation pathways.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Sharper
     Products &amp;amp; Processes&lt;/b&gt;&lt;br /&gt;
     Feedback reveals friction points you didn’t see, letting you refine
     features and streamline operations.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Clarity
     Across the Organization&lt;/b&gt;&lt;br /&gt;
     Customer data highlights where service excels and where improvements are
     most urgent.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Efficiency
     Gains&lt;/b&gt;&lt;br /&gt;
     Over time, VoC lowers acquisition costs, reduces churn, and improves
     margins.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;How Trend Surveys Amplify VoC as a Competitive Advantage&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Trend surveys are a specific form of VoC effort focused on &lt;b&gt;broader
shifts in the marketplace&lt;/b&gt;. They don’t just measure today’s sentiment, they
uncover what’s coming tomorrow.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;With a trend survey, you can:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo2; tab-stops: list .5in;&quot;&gt;Identify
     emerging demands before competitors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo2; tab-stops: list .5in;&quot;&gt;Tailor
     your roadmap and messaging to what customers will need next.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo2; tab-stops: list .5in;&quot;&gt;Differentiate
     your brand as a thought leader.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo2; tab-stops: list .5in;&quot;&gt;Use
     outputs as content and lead-generation tools.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;

&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;What to look for in a Partner&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;You don’t just want a dataset; you want a partner that can turn
the survey insights into &lt;b&gt;business outcomes&lt;/b&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l3 level1 lfo3; tab-stops: list .5in;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Emoji&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;🎯&lt;/span&gt;
     &lt;b&gt;Tailored Design&lt;/b&gt;: Questions crafted around your strategy and
     personas.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l3 level1 lfo3; tab-stops: list .5in;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Emoji&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;📊&lt;/span&gt;
     &lt;b&gt;Actionable Insights&lt;/b&gt;: Clear recommendations, not raw numbers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l3 level1 lfo3; tab-stops: list .5in;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Symbol&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Symbol&amp;quot;;&quot;&gt;🖋&lt;/span&gt;
     &lt;b&gt;Thought Leadership Packaging&lt;/b&gt;: Whitepapers, reports, and content
     that position you at the forefront.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l3 level1 lfo3; tab-stops: list .5in;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Emoji&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;💰&lt;/span&gt;
     &lt;b&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=Lead+Generation&amp;amp;bbid=5365295076574010086&amp;amp;bpid=1644596969680612619&quot; target=&quot;_blank&quot;&gt;Lead Generation&lt;/a&gt; Built-In&lt;/b&gt;: Surveys that double as pipeline drivers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l3 level1 lfo3; tab-stops: list .5in;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Emoji&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;🤝&lt;/span&gt;
     &lt;b&gt;Trusted Partnership&lt;/b&gt;: Long-term, transparent collaboration focused
     on your success.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;

&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Real-World Impact&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;A Marketing Director from a large public safety organization
shared:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;“We partnered with MAT Services to identify trends around &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=AI+trends&amp;amp;bbid=5365295076574010086&amp;amp;bpid=1644596969680612619&quot; target=&quot;_blank&quot;&gt;AI&lt;/a&gt;
in our primary customer market. We leveraged the data to help drive our product
decisions, in multiple thought leadership presentations, in our Investor
newsletter, and as a lead generation tool. In the 6 months since we published
the report as a lead generation asset, the report has influenced $70 million in
pipeline and $9 million in closed bookings.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;

&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ready to Leverage Your Customers’ Voice?&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Voice of Customer and trend surveys aren’t just
tools, they are competitive weapons. They help you:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo4; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Innovate
     faster&lt;/b&gt; by spotting emerging needs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo4; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Win
     more share&lt;/b&gt; by aligning with customer priorities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo4; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Elevate
     your brand&lt;/b&gt; with thought leadership.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo4; tab-stops: list .5in;&quot;&gt;&lt;b&gt;Empower
     your leadership&lt;/b&gt; with metrics investors and executives value.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;At &lt;b&gt;MAT Services&lt;/b&gt;, we’ll help you design, run, and
leverage surveys that turn customer feedback into a strategic advantage.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI Emoji&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Segoe UI Emoji&amp;quot;;&quot;&gt;📩&lt;/span&gt; &lt;b&gt;&lt;a href=&quot;https://matsvcs.com/contact&quot; target=&quot;_blank&quot;&gt;Contact MAT Services&lt;/a&gt;
today&lt;/b&gt; to unlock the insights your organization needs to lead your market.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/1644596969680612619/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2025/09/why-voice-of-customer-voc-surveys-are.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/1644596969680612619'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/1644596969680612619'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2025/09/why-voice-of-customer-voc-surveys-are.html' title='Why Voice of Customer (VoC) Surveys Are Your Secret Competitive Advantage'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEg2jOMPqWklJHiIAF190g7TjDAOicBg65wN0sXi8qgQGyMxaYia7hLi1PvgLwAPTJLiAgLZzgHkT_d8xRy2EEa-Nf7G-aTm5WYJoionMVOU5uEhGYjwWFrxENXF_ZwQLrlF7qcltDgkgIfCUF4FWgzZMZSXaTFnXG9wc-6UsjTCifFKxNQbYQDcC8SSxGqt=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-7434403266380452239</id><published>2025-09-03T14:01:00.005-04:00</published><updated>2025-09-04T09:41:42.890-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="#ThoughtLeadership #LeadGeneration #MarketResearch #MATServices #BusinessGrowth #SurveyStrategy"/><title type='text'>Why Your Customers Need to be Heard – a Cracker Barrel miss?</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhf1ZMZmrWyqGwo0zJ7mVXo0l0DBggdndonu7CajNLXFZ5HgHQoKLOrH_WRI4n31q57-mJzIAIFlvwEEZ5QqTYn_h8R6SB9F5hrQTH77K5eUn6uZ2rzgn73juWV_W-cPQlSw8bK5lbJYM6DY_LGWMcVbhRfGYoRrFMbQg-GlCZ1wW3lWNz6nTeY_30Gz1hC&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;132&quot; data-original-width=&quot;250&quot; height=&quot;90&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhf1ZMZmrWyqGwo0zJ7mVXo0l0DBggdndonu7CajNLXFZ5HgHQoKLOrH_WRI4n31q57-mJzIAIFlvwEEZ5QqTYn_h8R6SB9F5hrQTH77K5eUn6uZ2rzgn73juWV_W-cPQlSw8bK5lbJYM6DY_LGWMcVbhRfGYoRrFMbQg-GlCZ1wW3lWNz6nTeY_30Gz1hC=w171-h90&quot; width=&quot;171&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=Cracker+Barrel&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;Cracker Barrel&lt;/a&gt;’s recent rebranding and store modernization
storyline reads like a cautionary tale in corporate strategy and a missed
opportunity before the-fact validation.&lt;/p&gt;

&lt;h2&gt;A Costly Modernization Reversal&lt;o:p&gt;&lt;/o:p&gt;&lt;/h2&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;In 2024, Cracker Barrel embarked on a $700 million
modernization initiative designed to refresh its image and attract younger
diners. The makeover included brighter interiors with cleaner décor, updated
menus, new conveniences like curbside pickup, and a minimalist redesign of
their iconic logo replacing “&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=Cracker+Barrel+Uncle+Herschel+logo&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;Uncle Herschel&lt;/a&gt;” with a &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=wordmark+logo+design&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;wordmark-centric look&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
But for a brand built on nostalgia, these changes hit a nerve. Loyal customers
saw the updates as dismissive of the brand’s heritage and charm. The company’s
stock dropped 7–11%, equivalent to a market value loss of $94–$143 million in a
matter of days. Fueled by a &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=Cracker+Barrel+cultural+backlash+rebranding&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;cultural backlash&lt;/a&gt; that escalated into a political
flashpoint Cracker Barrel quickly reversed course, reinstating the original
logo and promising to retain beloved elements like &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=Cracker+Barrel+rocking+chairs&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;rocking chairs&lt;/a&gt; and peg
games.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;h2&gt;Could a Professional Survey Service Have Prevented This?&lt;o:p&gt;&lt;/o:p&gt;&lt;/h2&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Absolutely. A proactive, professionally executed survey or
research program focused on core brand elements could have tipped off
leadership to customer sentiment before investing such a large sum. A strong
survey approach might have included:&lt;br /&gt;
&lt;br /&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+Segmentation+Analysis&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;Segmentation Analysis&lt;/a&gt;: Differentiating customer attitudes by demographic,
geography, and frequency of visits.&lt;/li&gt;&lt;li&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+Emotional+Attachment+Assessments&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;Emotional Attachment Assessments&lt;/a&gt;: Measuring the emotional and cultural
significance of key brand symbols.&lt;/li&gt;&lt;li&gt;&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+Message+Testing+of+Concepts&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;Message Testing of Concepts&lt;/a&gt;: Evaluating reaction to modernized interiors and
logo design via &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+focus+groups+marketing&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;focus groups&lt;/a&gt; or &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+quant+surveys+marketing&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;quant surveys&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/blockquote&gt;

&lt;h2&gt;The Price of Neglecting the Voice of the Customer&lt;o:p&gt;&lt;/o:p&gt;&lt;/h2&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Cracker Barrel executives later acknowledged a failure in
communication and planning, stating they “could have done a better job” sharing
who they are and what they’ll always be. The swift reversal, while necessary, does
not erase the market value lost or the brand trust shaken.&lt;br /&gt;
&lt;br /&gt;
Had a professional survey service been engaged early, Cracker Barrel could have
co-created modernization paths with its most loyal customers. Not only might
this have saved hundreds of millions, but it could have strengthened
&lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+product-market+fit&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;product-market fit&lt;/a&gt; and avoided a &lt;a data-preview=&quot;&quot; href=&quot;https://www.google.com/search?ved=1t:260882&amp;amp;q=define+cultural+PR+crisis&amp;amp;bbid=5365295076574010086&amp;amp;bpid=7434403266380452239&quot; target=&quot;_blank&quot;&gt;cultural PR crisis&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The heart of this episode is not about resisting change, it’s about listening
first. A disciplined, customer-informed approach could have allowed Cracker
Barrel to update its look while preserving the soul of the brand that customers
love.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Don’t want to fall victim to your market, reach out to &lt;a href=&quot;https://matsvcs.com/contact&quot;&gt;Marketing Awareness Technology&lt;/a&gt; (&lt;a href=&quot;https://matsvcs.com/&quot;&gt;https://matsvcs.com/&lt;/a&gt;) to see how we can help your
organization gain new valuable insights. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/7434403266380452239/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2025/09/why-your-customers-need-to-be-heard.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/7434403266380452239'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/7434403266380452239'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2025/09/why-your-customers-need-to-be-heard.html' title='Why Your Customers Need to be Heard – a Cracker Barrel miss?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhf1ZMZmrWyqGwo0zJ7mVXo0l0DBggdndonu7CajNLXFZ5HgHQoKLOrH_WRI4n31q57-mJzIAIFlvwEEZ5QqTYn_h8R6SB9F5hrQTH77K5eUn6uZ2rzgn73juWV_W-cPQlSw8bK5lbJYM6DY_LGWMcVbhRfGYoRrFMbQg-GlCZ1wW3lWNz6nTeY_30Gz1hC=s72-w171-h90-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-3153812816435823603</id><published>2025-08-13T13:12:00.001-04:00</published><updated>2025-08-13T13:15:02.708-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="#ThoughtLeadership #LeadGeneration #MarketResearch #MATServices #BusinessGrowth #SurveyStrategy"/><title type='text'>The Strategic Value of Trend Surveys - Why MAT Services Does Them Differently</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://matsvcs.com/&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;623&quot; data-original-width=&quot;927&quot; height=&quot;130&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjVVyq00rJtECROXwIzO6hiOtitoup91v2bsynV4FBsUmhLGGmjCcwno90SObbE8N_HajOThcgCe8Bl_2qrRr1NvFaDm5rT4sAq5UiPQlq2SbGmg9jfCU7vYW63m8T-5WiyEBGzAKw004CElWOsqLBlVoVSC8eY42rW3L10UBzPG3rQF3Hr1o3qTqT61DUi=w194-h130&quot; width=&quot;194&quot; /&gt;&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href=&quot;https://matsvcs.com/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;2925&quot; data-original-width=&quot;5201&quot; height=&quot;136&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhBJ82L9GwTanItbWv9sl06wzVFWiQwLBptdYn6-1wnua98L-6huLAVwqaQk9LjC4HmeF79J4n0ZVgAS30FvSmqXfwXajOwMnp3MEPOrVWh31RZygP8MjP26OvzaMmxVKVgXFm3mlr85GtSt2_5QM3vTwus5R8GFFhmGRxR-_mHAsmMa814LAV9ZJES_HbV=w241-h136&quot; width=&quot;241&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;text-align: center;&quot;&gt;In an increasingly competitive business landscape, the companies that rise to the top are the ones that&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;text-align: center;&quot;&gt;anticipate change, adapt quickly, and act with confidence&lt;/b&gt;&lt;span style=&quot;text-align: center;&quot;&gt;. One of the most powerful ways to achieve that is through&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;text-align: center;&quot;&gt;strategic trend surveys&lt;/b&gt;&lt;span style=&quot;text-align: center;&quot;&gt;, and at&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://matsvcs.com/&quot; style=&quot;text-align: center;&quot;&gt;Market Awareness Technologies(MAT) Services&lt;/a&gt;&lt;span style=&quot;text-align: center;&quot;&gt;, we’ve built a unique approach that turns survey data into measurable business outcomes.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Trend surveys are more than a research exercise; they’re a
growth engine. When done right, they generate qualified leads, shape your
product roadmap, and provide C-level leadership with investor-ready metrics
that strengthen your market position. Here’s how MAT Services delivers value
where others can’t.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;1. Lead Generation Through Thought Leadership&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;When you publish authoritative research on your industry,
you’re not just sharing data, you’re &lt;b&gt;positioning your company as the go-to
source for insights&lt;/b&gt;. MAT Services takes your survey findings and transforms
them into a high-value thought leadership asset, from whitepapers to keynote
presentations, that your audience will reference, share, and act on.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The result? A content-driven lead generation engine that
opens doors with new prospects and re-engages existing accounts. In fact, one
Marketing Director from a large public safety organization shared:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;i&gt;“We partnered with MAT Services to identify trends around
AI in our primary customer market. We leveraged the data to help drive our
product decisions, in multiple thought leadership presentations, in our
Investor newsletter, and as a lead generation tool. In the 6 months since we
published the report as a lead generation asset, the report has influenced $70
million in pipeline and $9 million in closed bookings.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;2. Market Intelligence That Expands Wallet Share&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;A MAT Services survey isn’t just about what your market
thinks today, it’s about &lt;b&gt;discovering what it will need tomorrow&lt;/b&gt;. By
reaching your key personas with targeted questions, we uncover emerging
demands, hidden pain points, and untapped segments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;This intelligence directly informs your product roadmap and
customer engagement strategy, helping you expand your share of existing
accounts and break into new ones. The ability to &lt;b&gt;act on validated customer
priorities&lt;/b&gt; before competitors can is how our clients consistently gain an advantage
over their competitors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;3. Executive-Ready Metrics for Leadership &amp;amp; Investors&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Trend surveys deliver more than marketing content, they
produce &lt;b&gt;boardroom-ready metrics&lt;/b&gt; that C-level leaders can use in
corporate presentations, investor relations, and strategic planning.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Our reports don’t just display numbers; they highlight the
business implications, revenue potential, and operational opportunities your
leadership team needs to make confident, high-impact decisions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;What Makes MAT Services Different?&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;While many firms will run a survey and hand over a
spreadsheet, MAT Services delivers &lt;b&gt;end-to-end value&lt;/b&gt;:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Tailored
     design&lt;/b&gt; that aligns with your strategic goals.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Direct
     feedback from your target personas&lt;/b&gt;, ensuring results that matter.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Actionable
     insights&lt;/b&gt;, not just raw data, for immediate business impact.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Thought
     leadership packaging&lt;/b&gt; that elevates your brand in the marketplace.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Lead
     generation integration&lt;/b&gt;, connecting insights directly to pipeline
     growth.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;We’re not just researchers. We’re your strategic partner in
turning &lt;b&gt;market intelligence into revenue, influence, and competitive
advantage&lt;/b&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ready to Lead Your Market?&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The best time to understand your industry’s next move is
before it happens. With MAT Services’ proven approach to trend surveys, you’ll
not only stay ahead of the curve, you’ll define it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://matsvcs.com/contact&quot;&gt;Contact MAT Services today&lt;/a&gt;&lt;/b&gt; to discuss how we can help
you create a trend survey that drives leads, informs strategy, and equips your
leadership with investor-ready insights.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/3153812816435823603/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2025/08/the-strategic-value-of-trend-surveys.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/3153812816435823603'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/3153812816435823603'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2025/08/the-strategic-value-of-trend-surveys.html' title='The Strategic Value of Trend Surveys - Why MAT Services Does Them Differently'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEjVVyq00rJtECROXwIzO6hiOtitoup91v2bsynV4FBsUmhLGGmjCcwno90SObbE8N_HajOThcgCe8Bl_2qrRr1NvFaDm5rT4sAq5UiPQlq2SbGmg9jfCU7vYW63m8T-5WiyEBGzAKw004CElWOsqLBlVoVSC8eY42rW3L10UBzPG3rQF3Hr1o3qTqT61DUi=s72-w194-h130-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-7417311291929147928</id><published>2015-09-01T13:02:00.000-04:00</published><updated>2015-09-01T14:34:37.548-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="APPLE"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="jailbreak"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt; lang: en_US&lt;/script&gt;
&lt;script data-counter=&quot;top&quot; data-url=&quot;http://www.todays-cloud.com/2015/09/apples-biggest-hackever-over.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;

&lt;/h2&gt;
&lt;h2 class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt; text-align: left;&quot;&gt;
Apple&#39;s Biggest Hack
Ever&lt;o:p&gt;&lt;/o:p&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM12wcgK2Y5-hzYDor1FdIEQ0xIjy3tHfhyphenhyphenT2J3pBB6ePagX5R-yXMO5R_LdcpMb01y4vLD6SW-oVGjdWbYqHRi4D6el2nLyPSv7zQ6QU4wQX3BPmIoUpbaIXd_tNbNTi7epOI_D3WWw_6/s1600/Capture.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM12wcgK2Y5-hzYDor1FdIEQ0xIjy3tHfhyphenhyphenT2J3pBB6ePagX5R-yXMO5R_LdcpMb01y4vLD6SW-oVGjdWbYqHRi4D6el2nLyPSv7zQ6QU4wQX3BPmIoUpbaIXd_tNbNTi7epOI_D3WWw_6/s1600/Capture.PNG&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Over 225,000
valid Apple accounts and thousands of certificates, private keys, and
purchasing receipts were stolen from jailbroken iOS devices. The malware,
KeyRaider, was distributed through third-party Cydia repositories in China and
appears to have impacted users from 18 countries including China, France,
Russia, Japan, United Kingdom, United States, Canada, Germany, Australia,
Israel, Italy, Spain, Singapore, and South Korea.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 9pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The malware
steals Apple account usernames, passwords and device GUID by intercepting
iTunes traffic on the device and disables local and remote unlocking
functionalities on iPhones and iPads. The malware then uploads the stolen data
to its command and control (C2) server, which has been found to contain
vulnerabilities that expose the stolen user information to other hackers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 9pt;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to
&lt;/span&gt;&lt;a href=&quot;http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Paloalto Networks&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; 
the purpose of the attack was to make it possible for users of two iOS
jailbreak tweaks to download applications from the official App Store and make
in-app purchases without actually paying. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 9pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Jailbreaking is the
process of removing hardware restrictions on iOS, Apple&#39;s operating system, on
devices running it through the use of software exploits; such devices include
the iPhone, iPod touch, iPad, and second-generation Apple TV. Jailbreaking permits
root access to the iOS file system and manager, allowing the download of
additional applications, extensions, and themes that are unavailable through
the official Apple App Store. (&lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/IOS_jailbreaking&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Wikipedia&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;)&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/7417311291929147928/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2015/09/lang-enus-apples-biggest-hackever-over.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/7417311291929147928'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/7417311291929147928'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2015/09/lang-enus-apples-biggest-hackever-over.html' title=''/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM12wcgK2Y5-hzYDor1FdIEQ0xIjy3tHfhyphenhyphenT2J3pBB6ePagX5R-yXMO5R_LdcpMb01y4vLD6SW-oVGjdWbYqHRi4D6el2nLyPSv7zQ6QU4wQX3BPmIoUpbaIXd_tNbNTi7epOI_D3WWw_6/s72-c/Capture.PNG" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-6347835934819166878</id><published>2014-06-19T13:59:00.000-04:00</published><updated>2014-06-19T22:28:51.068-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="box.com"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="dropbox"/><category scheme="http://www.blogger.com/atom/ns#" term="file sharing"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Are Employees Putting Organizations at Risk?</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;
  lang: en_US
&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-counter=&quot;top&quot; data-url=&quot;http://www.todays-cloud.com/2014/06/are-employees-putting-organizations-at.html&quot;&gt;&lt;/script&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg37mjZjzZoxOnKtYW0fnyimWyJjwZ39PknnmZAag3za1ERgatF1cB9_Ot3uIon0A21Esv1WbcvWRiVK9Q-6rBD44nA5t7TL8SHJbmedQEzXYLs9MrtpcGZGSjpI7b7g-jRkyz8uLY0VVVm/s1600/New+Bitmap+Image.bmp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg37mjZjzZoxOnKtYW0fnyimWyJjwZ39PknnmZAag3za1ERgatF1cB9_Ot3uIon0A21Esv1WbcvWRiVK9Q-6rBD44nA5t7TL8SHJbmedQEzXYLs9MrtpcGZGSjpI7b7g-jRkyz8uLY0VVVm/s1600/New+Bitmap+Image.bmp&quot; height=&quot;210&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
According to a recent report released by Forrester Research, the global public cloud market is expected to hit $191 billion by 2020, based on Forrester&#39;s last forecast (published in 2011), this represents a 20% increase over the same time period. It also represents a significant increase from where the market is currently, Forrester estimates that the market was public cloud market was&amp;nbsp;&lt;a href=&quot;http://www.computerworld.com/s/article/9247883/Public_cloud_market_ready_for_hypergrowth_period_&quot;&gt;$58 billion at the end of 2013&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
However, the challenge facing enterprises with cloud adoption is quite concerning. According a recent article published by &lt;a href=&quot;http://www.computerworld.com/s/article/9247883/Public_cloud_market_ready_for_hypergrowth_period_&quot;&gt;Computerworld&lt;/a&gt;, &quot;There&#39;s a tug-of-war tension in the enterprise right now,&quot; said Gartner analyst Lydia Leong. &quot;IT administrators very rarely voluntarily want to go with the public cloud. I call this the &#39;turkeys don&#39;t vote for thanksgiving&#39; theory. The people who are pushing for these services are not IT operations people but business people.&quot;&lt;br /&gt;
&lt;br /&gt;
There is no doubt that the business owner is making this selection to drive their business and sees little to no risk with their decision. However, IT security and the lack of oversight, digital loss prevention techniques and audit requirements can leave a company in precarious situation.&lt;br /&gt;
&lt;br /&gt;
The question is, how does IT and the business user coexist as a partners and not as roadblocks to business growth? The key is a common product and sales technique. Understanding the business requirements is critical to forming the right partnership. IT needs to focus on delivering products that help the business become more efficient and meet their needs to facilitate business. The business needs to be the buyer, but IT needs to be there to make sure the corporation remains well protected.&lt;br /&gt;
&lt;br /&gt;
One of the very real risks that corporations are facing today is cloud based file sharing, the reality is that these applications can be acquired very easily by the business, unfortunately, there is no way to control what is actually being store outside the firewall or if the service provider even meets corporate standards. Many companies have blocked the most popular URLs to prevent internal use, but Gartner lists over 100+ competitors, many approaching file sharing from a different industry focus, so it is unrealistic to expect an IT department to be able to prevent all files sharing solutions.&lt;br /&gt;
&lt;br /&gt;
This is just one example of the risk that the business faces when they acquire technology without going through the correct process. But IT must also understand, they are not the business, nor must they decided what is best for the business, rather they must learn to deliver the business requirements, while ensuring that the product or service meets with the Corporate Security Standards. Only then wll the risk of Rouge IT applications subside!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/6347835934819166878/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2014/06/are-employees-putting-organizations-at.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6347835934819166878'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6347835934819166878'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2014/06/are-employees-putting-organizations-at.html' title='Are Employees Putting Organizations at Risk?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg37mjZjzZoxOnKtYW0fnyimWyJjwZ39PknnmZAag3za1ERgatF1cB9_Ot3uIon0A21Esv1WbcvWRiVK9Q-6rBD44nA5t7TL8SHJbmedQEzXYLs9MrtpcGZGSjpI7b7g-jRkyz8uLY0VVVm/s72-c/New+Bitmap+Image.bmp" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-2983975703631229513</id><published>2014-06-16T11:55:00.000-04:00</published><updated>2014-06-16T14:39:10.546-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="APPLE"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="legal"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="US Warrant"/><title type='text'>Why International Organizations don’t want to do business with US Cloud providers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;
  lang: en_US
&lt;/script&gt;
&lt;script data-counter=&quot;top&quot; data-url=&quot;http://www.todays-cloud.com/2014/06/why-international-organizations-dont.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfhvtE7WHUJPVwZ8COByddQ2pNRWIj-Sh8zCObYBuCyLNKRTlAS4ajtRw7Dwurm2bDXUbWh-IW8ry3_AhkNeNcVivZRBDwnFKwn_Sums9d0hcUuO4s_ReC_UyEjJ1eeWc11HXqndWhBGLJ/s1600/New+Bitmap+Image.bmp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfhvtE7WHUJPVwZ8COByddQ2pNRWIj-Sh8zCObYBuCyLNKRTlAS4ajtRw7Dwurm2bDXUbWh-IW8ry3_AhkNeNcVivZRBDwnFKwn_Sums9d0hcUuO4s_ReC_UyEjJ1eeWc11HXqndWhBGLJ/s1600/New+Bitmap+Image.bmp&quot; height=&quot;196&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
While you would need to have been vacationing in the Rockies for the last year or so to have missed the stories outlining the US Government’s legal right to obtain data, most people have just come to accept that we have no choice in the matter. Court papers released on Monday show that Microsoft is fighting a &lt;a href=&quot;http://www.cnet.com/news/microsoft-fights-us-warrant-for-customer-data-stored-overseas/&quot;&gt;US warrant&lt;/a&gt; for customer data stored overseas.&lt;br /&gt;
&lt;br /&gt;
The US is pursuing criminal matters against an individual and has requested emails stored in Dublin Ireland. Microsoft’s theme for their objection to the US warrant is that allowing the obtuse nature of the warrant would &quot;violate international laws and treaties, and reduce the privacy protection of everyone on the planet,&quot; as well as &quot;have a significant negative impact on Microsoft&#39;s business, and the competitiveness of US cloud providers in general&quot;.&lt;br /&gt;
&lt;br /&gt;
In support of this, both Apple and Cisco have filed a &lt;a href=&quot;http://www.cnet.com/news/apple-cisco-back-microsoft-in-fight-over-us-warrant-for-data-overseas/&quot;&gt;friend-of-the-court brief&lt;/a&gt; backing Microsoft&#39;s position, this is in addition to ones submitted earlier in the week by Verizon and AT&amp;amp;T. Many international organizations recognize the fact that the &lt;a href=&quot;http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant&quot;&gt;US government has the right&lt;/a&gt; to ask and obtain data from a US company or subsidiary customer data no matter where it resides in the world. The problem is that many International companies feel this is a serious risk to doing business with US companies, I guess only in America do we teach of a global economy. Yes it is true that the law exists, and it is true that companies may not do business with a US company because of it, however, if you build a product that they want, they will use it.&lt;br /&gt;
&lt;br /&gt;
Let’s face facts, data in the cloud is subject to risk (so by the way is data behind the firewall, just ask &lt;a href=&quot;https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888&quot;&gt;Target&lt;/a&gt;), if it were not, you would see considerably more data stored in the cloud. Having worked both cloud solutions and enterprise software, it is very easy to see the distinction; however it is far more complex when trying to run a business.&lt;br /&gt;
&lt;br /&gt;
We often talk about &lt;a href=&quot;http://salesforce.com/&quot;&gt;Salesforce.com&lt;/a&gt; (SFDC), as being a major cloud platform that companies heavily rely on. I mean after all, if your entire customer database is on SFDC, you would really need to trust the cloud, right? Well truth be told, the average sales person will probably do more damage leaving an organization with his contact list than losing data from the use of SFDC.&lt;br /&gt;
&lt;br /&gt;
As companies consume homogenized data, it becomes a commodity; you purchase the integration value, not the protection of the data. Don’t misunderstand, the data must be protected, however, no one believes that a cloud provider could deliver better protection than keeping the data encrypted behind their own firewall. Organizations traditionally move data that would not jeopardize the organization to the cloud. This may also include data that extends beyond the firewall.&lt;br /&gt;
&lt;br /&gt;
The debate will rage on for several more years, our society is very fickle, when bad things happen, we want the government to do their job, when things are okay, we want the government to stay away. But how do you balance this? At some level we must realize that the ability to communicate across thousands of miles in milliseconds puts us all at risk, where do we draw the line? I am not advocating government censorship and I am a firm believer that power corrupts, but is profiling patterns, which is typically what happens with most of our data, the worse thing to give up for our protection?&lt;br /&gt;
&lt;br /&gt;
Do we really believe that the US government is doing anything more than other governments, just because their Snowden hasn&#39;t gone public? I remember as a child my father saying to me after I got caught doing something I shouldn&#39;t have been doing, “The difference between you and me, is that I did not get caught”, I was about to challenge him on that statement, but having thought about this for a brief second, I realized, to defend myself, would mean I would have to tell him about the other 100 times I got away with it. Do we really believe that spying is a US government anomaly?&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/2983975703631229513/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2014/06/why-international-organizations-dont.html#comment-form' title='281 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/2983975703631229513'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/2983975703631229513'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2014/06/why-international-organizations-dont.html' title='Why International Organizations don’t want to do business with US Cloud providers'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfhvtE7WHUJPVwZ8COByddQ2pNRWIj-Sh8zCObYBuCyLNKRTlAS4ajtRw7Dwurm2bDXUbWh-IW8ry3_AhkNeNcVivZRBDwnFKwn_Sums9d0hcUuO4s_ReC_UyEjJ1eeWc11HXqndWhBGLJ/s72-c/New+Bitmap+Image.bmp" height="72" width="72"/><thr:total>281</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-1759624326550220717</id><published>2014-06-05T06:58:00.002-04:00</published><updated>2014-06-05T15:06:54.502-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Big Data"/><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Is Big Data secure enough?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;
  lang: en_US
&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2014/06/is-big-data-secure-enough.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQGf7OW1KnJBof3P0wVzHsSxTN-RSjOTQMQXdizgBDmeZQc2QnGbwAORFbPvtj01TRKWc_4eTHoy95d82hDyfMGs09-IYgsPQGJfCzXzcfkZT3Lsrlt66SHb6GxZ6q4GsFKiuvgAK4Q0dh/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQGf7OW1KnJBof3P0wVzHsSxTN-RSjOTQMQXdizgBDmeZQc2QnGbwAORFbPvtj01TRKWc_4eTHoy95d82hDyfMGs09-IYgsPQGJfCzXzcfkZT3Lsrlt66SHb6GxZ6q4GsFKiuvgAK4Q0dh/s1600/Untitled.png&quot; height=&quot;212&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Most people have heard the concept of Big Data, but few understand how it impacts our lives on a daily basis. The news outlets will sensationalize the government (particularly the NSA) for using Big Data techniques on public data in order to spy on people. For example, selfies are now used by the &lt;a href=&quot;http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html?_r=2&quot;&gt;NSA for facial recognition&lt;/a&gt;,&amp;nbsp;but should any of this surprise people? The data we put on the web is viewable by almost anyone and you must realize that companies like Facebook, twitter, LinkedIn are in the business to make money. So let’s face it their data is priceless to the right audience, this includes governments, and don’t think for a second that the US is the only government doing this, however we are the only ones where it makes an interesting news story.To level set, here are some interesting data points from &lt;a href=&quot;http://en.wikipedia.org/wiki/Big_data&quot;&gt;Wikipedia&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Government&lt;/u&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;In 2012, the Obama administration announced the Big Data Research and Development Initiative, which explored how big data could be used to address important problems faced by the government. The initiative was composed of 84 different big data programs spread across six departments.&lt;/li&gt;
&lt;li&gt;Big data analysis played a large role in Barack Obama&#39;s successful 2012 re-election campaign.&lt;/li&gt;
&lt;li&gt;The United States Federal Government owns six of the ten most powerful supercomputers in the world.&lt;/li&gt;
&lt;li&gt;The Utah Data Center is a data center currently being constructed by the United States National Security Agency. When finished, the facility will be able to handle a large amount of information collected by the NSA over the Internet. The exact amount of storage space is unknown, but more recent sources claim it will be on the order of a few Exabytes.&lt;/li&gt;
&lt;/ul&gt;
&lt;u&gt;Private sector&lt;/u&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;eBay.com uses two data warehouses at 7.5 petabytes and 40PB as well as a 40PB Hadoop cluster for search, consumer recommendations, and merchandising. Inside eBay’s 90PB data warehouse&lt;/li&gt;
&lt;li&gt;Amazon.com handles millions of back-end operations every day, as well as queries from more than half a million third-party sellers. The core technology that keeps Amazon running is Linux-based and as of 2005 they had the world’s three largest Linux databases, with capacities of 7.8 TB, 18.5 TB, and 24.7 TB.&lt;/li&gt;
&lt;li&gt;Walmart handles more than 1 million customer transactions every hour, which are imported into databases estimated to contain more than 2.5 petabytes (2560 terabytes) of data – the equivalent of 167 times the information contained in all the books in the US Library of Congress.&lt;/li&gt;
&lt;li&gt;Facebook handles 50 billion photos from its user base.[36]&lt;/li&gt;
&lt;li&gt;FICO Falcon Credit Card Fraud Detection System protects 2.1 billion active accounts world-wide.&lt;/li&gt;
&lt;li&gt;The volume of business data worldwide, across all companies, doubles every 1.2 years, according to estimates.&lt;/li&gt;
&lt;li&gt;Windermere Real Estate uses anonymous GPS signals from nearly 100 million drivers to help new home buyers determine their typical drive times to and from work throughout various times of the day.&lt;/li&gt;
&lt;/ul&gt;
The amount of data we create daily is mind boggling and the amount of data we put on the web unsecured should be of great concern, but we often do not think twice of posting photos of our children on Facebook to share with friends, or writing on our timeline that we are on vacation (this is invaluable information if you are a thief), then we get upset because the NSA is collecting and using this information to “spy” on American citizens.&lt;br /&gt;
&lt;br /&gt;
The truth of the matter is that the US Government is not spying on anyone; they, like all private sector companies, use the data to form patterns and then target high profile individuals. Is the US Government really doing anything different than Google? Google looks at your browsing history to serve up targeted ads that you are more likely to click on to generate revenue. Amazon serves up potential items for you to impulse purchase based on your previous buying history and items you have looked at, all of this is an invasion of privacy, but some we accept as helpful, even cool, and others we deem as violations of our civil rights. Let’s face it, if you don’t want someone spying on you, don’t put it out on public display!&lt;br /&gt;
&lt;br /&gt;
Big Data security is finally becoming an important topic, many companies are bringing in large amounts of data purchased from Twitter, Facebook and other public sites to develop buying profiles to increase the target rates of their marketing spend, however at what point does a bunch of public data start to become private information. For example, let’s say on Facebook, you always put down that you are at the local Starbucks getting coffee, you go to work and then Tweet about your favorite sports team acquiring a new star player, after work you use Google maps to find a restaurant and you run into an old friend and post a selfie on SnapChat. You go home and then browse a few of your favorite sites. By themselves they mean very little, but combined a company now has a very strong profile of your behavior, what you like, what you may buy, political views, how to increase the chance you will buy from them and so on.&lt;br /&gt;
So what happens when these profiles are hacked and the wrong person acquires a bunch of data that seems worthless until it is combined with all the other data they have collected? Is this any better than Target losing 40 Million credit card numbers?&lt;br /&gt;
&lt;br /&gt;
Interestingly both &lt;a href=&quot;https://gigaom.com/2014/05/15/hortonworks-makes-a-hadoop-security-play-and-buys-xa-secure/&quot;&gt;Hortonworks&lt;/a&gt; and &lt;a href=&quot;http://gigaom.com/2014/06/03/cloudera-acquires-big-data-encryption-specialist-gazzang/&quot;&gt;Cloudera&lt;/a&gt; (both Big Data software companies) acquired security companies to enhance their offerings. From my perspective, it is about time. But protecting the data in storage is not the only risk, if you are going to move large subsets of data that do not have strong relevancy on its own, but when combined build very sensitive profiles, then you must secure the transport of the data at all times. Many companies feel that public data does not need to be moved securely since it is already public, but the real risk is the selection of data these companies are collecting and how they eventually assemble the profiles, both components must be secured.&lt;br /&gt;
&lt;br /&gt;
Big Data is a part of our lives now and will not go away, it will evolve and become even more invasive, it is time that companies collecting data secure all transmissions, even public information!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/1759624326550220717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2014/06/is-big-data-secure-enough.html#comment-form' title='200 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/1759624326550220717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/1759624326550220717'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2014/06/is-big-data-secure-enough.html' title='Is Big Data secure enough?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQGf7OW1KnJBof3P0wVzHsSxTN-RSjOTQMQXdizgBDmeZQc2QnGbwAORFbPvtj01TRKWc_4eTHoy95d82hDyfMGs09-IYgsPQGJfCzXzcfkZT3Lsrlt66SHb6GxZ6q4GsFKiuvgAK4Q0dh/s72-c/Untitled.png" height="72" width="72"/><thr:total>200</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-6979386133336754032</id><published>2014-06-03T14:31:00.000-04:00</published><updated>2014-06-03T14:42:31.844-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="APPLE"/><category scheme="http://www.blogger.com/atom/ns#" term="MAC"/><category scheme="http://www.blogger.com/atom/ns#" term="Marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Hey MAC - It’s time to grow up</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;
  lang: en_US
&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2014/06/hey-mac-its-time-to-grow-up.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;

&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYKTzWs3TBP1XtqSNwPwwg97N4RHOvl8spzqI5V62Ik3A7-AzzT3Bn1pL4mbLlb0GWKSGgsNDMIxR7yuYL90Ad8lnRdUi-ssoK284wdsDHQtBM5jmmcr0vWedNwbtat06BcA6WnpGAHpZd/s1600/New+Bitmap+Image.bmp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYKTzWs3TBP1XtqSNwPwwg97N4RHOvl8spzqI5V62Ik3A7-AzzT3Bn1pL4mbLlb0GWKSGgsNDMIxR7yuYL90Ad8lnRdUi-ssoK284wdsDHQtBM5jmmcr0vWedNwbtat06BcA6WnpGAHpZd/s1600/New+Bitmap+Image.bmp&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Ever notice how most Mac users are skinny? It&#39;s because of
all the calories they burn because they can&#39;t stop talking about how great
their Macs are. OK that is probably not accurate but I did find it comical when
I read it. But you know the people I am referring to, the really smart guys
that cannot get enough MAC speak, My favorite line that they often throw out is
that Mac’s just work, well in reality, one would beg to differ, otherwise why
would you have &lt;a href=&quot;http://macfixitforums.com/&quot;&gt;macfixitforums.com&lt;/a&gt; (on the net for over 10 years and is now part
of CNET).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
OK enough picking on the guys who are going to take over the
world, we will need them someday soon the way things are going. But I digress;
my real topic today is that it is high time that Apple grow up. If you look
back at the old days, Apple created a unique buzz about being your own person,
that their technology, although ubiquitous, could be used by the buyer to be as
individualistic as they were. One of my favorite commercial sequences was the
ongoing debate between the corporate pitchman from &lt;a href=&quot;https://www.youtube.com/watch?v=C5z0Ia5jDt4&quot;&gt;Microsoft and the really hip Apple pitchman&lt;/a&gt;.
These commercials tried to show how Apple was the hip up and coming product
offering that would create disruption in the business world and Microsoft was the old stagnant way to do business, just throw money at it and raise prices. I am sure plenty
will debate that Apple did in fact accomplish a disruption in the market place, especially if you ask your
company IT administrator.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
In fact the debate continues to this very day. Tim Cook pointed out at the Worldwide Developers Conference this week that OS X Mavericks, which he said accounted for 51% of all Macs in use &quot;Is
the fastest adoption ever of any PC operating system in history. Now, you may
wonder how that compares to Windows. I knew somebody was going to ask, so I
made a chart.&quot;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
According to &lt;a href=&quot;http://www.computerworld.com/s/article/9248785/Cook_jabs_at_Windows_Android_in_WWDC_keynote&quot;&gt;Computerworld &lt;/a&gt;&amp;nbsp;the pie chart showed that Windows 8, which Microsoft launched in October
2012, owned a small sliver of Windows overall. &quot;It&#39;s at 14%. Need I say
more?&quot; Cook continued, to applause and laughter from the very pro-Apple
crowd.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Needless to say, it was not mentioned that the overall
numbers of Mac users still dwarf PC users and the fact that OS X Mavericks was
free, unlike Windows 8. However Windows 8.1 release which also was provided at
no charge was trending the same as OS X Mavericks. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
In the end though does any of this really matter? People should be tired of the gimmicks, Microsoft and Apple
should be focusing on building technology that improves the life of its users
and integrates with different technologies. One should not have to be forced to
use a PC or Mac to gain ubiquitous access to the overall suite of services.
What made these companies great is that they changed the way we viewed how
technology could improve our lives, it seems that it has moved towards who can
drive the bigger profit and maintain the greatest market share through
marketing and empty promises. It is time that both Apple and Microsoft get back
to the basics and improve their software and delvier the next breakthrough in
computer performance.&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/6979386133336754032/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2014/06/hey-mac-its-time-to-grow-up.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6979386133336754032'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6979386133336754032'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2014/06/hey-mac-its-time-to-grow-up.html' title='Hey MAC - It’s time to grow up'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYKTzWs3TBP1XtqSNwPwwg97N4RHOvl8spzqI5V62Ik3A7-AzzT3Bn1pL4mbLlb0GWKSGgsNDMIxR7yuYL90Ad8lnRdUi-ssoK284wdsDHQtBM5jmmcr0vWedNwbtat06BcA6WnpGAHpZd/s72-c/New+Bitmap+Image.bmp" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-402999615725972219</id><published>2014-06-02T09:47:00.000-04:00</published><updated>2014-06-02T09:48:14.058-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="box.com"/><category scheme="http://www.blogger.com/atom/ns#" term="dropbox"/><category scheme="http://www.blogger.com/atom/ns#" term="file sharing"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Do File Sharing Sites Provide Enough Security?</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;
  lang: en_US
&lt;/script&gt;
&lt;script data-counter=&quot;top&quot; data-url=&quot;http://www.todays-cloud.com/2014/06/do-file-sharing-sites-provide-enough.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;


&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIURhGKX6hvwxJSzLp-Bq-g0k8O-vRY0EJGuoJuRGwtZnn9RuLH75L7s2kaYrjQC2pb503WWiPkaD0dYTfaKHKzDbEw1m4eg48BuPS9ZlhpV0Hc-6yRmrFZFWD6ZGleBtP_O82UzSkAbD3/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIURhGKX6hvwxJSzLp-Bq-g0k8O-vRY0EJGuoJuRGwtZnn9RuLH75L7s2kaYrjQC2pb503WWiPkaD0dYTfaKHKzDbEw1m4eg48BuPS9ZlhpV0Hc-6yRmrFZFWD6ZGleBtP_O82UzSkAbD3/s1600/Untitled.png&quot; height=&quot;152&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;Whether you are a consumer or a business you must carefully consider what you are willing to put out in the public arena. Even if you believe your data is encrypted or protected by the provider, once it leaves your control, you have to accept the fact that you are relying on someone else to deliver the same level of care to your documents. On May 6th this year, ARS Technica published the following article, “&lt;a href=&quot;http://arstechnica.com/security/2014/05/dropbox-disables-old-shared-links-after-tax-returns-end-up-on-gooogle/&quot;&gt;Dropbox disables old shared links after tax returns end up on Google, Vulnerability that may also affect Box sent shared documents to Google AdWords&lt;/a&gt;.”&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;For most consumers, these file sharing sites are an easy way to share pictures with friends and families, but, more and more users are using these sites to store personal data. In fact, file sharing sites are expected to host more than &lt;a href=&quot;http://www.gartner.com/newsroom/id/2060215&quot;&gt;36% of personal data by 2016&lt;/a&gt;. While Dropbox did resolve the aforementioned issue, the question is not whether it is good enough, but rather when will the next vulnerability occur?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;As more and more businesses move to increase collaborative efforts between their employees and trading partners and utilize public File Sharing Sites, the Security Team has to be concerned with what data is leaving the firewall. Even with encryption at rest and encryption during transit, vulnerabilities will always be identified. Sometimes they are even trivialized until it becomes wide spread. Box.com, one of the larger file sharing sites for businesses posted the following on their &lt;a href=&quot;https://support.box.com/hc/communities/public/questions/200449446-Security-issue-it-s-possible-to-access-any-Box-account-without-authentication&quot;&gt;Box.Com blog&lt;/a&gt;:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;“Once someone has access to the user&#39;s auth-token they are able use that for browser login. &lt;b&gt;This is a known issue and was a product decision to leave in for Box Sync.”&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Is it fair to ask a company to protect data the same way for all customers? Does a large Enterprise require more security than a Small Enterprise and does a consumer need the same level of security? More security means more complexity and greater overhead for systems and bandwidth transfers. In reality each person and business needs to decide what data is relevant for file sharing services versus on premise solutions. If you are not comfortable with the data being exposed then you must look long and hard with keeping your sensitive data on someone else’s “secure” environment.&lt;/div&gt;
&lt;/div&gt;

</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/402999615725972219/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2014/06/do-file-sharing-sites-provide-enough.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/402999615725972219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/402999615725972219'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2014/06/do-file-sharing-sites-provide-enough.html' title='Do File Sharing Sites Provide Enough Security?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIURhGKX6hvwxJSzLp-Bq-g0k8O-vRY0EJGuoJuRGwtZnn9RuLH75L7s2kaYrjQC2pb503WWiPkaD0dYTfaKHKzDbEw1m4eg48BuPS9ZlhpV0Hc-6yRmrFZFWD6ZGleBtP_O82UzSkAbD3/s72-c/Untitled.png" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-6572558119009778208</id><published>2012-10-16T14:42:00.002-04:00</published><updated>2012-10-16T14:43:26.478-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Are You Maximizing Facebook for Your Business? </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2012/10/are-you-maximizing-facebook-for-your.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvUTcbfBrh2Fc441vtFTl-HXpK81stsTf5Q487PqMUb2h919gn_gwrat4iKsa2VHEp1jiqkhPQhs77TRcN0WdEDfZoDsYQQLYMrhUfb9Ay4LZhFWNAWlJreloCezlKBpG9IedomrXZkj3M/s1600/social-network-avg-age-distr-580px.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvUTcbfBrh2Fc441vtFTl-HXpK81stsTf5Q487PqMUb2h919gn_gwrat4iKsa2VHEp1jiqkhPQhs77TRcN0WdEDfZoDsYQQLYMrhUfb9Ay4LZhFWNAWlJreloCezlKBpG9IedomrXZkj3M/s320/social-network-avg-age-distr-580px.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Many businesses understand that they must have a social media strategy, but many companies do not fully understand how to accomplish this.  In order to be successful, let’s first understand the demographics of Facebook. According to a recent report on &lt;a href=&quot;http://royal.pingdom.com/2012/08/21/report-social-network-demographics-in-2012/&quot;&gt;Pingdom&lt;/a&gt;&amp;nbsp;the average age for a Facebook user is 40.5 years old. Here are some additional stats that may alter your way of thinking about Facebook, 65% of Facebook users are 35 or older and Facebook and Twitter have the same gender distribution: 40% male, 60% female.&lt;br /&gt;
&lt;br /&gt;
Here is what is truly interesting about the age trend for Facebook and Twitter. Compared to a previous survey Pingdom did &lt;a href=&quot;http://royal.pingdom.com/2010/02/16/study-ages-of-social-network-users/&quot;&gt;2.5 years ago&lt;/a&gt;, the age of the average Facebook user has gone up two years, while the age of the average Twitter user has gone down two years. In other words, Twitter’s user base is getting younger, while Facebook’s is getting older.&lt;br /&gt;
&lt;br /&gt;
So now that you understand who is using Facebook, let’s start to figure out how you maximize your exposure.  The first thing you need to consider is how to build a strong fan base. Your Facebook page can drive traffic to your website, increase sales and build customer loyalty, but like anything else you have to carefully create your presence. Make sure your page is using your company name and any specialized keywords that your business is typically found under.  &lt;br /&gt;
&lt;br /&gt;
You want your page to stand out from competitors, to do this, you need to engage your fan base, for example, you can customize the tabs of your page to highlight your business, including photos, videos, hot items and genera discussions. You also need to keep the content fresh, there is nothing like going back to a website several times to see no updates, so while it may take you some time each day, make sure you stay current with your content, otherwise your fan base will go elsewhere. If you want to grow your fan base quickly, Host contests or giveaways, according to Facebook, research by Forrester shows that contests, giveaways and promotions are the fastest ways to build fans to your page. &lt;br /&gt;
&lt;br /&gt;
Another great way to increase your exposure is to collaborate and connect with Facebook Applications, they are a great way to network and do business through your Page. Facebook has over 50,000 applications on its platform. There are Facebook apps available for everything, including Twitter, Wordpress, Google Reader, and many others. To get your business moving start with the following, and build from there, Add the RSS Feed application to incorporate your blog , add the LinkedIn Profile application to promote your LinkedIn account by posting a badge on your Page, add the Twitter application to incorporate your Tweets. &lt;br /&gt;
&lt;br /&gt;
Once you have built your page you need to gain exposure by getting everyone involved, don’t just put up a Business Page and forget about it. Monitor the feeds, make updates and discuss industry trends, product reviews and relevant events. Encourage employees to be active and participate on your Page. The more people involved on Facebook, the more exposure your company will receive  With fresh content and lots of activity, your Page will build in strength and become successful — no one will follow a stagnate page. You should also join other Facebook groups and become fans of other Business Pages to build a network of conversations &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
.

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/6572558119009778208/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/10/are-you-maximizing-facebook-for-your.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6572558119009778208'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6572558119009778208'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/10/are-you-maximizing-facebook-for-your.html' title='Are You Maximizing Facebook for Your Business? '/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvUTcbfBrh2Fc441vtFTl-HXpK81stsTf5Q487PqMUb2h919gn_gwrat4iKsa2VHEp1jiqkhPQhs77TRcN0WdEDfZoDsYQQLYMrhUfb9Ay4LZhFWNAWlJreloCezlKBpG9IedomrXZkj3M/s72-c/social-network-avg-age-distr-580px.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-4948980300728574435</id><published>2012-10-15T15:14:00.002-04:00</published><updated>2012-10-15T15:14:56.195-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Product Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Can we protect against nation-state espionage?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2012/10/can-we-protect-against-nation-state.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ8OnT85xDNYIlX2h4JQKihaELWPkAizoc6lpU6SL5Wv4b_iusBQfFGMrrFmlBXs1NwijlSgY6Zp8mlcvvX_yfx3UziGltMEqnD5zSIUaz3ynfH6g8vUbx3_iTUWQ9cHJCZD_kLABO_zBB/s1600/miniFlame-Infection-Stats.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;187&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ8OnT85xDNYIlX2h4JQKihaELWPkAizoc6lpU6SL5Wv4b_iusBQfFGMrrFmlBXs1NwijlSgY6Zp8mlcvvX_yfx3UziGltMEqnD5zSIUaz3ynfH6g8vUbx3_iTUWQ9cHJCZD_kLABO_zBB/s320/miniFlame-Infection-Stats.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Researchers at Kaspersky Lab have uncovered new nation-state espionage malware that has links to two previous identified espionage tools known as Flame and Gauss, and it appears to be a “high-precision, surgical attack tool” targeting victims in Lebanon, Iran and elsewhere.&lt;/div&gt;
&lt;br /&gt;
The new malware has been coined miniFlame, although the attackers who designed it called it by two other names – “SPE” and “John.” MiniFlame appears to be used to gain control of and obtain increased spying capability over select computers originally infected by the Flame and Gauss spyware.&lt;br /&gt;
&lt;br /&gt;
According to Wired, “It is the fourth piece of nation-state malware discovered in the last year that appears to have been created by the same group behind Stuxnet, the groundbreaking cyberweapon that sabotaged Iran’s nuclear program and is believed to have been created by the U.S. and Israeli governments. The others – all designed for espionage rather than destruction – are DuQu, Flame, and Gauss.”&lt;br /&gt;
&lt;br /&gt;
“With Flame, Gauss and miniFlame, we have probably only scratched [the] surface of the massive cyber-spy operations ongoing in the Middle East,” the Kaspersky researchers write in a report released Monday. “Their true, full purpose remains obscure and the identity of the victims and attackers remain unknown.”&lt;br /&gt;
&lt;br /&gt;
The report was released as the U.S. continues to make claims against China for its involvement in nation-state cyberespionage. Most notably are the alleged hacks against Google to obtain intelligence about political dissidents and against defense contractors to obtain military secrets.&lt;br /&gt;
&lt;br /&gt;
The risk with miniFlame/SPE malware is that it can be used on its own as a small, standalone data collection tool, or it can be inserted into Flame or Gauss. Until recently, it was assumed that Flame and Gauss were independent nation-state projects that had no connection; but the discovery of miniFlame is the first solid clue that the two projects came out of the same “cyberweapon factory” and were part of the same larger operation.&lt;br /&gt;
&lt;br /&gt;
While the targets appear to be focused on the Middle East, the question must still be answered as to how far this has spread and what information are these countries trying to obtain. While many of us feel that our data is protected and even if it is not, what is the real harm in being compromised, the bigger risk is what happens when the financial institutions are attacked – replacing a credit card is an inconvenient, not being able to use credit cards could impact a nation.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;em&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/4948980300728574435/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/10/can-we-protect-against-nation-state.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4948980300728574435'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4948980300728574435'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/10/can-we-protect-against-nation-state.html' title='Can we protect against nation-state espionage?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ8OnT85xDNYIlX2h4JQKihaELWPkAizoc6lpU6SL5Wv4b_iusBQfFGMrrFmlBXs1NwijlSgY6Zp8mlcvvX_yfx3UziGltMEqnD5zSIUaz3ynfH6g8vUbx3_iTUWQ9cHJCZD_kLABO_zBB/s72-c/miniFlame-Infection-Stats.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-3405992144735042063</id><published>2012-10-12T11:18:00.000-04:00</published><updated>2012-10-12T11:18:20.686-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Product Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Now it is Microsoft versus Google in German patent lawsuit</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/10/now-it-is-microsoft-versus-google-in.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfOrE_yTUtcSHgo7GB3-mqZlgVMkp76ZGb8PZQ-YcA8QfaNbjFDWCrXdogLSIeOj_BVHoGPrlBEQ9ilj0I7ppQqx7LT9CibCkoUlNOMGFIgVzjifDVU4K2ruoMEsXdMVhxPOR6MvvFYkuO/s1600/Microsoft-Vs_-Google.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfOrE_yTUtcSHgo7GB3-mqZlgVMkp76ZGb8PZQ-YcA8QfaNbjFDWCrXdogLSIeOj_BVHoGPrlBEQ9ilj0I7ppQqx7LT9CibCkoUlNOMGFIgVzjifDVU4K2ruoMEsXdMVhxPOR6MvvFYkuO/s320/Microsoft-Vs_-Google.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Yesterday Microsoft informed the judge that it will amend their patent infringement lawsuit against Motorola Mobility to include Google as a defendant. Microsoft is suing over European patent &lt;a href=&quot;http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&amp;amp;date=20000517&amp;amp;DB=worldwide.espacenet.com&amp;amp;locale=en_EP&amp;amp;CC=EP&amp;amp;NR=0845124B1&amp;amp;KC=B1&amp;amp;ND=4&quot;&gt;EP0845124&lt;/a&gt;, which covers a “computer system for identifying local resources and method therefore. The same technology is addressed in U.S. Patent no &lt;a href=&quot;http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&amp;amp;Sect2=HITOFF&amp;amp;d=PALL&amp;amp;p=1&amp;amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&amp;amp;r=1&amp;amp;f=G&amp;amp;l=50&amp;amp;s1=6240360.PN.&amp;amp;OS=PN/6240360&amp;amp;RS=PN/6240360&quot;&gt;6,240,360&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The German lawsuit, filed in April, goes after Android’s Google Map app, which Motorola spent a good amount of time yesterday denying Microsoft’s infringement accusations without ever getting into actual server process discussions. Microsoft has aggressively going after Android handset makers to agree to license agreements, including LG, Samsung and HTC. All have signed on to avoid the legal battle, which can put up to $15 per handset they sell.  &lt;br /&gt;&lt;br /&gt;Motorola has held out and had hoped that it’s acquisition by parent company Google would prevent Microsoft from taking them on – a strategy that has ultimately failed. Motorola has been forced to pull virtually all of their smartphones from retailers in Germany due to previous patent litigation with Apple and Microsoft. The move today is believed to show that the Android OS is not free and that the Windows Phone system would be a worthy alternative. &lt;br /&gt;&lt;br /&gt;Once again Patents will force manufacturer behavior, which will end up providing the consumer with little choice in which phone they can purchase. It would be interesting if these companies would put more of the legal costs into R&amp;amp;D and develop the next generation phone rather than continually fight each other for positioning. The concept of the strong will survive, now appears to mean that the one with the best lawyers will survive – not the best product!&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/3405992144735042063/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/10/now-it-is-microsoft-versus-google-in.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/3405992144735042063'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/3405992144735042063'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/10/now-it-is-microsoft-versus-google-in.html' title='Now it is Microsoft versus Google in German patent lawsuit'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfOrE_yTUtcSHgo7GB3-mqZlgVMkp76ZGb8PZQ-YcA8QfaNbjFDWCrXdogLSIeOj_BVHoGPrlBEQ9ilj0I7ppQqx7LT9CibCkoUlNOMGFIgVzjifDVU4K2ruoMEsXdMVhxPOR6MvvFYkuO/s72-c/Microsoft-Vs_-Google.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-8420323768715079122</id><published>2012-10-11T07:00:00.000-04:00</published><updated>2012-10-11T07:13:11.693-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><title type='text'>Tweeting Tips</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/10/tweeting-tips.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_5Fv5KZM-J-Q81IZMmPU-hZjDJneQ0pSAXBiAgFVsunKZ1jsbU0hJCXoQlbOiRDkDFKO6DLwkh61q0PKo6ajNca2lXVnLlcRxypZyW3eRfSULa0A51LjiixtXgI833_Cof9LRXcUlcP9k/s1600/twitter-bird-large.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_5Fv5KZM-J-Q81IZMmPU-hZjDJneQ0pSAXBiAgFVsunKZ1jsbU0hJCXoQlbOiRDkDFKO6DLwkh61q0PKo6ajNca2lXVnLlcRxypZyW3eRfSULa0A51LjiixtXgI833_Cof9LRXcUlcP9k/s1600/twitter-bird-large.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Twitter remains one of the top social media tools on the market today, according to Twitter they process 340,000,000 Tweets per day and have over 140,000,000 active users. With this kind of access one can imagine why Twitter remains a key tool for successful marketing strategies. While each organization will find a different level of success, there are a few tips to help maximize your success on Twitter.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
Keep your Tweet to 125 characters or less:&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
You only get 140 characters and the goal is not just to tweet your message but to get other people to re-tweet the message so you can maximize your coverage. If you max out, the retweet may cut off the last part of your message, and should that be the URL – you will impact the effect of the tweet. So try to keep your message short!&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
 Follow the right people:&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
The common misconception is that the more followers you have the better coverage you will get. The reality is that a more targeted approach generates greater results. You do not want to follow everybody that follows you – you need to do your homework and make sure the company or person you follow meets your standards.&lt;br /&gt;
&lt;br /&gt;
You are far better off having 25 super followers that are willing to retweet your message and or post about your products on their blog than trying to gain 6,000 random followers. A good place to start is trying to follow industry experts who do a lot of retweeting – the goal is to get your tweet retweeted. So you may wonder how you gain these super users, the first thing to do is to start following them, some will follow you back if your tweets have value to them. You should also follow their blog and comment as frequently as possible, this will most likely get you recognized and increase your odds of having your message picked up. &lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
 Utilize Twitter’s search feature:&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
One of the most underutilized feature available from Twitter is their search function,, located at &lt;a href=&quot;http://search.twitter.com/&quot;&gt;http://search.twitter.com&lt;/a&gt;. This search feature allows you to see what people are talking about in real time, which can change how you tweet. It is also recommended that you get an RSS feed for the keywords that are most important to you. You can do this on Twitter by clicking “RSS feed for this query” near the bottom of the page after entering a search term.&lt;br /&gt;
&lt;br /&gt;
In addition, you should be aware of which hashtags are critical for your industry and business. To identify the right hashtags for you, you can go to &lt;a href=&quot;http://www.hashtag.org/&quot;&gt;hashtags.org&lt;/a&gt;  and enter any hashtag and see how it’s trending. &lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
 The time of your Tweet is critical:&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
Most users of Twitter do not read tweets that are more than a few hours old, so you want to send your tweets during the optimal time of the day. The best time to do this is during business hours for the Eastern Time Zone. Retweeting tends to drop off by the end of the day. Of course each business is different so while this is a good general rule to follow, understand your industry may have a more optimal time, especially if you are focused globally. &lt;br /&gt;
&lt;div style=&quot;line-height: 16.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 11.5pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/8420323768715079122/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/10/tweeting-tips.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/8420323768715079122'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/8420323768715079122'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/10/tweeting-tips.html' title='Tweeting Tips'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_5Fv5KZM-J-Q81IZMmPU-hZjDJneQ0pSAXBiAgFVsunKZ1jsbU0hJCXoQlbOiRDkDFKO6DLwkh61q0PKo6ajNca2lXVnLlcRxypZyW3eRfSULa0A51LjiixtXgI833_Cof9LRXcUlcP9k/s72-c/twitter-bird-large.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-6503105964625051592</id><published>2012-10-10T06:58:00.001-04:00</published><updated>2012-10-10T19:33:34.602-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Walmart versus Amazon</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2012/10/walmart-versus-amazon.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM877094s9Ut5PEApwck9fN14hat-H2USexCaDnBvqyzi1WiRzOJSFVHzuTQQUsFLTrMWFTFjZqun2cm-djwBfospECALWKZRa-vxmKPD2GdCHylh2pDQfFjEsGoZLcHIAWKpjnzYpMqxN/s1600/walmart-truck-660x436.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;211&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM877094s9Ut5PEApwck9fN14hat-H2USexCaDnBvqyzi1WiRzOJSFVHzuTQQUsFLTrMWFTFjZqun2cm-djwBfospECALWKZRa-vxmKPD2GdCHylh2pDQfFjEsGoZLcHIAWKpjnzYpMqxN/s320/walmart-truck-660x436.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
The lines between on-line retailers and brick and mortar have
become blurred even further today as Walmart announces same day delivery in several
launch cities. In competing with Amazon (AMZN) and their push to &lt;a href=&quot;http://bits.blogs.nytimes.com/2009/10/15/amazoncom-introduces-same-day-delivery/&quot;&gt;deliver products the same day&lt;/a&gt; to meet consumer’s requirement for instant gratification, Walmart has conveniently launched their same
day delivery service jut in time for Christmas.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
For a flat $10.00 you can have all of your items delivered
the same day, Walmart intends to utilize their large quantity of store
locations to act as warehouses versus Amazon’s methodology of using
strategically place warehouses to support the same day shipping. In reality
Walmart has the distinct advantage since you can find them virtually everywhere
– this expands their product availability and allows them far more flexibility
in the shipping process.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Just like all things, the old become new – if you remember it
was predicted that on-line retailers would make the old brick and mortar stores
obsolete, and to a large degree we saw many icons collapse as on-line retailers
were able to offer lower cost for the same products (does anyone remember
Circuit City or Comp USA?). But in the end we have seen a integration of
on-line and brick and mortar, in rare instances the exclusive on-line or brick
and mortar store has been able to thrive, but the most successful ones had to
become more than just a one trick pony.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
\It will be interesting to see who ends up winning the holiday
season, Walmart or Amazon.&amp;nbsp; What I can predict
is that one of them will see their stock price soar while the other will see it
decline dramatically. Investors will be watching this battle closely to see
which power house retailer comes out on top.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based
services focusing on Product Management, Marketing and Security within the
Cloud. He has worked for EasyLink Services and Premiere Global Services in a
global role providing hosted services to Fortune 1000 clients. He is currently
seeking employment with a cloud based provider in a senior level
Product/Marketing role.&lt;/i&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/6503105964625051592/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/10/walmart-versus-amazon.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6503105964625051592'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/6503105964625051592'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/10/walmart-versus-amazon.html' title='Walmart versus Amazon'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM877094s9Ut5PEApwck9fN14hat-H2USexCaDnBvqyzi1WiRzOJSFVHzuTQQUsFLTrMWFTFjZqun2cm-djwBfospECALWKZRa-vxmKPD2GdCHylh2pDQfFjEsGoZLcHIAWKpjnzYpMqxN/s72-c/walmart-truck-660x436.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-7031756019748393946</id><published>2012-09-13T11:32:00.000-04:00</published><updated>2012-09-13T11:39:41.937-04:00</updated><title type='text'>Apple’s New iPhone 5</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/09/apples-new-iphone-5.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkS24wWTx-GA4BD97ZpVwT1pDun-AZcnrHHpGC9dwI47mawaB7x3Pax-VAl0Ax3gEMSntWKL4jYOg67O_24IbcxhHLHI_uttCa3l4b0TBMBCIeTEJ4lv3Mw7JAter7BxGOcNczu1BkPWpX/s1600/iphone5a.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkS24wWTx-GA4BD97ZpVwT1pDun-AZcnrHHpGC9dwI47mawaB7x3Pax-VAl0Ax3gEMSntWKL4jYOg67O_24IbcxhHLHI_uttCa3l4b0TBMBCIeTEJ4lv3Mw7JAter7BxGOcNczu1BkPWpX/s320/iphone5a.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Apple’s new smartphone is unleashed. Apple unveiled the iPhone 5, at a &lt;a href=&quot;http://www.wired.com/gadgetlab/2012/09/live-blog-apple-iphone-2012/&quot;&gt;press event&lt;/a&gt; in San Francisco’s Yerba Buena Center for the Arts on Wednesday.&amp;nbsp;Apple has made significant changes to the iPhone 5, which Apple is quite proud of. “We’ve updated every aspect of iPhone 5,” Apple’s SVP of Worldwide Marketing Phil Schiller said at the event. The device goes on sale September 21 and here are some of the major changes from previous versions. &lt;br /&gt;
&lt;br /&gt;
iPhone 5 provides a larger, 4-inch screen while utilizing a longer body, which also will provide another row of apps (because you can never have enough apps). This will also mean all apps will need to be updated to take advantage of the larger screen size, those apps that are built for the oler versions will still work, but will have black borders in the extra space. &lt;br /&gt;
&lt;br /&gt;
The iPhone 5 is thinner and lighter than older versions. The body is built entirely of glass and aluminum, and measures 7.6 mm thick and weighs 112 grams. The iPhone 5’s screen delivers a 326 PPI, 1136×640-pixel Retina display and provides a considerably sharper display than the previous apple phones. The iPhone 5 also features Apple’s latest processor, the A6 chip. The processor is two times faster than the A5 chip and is considerably smaller. That means better graphics performance in addition to iOS improvements and better gaming. Battery life is designed to last just as long even with the improved performance. Apple says that you should be able to get eight hours of talk time, eight hours browsing and 10 hours of video playback with the iPhone 5. &lt;br /&gt;
&lt;br /&gt;
The new iPhone 5 still uses the 8-megapixel sensor, but it is signifintly smaller than the camera in the iPhone 4S. There are also some great improvements, including a dynamic low-light mode, a better image-sensor processor, spatial noise reduction and a smart filter that can recognize where uniform color and texture should be within a shot. Despite the improvements, Apple claims the camera is 40 percent faster at taking photos.   &lt;br /&gt;
&lt;br /&gt;
Apple is now using three microphones to improve voice recognition and noise reduction. Apple also improved the iPhone 5’s speaker. The iPhone 5 will come with new Apple EarPods that the company claims are more durable, have a more natural fit, and boast impressive acoustic quality. &lt;br /&gt;
&lt;br /&gt;
One of the more frustrating change will probably be the elimination of the 30-pin dock connector. The iPhone 5 has a smaller, 8-pin dock connector, which Apple has named Lightning. Apple’s belief is that the world is relying more on wireless than hard connections.  Apple has worked with several manufacturers to create compatible accessories, but for those who do want to stick with their old accessories, Apple has made an adapter plug. &lt;br /&gt;
&lt;br /&gt;
In the U.S., the phone will be offered via AT&amp;amp;T, Verizon and Sprint on Sept. 21. The iPhone 5 will come in three storage sizes: 16GB, 32GB and 64GB, and will cost $200, $300, and $400, respectively, with a two-year contract. For those who want Apple’s latest creation in their hands on launch day, you can start pre-ordering the phone a week in advance, starting on Sept. 14.&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/7031756019748393946/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/09/apples-new-iphone-5.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/7031756019748393946'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/7031756019748393946'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/09/apples-new-iphone-5.html' title='Apple’s New iPhone 5'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkS24wWTx-GA4BD97ZpVwT1pDun-AZcnrHHpGC9dwI47mawaB7x3Pax-VAl0Ax3gEMSntWKL4jYOg67O_24IbcxhHLHI_uttCa3l4b0TBMBCIeTEJ4lv3Mw7JAter7BxGOcNczu1BkPWpX/s72-c/iphone5a.gif" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-4033721919030195085</id><published>2012-09-10T06:56:00.000-04:00</published><updated>2012-09-10T06:56:09.974-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><title type='text'>Marketing &amp; Blogs</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2012/09/marketing-blogs.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1zIBkLQoITbG_7MLcJJcC486ssn7E_Ue6IljCpvEobH_yxDDZ19axdNXlXoJ3rH0H57h1C4xRqqMt1i8x5Iy7OWSPmHe2SKBCM0Yx699Z0PNZhz-gvhNgIJ7B4Qz4eyrAxdMA2d_-Mnpk/s1600/blogger-logo-small.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;89&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1zIBkLQoITbG_7MLcJJcC486ssn7E_Ue6IljCpvEobH_yxDDZ19axdNXlXoJ3rH0H57h1C4xRqqMt1i8x5Iy7OWSPmHe2SKBCM0Yx699Z0PNZhz-gvhNgIJ7B4Qz4eyrAxdMA2d_-Mnpk/s320/blogger-logo-small.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
One of the challenges I have had to face with E-Marketing is how to build a message that people want to read. We know that the length of the message should be limited and the images should be catchy but is the reader really getting anything out of the message itself? &lt;br /&gt;
&lt;br /&gt;
One of the methods I have found to be successful is using a blog in conjunction with E-Marketing. Based on personal experience I saw a substantial increase in the number of page views on the blog after launching an E-Marketing campaign that pointed the reader to the blog. In my research, I found that most people view a blog as informational, whereas the corporate web site is viewed to sell you something.  People tend to let their guard down a little bit as they see the blog as informational; and less of a sales pitch. &lt;br /&gt;
&lt;br /&gt;
This allows you to accomplish your first objective, get the reader to execute the call to action. If the call to action is to have them view the blog and read the article and learn more about the company then this becomes a great tandem to be successful. &lt;br /&gt;
&lt;br /&gt;
Of course the real objective is not accomplished unless you can convert the reader into a sales prospect. So the Blog needs to have carefully placed touch points to promote your products. The E-Marketing to the Blog will increase brand awareness but it does not guarantee that the reader will take the next call to action. &lt;br /&gt;
&lt;br /&gt;
So how you do go about this? First do not try to write blog articles that are entirely about your product, company or any other hard sales approach. The articles should be relevant to your industry so that the right audience can take away valuable information if they read the blog. You should have a soft pitch at the end of the article and you should have carefully orchestrated ads on the Blog (just like they would see if you had Google ads on the site). &lt;br /&gt;
&lt;br /&gt;
The key here is to remember that people buy because they have a need; the need is different for each company in both requirements and timing. If you can build a readership base of your blog with valuable information that keeps readers coming back on their own, the end result will be that the prospect will contact you when his need becomes strong enough to make your product a top priority. Acquire enough readers and you will have a steady stream of hot prospects!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;i&gt;&lt;b&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/b&gt;&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/4033721919030195085/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/09/marketing-blogs.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4033721919030195085'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4033721919030195085'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/09/marketing-blogs.html' title='Marketing &amp; Blogs'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1zIBkLQoITbG_7MLcJJcC486ssn7E_Ue6IljCpvEobH_yxDDZ19axdNXlXoJ3rH0H57h1C4xRqqMt1i8x5Iy7OWSPmHe2SKBCM0Yx699Z0PNZhz-gvhNgIJ7B4Qz4eyrAxdMA2d_-Mnpk/s72-c/blogger-logo-small.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-4381740970946590249</id><published>2012-09-07T07:24:00.002-04:00</published><updated>2012-09-07T07:24:59.678-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Can The Internet Be Silenced?</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/09/can-internet-be-silenced.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRAe7q2-xbx_lohipQ0uzJVSy0pvkHjpzmCeY1Ey4QHJQJqKll0sJkc785Sugnepj8CjNecESnNocjxf6U_uWJc-dOkzeaEtdZ7H1AZWwPDpDje5nmQRVJfiM-_X_zQzNZgEvzSOPyrvDM/s1600/neutrality.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRAe7q2-xbx_lohipQ0uzJVSy0pvkHjpzmCeY1Ey4QHJQJqKll0sJkc785Sugnepj8CjNecESnNocjxf6U_uWJc-dOkzeaEtdZ7H1AZWwPDpDje5nmQRVJfiM-_X_zQzNZgEvzSOPyrvDM/s1600/neutrality.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Worldwide, suppression of free speech is growing and nowhere is that trend more evident than on the World Wide Web. The man who created the Web, Tim Berners-Lee, felt compelled to mention this trend while unveiling the newest report on how governments manage the online lives of their constituents. The bottom line, Berners-Lee said, is that there is no kill switch for Internet freedom. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;There is no off switch for the Internet, Sir Tim Berners-Lee, who&#39;s widely acknowledged as the father of the Web, said in London when launching the &lt;a href=&quot;http://thewebindex.org/2012/09/2012-Web-Index-Key-Findings.pdf&quot;&gt;World Wide Web Index report for 2012&lt;/a&gt;.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Growing suppression of free speech, both online and offline, is the major challenge to the Web&#39;s future, Berners-Lee stated. Countries in the Middle East as well as China, have continually attempted to suppress free speech, but information seems to find ways to get in and out of these countries. &lt;br /&gt;&lt;br /&gt;Even the United States has attempted to insert an Internet kill switch, but this was dropped after strong opposition from a wide spectrum of society here, including consumer advocates and privacy groups. Sen. Joseph Lieberman, who pushed for the kill switch provision to be included in the Protecting Cybersecurity as a National Asset Act, said in a TV interview that the US government should follow the lead of China in this area. &lt;br /&gt;&lt;br /&gt; Several Western democracies that scored high on the Web Index either monitor citizens&#39; access to the Internet or restrict it in some way. They include the UK and Australia, which scored 93.83 and 88.44 on the index, respectively. The US scored 97. &lt;a href=&quot;http://thewebindex.org/about/the-web-index/&quot;&gt;The Index&lt;/a&gt; assesses the use, utility and impact of the Web around the world. It looked at 61 countries With Sweden ranking number one followed by the US and the UK. respectively. &lt;br /&gt;&lt;br /&gt;Ultimately, the web provides access to content and information that just cannot be stopped, as long as there are social sites, information will continue to permeate throughout the world. In the end we as the people control the flow of content, there has been a substantial shift in the power of information as the web has been adopted by more countries and despite certain governments best efforts, there is just no way to silence our voices.&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;i&gt;&lt;b&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/b&gt;&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/4381740970946590249/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/09/can-internet-be-silenced.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4381740970946590249'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4381740970946590249'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/09/can-internet-be-silenced.html' title='Can The Internet Be Silenced?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRAe7q2-xbx_lohipQ0uzJVSy0pvkHjpzmCeY1Ey4QHJQJqKll0sJkc785Sugnepj8CjNecESnNocjxf6U_uWJc-dOkzeaEtdZ7H1AZWwPDpDje5nmQRVJfiM-_X_zQzNZgEvzSOPyrvDM/s72-c/neutrality.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-2967865323834350544</id><published>2012-09-06T06:03:00.000-04:00</published><updated>2012-09-06T06:03:16.434-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Java 7 Patch Contains Critical Vulnerability</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/09/java-7-patch-contains-critical.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh88ScoGDPe7MVOph8U5SAfx9Ff1amexw03-Umscg7ED-Q_C-sDAaI8viVLDzv_l5UaZdp0heT2hfUIGNASJCbvRuL-pDhYDmwqN7nXn_tiRymx9QfVtt15t3cASpUKZGtKOY5IVoYGQSL/s1600/191358-java_original.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh88ScoGDPe7MVOph8U5SAfx9Ff1amexw03-Umscg7ED-Q_C-sDAaI8viVLDzv_l5UaZdp0heT2hfUIGNASJCbvRuL-pDhYDmwqN7nXn_tiRymx9QfVtt15t3cASpUKZGtKOY5IVoYGQSL/s1600/191358-java_original.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
According to security researchers from Security Explorations, the Java 7 security update released Thursday contains a vulnerability that can be exploited to escape the Java sandbox and execute arbitrary code on the underlying system. &lt;br /&gt;&lt;br /&gt;Security Explorations sent a report about the vulnerability to Oracle on Friday together with a proof-of-concept exploit, Adam Gowdiak, the security company&#39;s founder and CEO said Friday via email. The company doesn&#39;t plan to release any technical details about the vulnerability publicly until Oracle addresses it, Gowdiak said. &lt;br /&gt;&lt;br /&gt;According to Gowdiak, Security Explorations privately reported &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/261612/oracle_knew_about_currently_exploited_java_vulnerabilities_for_months_researcher_says.html&quot;&gt;29 vulnerabilities in Java 7 &lt;/a&gt;to Oracle back in April, including the two that are now actively exploited by attackers. &amp;nbsp;The new vulnerability discovered by Security Explorations in Java 7 Update 7 can be combined with some of the vulnerabilities left unpatched by Oracle to achieve a full JVM sandbox bypass again. &lt;br /&gt;&lt;br /&gt;&quot;Once we found that our complete Java sandbox bypass codes stopped working after the update was applied, we looked again at POC codes and started to think about the possible ways of how to fully break the latest Java update again,&quot; Gowdiak said. &quot;A new idea came, it was verified and it turned out that this was it.&quot; &lt;br /&gt;&lt;br /&gt;Based on the experience of Security Explorations researchers with hunting for Java vulnerabilities so far, Java 6 has better security than Java 7. &quot;Java 7 was surprisingly much easier for us to break,&quot; Gowdiak said. &quot;For Java 6, we didn&#39;t manage to achieve a full sandbox compromise, except for the issue discovered in Apple Quicktime for Java software.&quot; &lt;br /&gt;&lt;br /&gt;The most recent security problems with Java are far from unique. Security firm Sophos, for example, blames underlying Java vulnerability for attacks by the &lt;a href=&quot;http://www.pcworld.com/article/253656/flashback_malware_puts_apple_in_security_spotlight_experts_weigh_in.html?tk=rel_news&quot;&gt;Flashback malware&lt;/a&gt; last April that infected one out of five Macs. &lt;br /&gt;&lt;br /&gt;The risks do not outweigh the rewards, security expert Dominique Karg, the founder and chief hacking officer of AlienVault, a security software company said. “I&#39;d say 90 percent of users don&#39;t need Java anymore, I consider myself a ‘power user’ and the last and only time I realized I had Java installed on my Mac was when I had to update it.” &lt;br /&gt;&lt;br /&gt;Most security researchers have said it before: If you don&#39;t need Java, uninstall it from your system.&amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role. &lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/2967865323834350544/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/09/java-7-patch-contains-critical.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/2967865323834350544'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/2967865323834350544'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/09/java-7-patch-contains-critical.html' title='Java 7 Patch Contains Critical Vulnerability'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh88ScoGDPe7MVOph8U5SAfx9Ff1amexw03-Umscg7ED-Q_C-sDAaI8viVLDzv_l5UaZdp0heT2hfUIGNASJCbvRuL-pDhYDmwqN7nXn_tiRymx9QfVtt15t3cASpUKZGtKOY5IVoYGQSL/s72-c/191358-java_original.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-9080422283569919550</id><published>2012-09-05T07:52:00.000-04:00</published><updated>2012-09-06T05:57:53.669-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Was The FBI Hacked?</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2012/09/was-fbi-hacked.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDvYvwPkIn9KuT4WeFyT_4iDkh058XxN5mnMq4tiWt9QW3TT_t1tNJKDVLo9GrPe7DbacM6FAQ8TRpZpHFo5iFHMdcB74W_OgPdwCNGzRqtHEAwmFwBWV0BIPbLoV2lCEte2WJmV0PY-FC/s1600/iphone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;256&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDvYvwPkIn9KuT4WeFyT_4iDkh058XxN5mnMq4tiWt9QW3TT_t1tNJKDVLo9GrPe7DbacM6FAQ8TRpZpHFo5iFHMdcB74W_OgPdwCNGzRqtHEAwmFwBWV0BIPbLoV2lCEte2WJmV0PY-FC/s320/iphone.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The Federal Bureau of Investigation is claiming that a statement made by members of AntiSec this weekend that they hacked the laptop of an FBI special agent and acquired a file containing 12 million Apple device IDs and associated personal information is completely false. The FBI also claims that is does not or ever did possess a file containing the data the hackers claim they stole. &lt;br /&gt;
&lt;br /&gt;
In a &lt;a href=&quot;http://www.fbi.gov/news/pressrel/press-releases/statement-on-alleged-compromise-of-fbi-laptop&quot;&gt;statement released on Tuesday September 4th&lt;/a&gt;, the FBI said, “The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs was exposed. At this time there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.” &lt;br /&gt;
&lt;br /&gt;
However, this weekend, &lt;a href=&quot;http://www.wired.com/threatlevel/2012/09/hackers-release-1-million-apple-device-ids-allegedly-stolen-from-fbi-laptop/?utm_source=Contextly&amp;amp;utm_medium=RelatedLinks&amp;amp;utm_campaign=Previous&quot;&gt;the hacker group AntiSec released an encrypted file&lt;/a&gt; that contained 1 million of the 12 million Apple device IDs and device names that the group said was obtained from an FBI computer they hacked. The hackers claim the original file contained 12 million IDs, including personal information, but they chose to releas only 1 million (minus the personal data) in an encrypted file and published it on torrent sites.&lt;br /&gt;
&lt;br /&gt;
The hackers &lt;a href=&quot;http://pastebin.com/nfVT7b0Z&quot;&gt;state in their post&lt;/a&gt;&amp;nbsp;that they released the Apple UDIDs so that people would know that the FBI may be tracking their devices and also because,  “we think it’s the right moment to release this knowing that Apple is looking for alternatives for those UDID currently … but well, in this case it’s too late for those concerned owners on the list.” A&lt;a href=&quot;http://corte.si/posts/security/udid-leak.html&quot;&gt;pple has been called out numerous times&lt;/a&gt;&amp;nbsp;for hard-coding the IDs in devices, since they can be misused by application developers and others to identify a user, when combined with other personal information, and track them. Last April, Apple began rejecting applications that track their UDIDs. &lt;br /&gt;
&lt;br /&gt;
In case you are concerned that your UDID has been leaked, the Next Web has &lt;a href=&quot;http://thenextweb.com/apple/2012/09/04/heres-check-apple-device-udid-compromised-antisec-leak/&quot;&gt;developed a tool&lt;/a&gt; for users to check if their Apple UDID is among those that the hackers released over the weekend. For years I have had to listen to MAC users tell me how they do not get viruses and that the PC is a bad knock off of Apple&#39;s design, and I am not totally in disagreement here, but all technology has design flaws and given time and desire, someone will find a way to exploit it. This once again comes down to how the company will react and modify their behavior to protect consumes and enterprises. &lt;br /&gt;
&lt;br /&gt;
While we may see this issue as being exclusively related to the consumer who buys the Apple product, more and more enterprises are permitting employees to&amp;nbsp;their&amp;nbsp;bring your own devices to use at the company, this equipment will find its way on to the enterprise network and can potentially compromise corporate data. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/9080422283569919550/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/09/was-fbi-hacked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/9080422283569919550'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/9080422283569919550'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/09/was-fbi-hacked.html' title='Was The FBI Hacked?'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDvYvwPkIn9KuT4WeFyT_4iDkh058XxN5mnMq4tiWt9QW3TT_t1tNJKDVLo9GrPe7DbacM6FAQ8TRpZpHFo5iFHMdcB74W_OgPdwCNGzRqtHEAwmFwBWV0BIPbLoV2lCEte2WJmV0PY-FC/s72-c/iphone.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-959742526901112176</id><published>2012-09-04T09:25:00.000-04:00</published><updated>2012-09-05T05:05:23.285-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Malware Attacks Explode In 2012</title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script data-counter=&quot;right&quot; data-url=&quot;http://www.todays-cloud.com/2012/09/malware-attacks-explode-in-2012.html&quot; type=&quot;IN/Share&quot;&gt;&lt;/script&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7mq7CHkQlw4EMh9GvbE3Eml7br5BJJHxrhCtJ8l75pIME0LoAMTI1S-YU0Djt3hUtyEU6fPvhNAAZkBoIpvb7N4QIco3z6SP-rQoReLUFYUxNLPJXfp_cR1UGsPSdUPVbKt4jkLeTUyW3/s1600/malware-11353365-11403408.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7mq7CHkQlw4EMh9GvbE3Eml7br5BJJHxrhCtJ8l75pIME0LoAMTI1S-YU0Djt3hUtyEU6fPvhNAAZkBoIpvb7N4QIco3z6SP-rQoReLUFYUxNLPJXfp_cR1UGsPSdUPVbKt4jkLeTUyW3/s320/malware-11353365-11403408.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
According to &lt;a href=&quot;http://www2.fireeye.com/advanced-threat-report-1h2012.html&quot;&gt;The third edition of the FireEye Advanced Threat Report&lt;/a&gt;, “Compared to the second half of 2011, the number of infections per company rose by 225% in the first half of 2012. If you compare the first six months of 2011 with the first six months of 2012, the increase seen is even larger at 392%.” &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
The following is a summary of the key findings that the report found: &lt;br /&gt;
&lt;br /&gt;
• Organizations are seeing a massive increase in advanced malware that is bypassing their traditional security defenses. &lt;br /&gt;
&lt;br /&gt;
• The patterns of attack volumes vary substantially among different industries, with organizations in healthcare and energy/utilities seeing particularly high growth rates. &lt;br /&gt;
&lt;br /&gt;
• The dangers posed by email-based attacks are growing ever more severe, with both link- and attachment-based malware presenting significant risks. &lt;br /&gt;
&lt;br /&gt;
• In their efforts to evade traditional security defenses, cybercriminals are increasingly employing limited-use domains in their spear phishing emails. &lt;br /&gt;
&lt;br /&gt;
• The variety of malicious email attachments is growing more diverse, with an increasing range of files evading traditional security defenses. &lt;br /&gt;
&lt;br /&gt;
The reality is that hackers are becoming more innovative than the intrusion software consumers and enterprises run to protect themselves. To make matters worse the anti-virus software has become almost as intrusive as the viruses. I have one Laptop that is less than two years old running Windows 8 (with no issues) and Norton Anti-Virus provided by Comcast. I had to shut off the E-mail Anti-Virus module because it was literally bringing the machine to a crawl. &lt;br /&gt;
&lt;br /&gt;
If the protection software becomes too over bearing, it will kill productivity, so ideally the threat protection should occur prior to the mail infrastructure, but this will mean new appliances and new methods to detect an ever changing hacking model. &lt;br /&gt;
&lt;br /&gt;
The report found that hackers have increased the number of &quot;throwaway&quot; domains used in phishing E-mails in order to evade technologies that rely on domain reputation analysis and URL blacklists. The number of domains used fewer than ten times rose 45 percent from the second half of 2011. &quot;The domains are so infrequently used that they fly under the radar of URL blacklists and reputation analysis and remain largely ignored and unknown,&quot; the report says. For those readers looking for more information on phishing attacks, check out PCWorld’s article &lt;a href=&quot;http://www.pcworld.com/article/229361/4_security_tips_spurred_by_recent_phishing_attacks_on_gmail_hotmail_and_yahoo.html?tk=rel_news&quot;&gt;4 Security Tips Spurred by Recent Phishing Attacks on Gmail, Hotmail, and Yahoo&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The bottom line is that phishing attacks have become part of the Internet culture, playing it safe is and questioning anything that seems too good to be true or does not make sense is a great way to stay ahead of the hackers.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/959742526901112176/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/09/malware-attacks-explode-in-2012.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/959742526901112176'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/959742526901112176'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/09/malware-attacks-explode-in-2012.html' title='Malware Attacks Explode In 2012'/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7mq7CHkQlw4EMh9GvbE3Eml7br5BJJHxrhCtJ8l75pIME0LoAMTI1S-YU0Djt3hUtyEU6fPvhNAAZkBoIpvb7N4QIco3z6SP-rQoReLUFYUxNLPJXfp_cR1UGsPSdUPVbKt4jkLeTUyW3/s72-c/malware-11353365-11403408.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-2787983127880170109</id><published>2012-08-31T09:51:00.000-04:00</published><updated>2012-08-31T09:51:03.831-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Media"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>#help! Japan is Considering Using Twitter and Social Networks for Emergency Notifications </title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/08/help-japan-is-considering-using-twitter.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBMPvqcbSyWZl4kddh9_zN7nT4HDgNAIXX18x9p4bZwH9BDSQ1pOP2itNXpTGcDzPpALYpNbhKyH1C0P4pSGiJnfrbtVsNdZwh6p0nUq0tnt99F4fjQXdwkocv926vhz4R9Wg6-7sBsD3u/s1600/electricity.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBMPvqcbSyWZl4kddh9_zN7nT4HDgNAIXX18x9p4bZwH9BDSQ1pOP2itNXpTGcDzPpALYpNbhKyH1C0P4pSGiJnfrbtVsNdZwh6p0nUq0tnt99F4fjQXdwkocv926vhz4R9Wg6-7sBsD3u/s320/electricity.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
On Wednesday the Japanese government hosted a panel discussion in Tokyo to discuss placing emergency calls through social networks during natural disasters, as reported by &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/261579/help_japan_mulls_911_emergency_calls_from_twitter_social_networks.html&quot;&gt;PCWorld&lt;/a&gt;. This was the first event of a three part program that will run through March of next year to discuss how to use social media during large disasters. The panel included the head of Twitter Japan as well as Yahoo Japan officials. &lt;br /&gt;&lt;br /&gt;The thought is that when traditional voice-based infrastructure is impacted the social network might be a better alternative to process emergency requests. During Japan’s Earthquake that impacted several nuclear power plants, many of the Japanese citizens were only able to get updated information via the social network. The culture is quite fanatic about using cell phones and social media, so the government see this as a natural evolution for their emergency communication strategy. &lt;br /&gt;&lt;br /&gt;On the surface this sounds like a practical and plausible solution to a difficult situation, however having managed a notifications platform, there is a lot of concern from a product perspective. Posting content and accessing the social media is only viable if the people have access to the service, cell phone service is not designed for the level of usage that occurs during a disaster. Alert notifications are a great tool, but you must have reserved capacity and if you are only using the service on rare occasion, your cost for reserving the bandwidth could become quite expensive over time. &lt;br /&gt;&lt;br /&gt;But let’s assume the government can solve the bandwidth issue, now the question comes around geo-presence, how do you know where the person is if they are using it to tweet in an emergency? Yes the phone probably has a GPS chip and the location can be triangulated to near proximity of the cell tower, but how do you control this, how do you use it only in an emergency? You could probably build an app for this, but that would mean that now everyone has to install the application to tweet in an emergency and how do you train the masses on how to use the social network? &lt;br /&gt;&lt;br /&gt;Finally, and this is my biggest concern, how do you prevent hacking, both on the notification and 911 inbound tweets. None of the social media sites that I have used provide any moderator level controls, which means if the government Twitter account gets hacked and someone send out an emergency alert, there would be wide spread panic. &lt;br /&gt;&lt;br /&gt;Don’t get me wrong, these are the right discussion to be having, we need to find new ways to communicate to large groups of people, especially in a disaster, but if we are going to enlist the use of social media then these service providers have to find a way to manage security beyond their current methods. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/2787983127880170109/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/08/help-japan-is-considering-using-twitter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/2787983127880170109'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/2787983127880170109'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/08/help-japan-is-considering-using-twitter.html' title='#help! Japan is Considering Using Twitter and Social Networks for Emergency Notifications '/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBMPvqcbSyWZl4kddh9_zN7nT4HDgNAIXX18x9p4bZwH9BDSQ1pOP2itNXpTGcDzPpALYpNbhKyH1C0P4pSGiJnfrbtVsNdZwh6p0nUq0tnt99F4fjQXdwkocv926vhz4R9Wg6-7sBsD3u/s72-c/electricity.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-4689177450143237846</id><published>2012-08-30T09:38:00.000-04:00</published><updated>2012-08-30T09:38:09.193-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>AMD’s New Buzz Word “Surround Computing” </title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/08/amds-new-buzz-word-surround-computing.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5g61mWwp-0jM4NcLunzc62rwj_-Dvxm7BDOK0UGLeHgFS46uR9oQmSr4GHYOgWJPmeMLGtGMEgOpXDjNSGD1lmiZrlR2FX3913TMRRxsWMQ58lj8SjVKTke7mo7imvgu-gSFW_2B7tdNq/s1600/OB-UI941_paperm_E_20120829131431.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5g61mWwp-0jM4NcLunzc62rwj_-Dvxm7BDOK0UGLeHgFS46uR9oQmSr4GHYOgWJPmeMLGtGMEgOpXDjNSGD1lmiZrlR2FX3913TMRRxsWMQ58lj8SjVKTke7mo7imvgu-gSFW_2B7tdNq/s320/OB-UI941_paperm_E_20120829131431.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Mark Papermaster, the IBM executive who was named AMD’s chief technology officer last year, prompted discussion on Tuesday at the &lt;a href=&quot;http://www.hotchips.org/&quot;&gt;Hot Chips&lt;/a&gt; conference in Silicon Valley to promote “surround computing” a concept that will usher in an era where the intelligence delivered through microprocessors becomes a built-in functionality that integrates into all devices around us. &lt;br /&gt;&lt;br /&gt;Papermaster described a world in which natural user interfaces such as gestures, fingerprints and facial recognition replace keyboards, touchscreens and mice for interactive experiences on tablets and other devices. That integration can help users connect in a more natural way with their hardware but ultimately would require more power for servers to keep up with the increased flow of information being processed. &lt;br /&gt;&lt;br /&gt;While everyone is always intrigued with the hologram keyboard that is often used in movies or the slick hand movements that pull up video and content, like in the minority report, the reality is that we are a few years away from that and probably a decade away before it becomes something you would see in a home. &lt;br /&gt;&lt;br /&gt;I enjoy the competition that AMD and Intel have built over the last decade, and chip performance has certainly improved over that time, but the amount of data and processing needed to deliver these types of enhancements may make the financial cost somewhat impractical, not to mention the peripheral devices needed to interact with the user and the machine. Speech recognition programs have been around for years and despite the best technical minds and improved processing speed, they still do not function at the level that we have come to accept in our movies. &lt;br /&gt;&lt;br /&gt;Perhaps the most comical example come from &lt;a href=&quot;http://www.imdb.com/title/tt0092007/&quot;&gt;Star Trek IV: The Voyage Home&lt;/a&gt;, when Scotty is trying to build the glass needed to contain the water to transport the whale and he starts off by saying, “computer”, and the owner looks at him and points to the mouse and he picks it up and says “computer”. The irony is that we have envisioned computer interactive designs for over 50 years, so I guess another decade is probably to be expected, at least the chip manufactures are thinking along the next generation of productivity. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/4689177450143237846/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/08/amds-new-buzz-word-surround-computing.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4689177450143237846'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/4689177450143237846'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/08/amds-new-buzz-word-surround-computing.html' title='AMD’s New Buzz Word “Surround Computing” '/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5g61mWwp-0jM4NcLunzc62rwj_-Dvxm7BDOK0UGLeHgFS46uR9oQmSr4GHYOgWJPmeMLGtGMEgOpXDjNSGD1lmiZrlR2FX3913TMRRxsWMQ58lj8SjVKTke7mo7imvgu-gSFW_2B7tdNq/s72-c/OB-UI941_paperm_E_20120829131431.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5365295076574010086.post-840623143191022534</id><published>2012-08-29T07:48:00.000-04:00</published><updated>2012-08-29T07:48:25.116-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>VMware’s New vCloud 5.1 Makes Data Centers Virtual </title><content type='html'>&lt;script src=&quot;//platform.linkedin.com/in.js&quot; type=&quot;text/javascript&quot;&gt;&lt;/script&gt;
&lt;script type=&quot;IN/Share&quot; data-url=&quot;http://www.todays-cloud.com/2012/08/vmwares-new-vcloud-51-makes-data.html&quot; data-counter=&quot;right&quot;&gt;&lt;/script&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA54Q9A2mP4D-NbJZuxgk-xzC86lOuF4jQ0I3OqRptAys18XVCnvbyzT2XeptT6hdzOErc8CHBFnJpCh6x4likHc2JEyq8ZP_psWjERK3EeauU5rxmDJ5h1UJj70qazpICwDM6Oj_CI1Vg/s1600/image0041247599374489.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA54Q9A2mP4D-NbJZuxgk-xzC86lOuF4jQ0I3OqRptAys18XVCnvbyzT2XeptT6hdzOErc8CHBFnJpCh6x4likHc2JEyq8ZP_psWjERK3EeauU5rxmDJ5h1UJj70qazpICwDM6Oj_CI1Vg/s320/image0041247599374489.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
According to VMware, VMware vCloud® Director™ (vCloud Director) orchestrates the provisioning of software-defined datacenter services, to deliver complete virtual datacenters for easy consumption in minutes. Software-defined datacenter services and virtual datacenters fundamentally simplify infrastructure provisioning and enable IT to move at the speed of business. &lt;br /&gt;&lt;br /&gt;So what are you really getting? Conceptually this is a very neat package of utilizing data center services (compute, storage, networking, security and availability) into a software on-demand construct.. The vCloud Suite 5.1 is built on an updated version of &lt;a href=&quot;http://www.vmware.com/files/pdf/techpaper/Whats-New-VMware-vCloud-Director-51-Technical-Whitepaper.pdf&quot;&gt;VMware vSphere 5.1&lt;/a&gt; and includes over 100 enhancements. &lt;br /&gt;&lt;br /&gt;What appears promising about this design is the ability to manage flow resources across systems and workloads, along with privatizing the cloud infrastructure and securing the network. However there are skeptics. In an interview with TechNewsWorld, John Vincenzo, vice president of marketing at &lt;a href=&quot;http://www.embrane.com/&quot;&gt;Embrane&lt;/a&gt; stated that this is &quot;basically a small evolution of the classical virtual appliance approach, there&#39;s no scale-out architecture, with no elasticity.&quot; &lt;br /&gt;&lt;br /&gt;The next round of designs will need to incorporate the ability to increase demand as needed (including interoperability with different hardware architecture), reduce demand as needed and park applications when necessary. The software appears to be headed in the right direction and should foster some strong innovation on the data center management front. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;Frank Toscano is a 15+ year specialist in cloud based services focusing on Product Management, Marketing and Security within the Cloud. He has worked for EasyLink Services and Premiere Global Services in a global role providing hosted services to Fortune 1000 clients. He is currently seeking employment with a cloud based provider in a senior level Product/Marketing role.&lt;/i&gt;&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.todays-cloud.com/feeds/840623143191022534/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.todays-cloud.com/2012/08/vmwares-new-vcloud-51-makes-data.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/840623143191022534'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5365295076574010086/posts/default/840623143191022534'/><link rel='alternate' type='text/html' href='http://www.todays-cloud.com/2012/08/vmwares-new-vcloud-51-makes-data.html' title='VMware’s New vCloud 5.1 Makes Data Centers Virtual '/><author><name>Frank Toscano</name><uri>http://www.blogger.com/profile/11054295103220666459</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA54Q9A2mP4D-NbJZuxgk-xzC86lOuF4jQ0I3OqRptAys18XVCnvbyzT2XeptT6hdzOErc8CHBFnJpCh6x4likHc2JEyq8ZP_psWjERK3EeauU5rxmDJ5h1UJj70qazpICwDM6Oj_CI1Vg/s72-c/image0041247599374489.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>