View Post

Can DNA Be the Next Big Thing in Data Storage?

In Big Data by Daniel Newman2 Comments

The world’s data is growing too quickly for our current storage mechanisms. Humans generate hundreds of millions of bytes of data every day. We overload servers that take up a large amount of physical space, power, and energy. A recent breakthrough in DNA data storage may hold the answer—in a much smaller and more durable medium than giant data centers. …

View Post

Biometrics and Extending the Function of Digital Signage

In Technology by Daniel NewmanLeave a Comment

This post is sponsored by Samsung Business. All thoughts and opinions are my own. Digital signage has yet to reach its full potential, but a new technology is taking it to the next levels of interaction and customization. Biometric technologies—such as iris, fingerprint, and face scanners—are changing the medium as we know it. As I mentioned back in April, digital signage …

View Post

Big Data Segmentation and the Power of Small Data Analysis

In Big Data by Daniel NewmanLeave a Comment

While the Internet of Things (IoT) has caused many businesses to shift their focus toward big data, many forward-thinking individuals are considering the importance of small data. Big data analysis has obvious benefits, but early adopters of data segmentation and small data collection will reap long-term benefits. Do Not Forget About Small Data Digital transformation has, in part, been about …

View Post

Beyond Cloud Adoption to Cloud-First

In Cloud by Daniel Newman1 Comment

Odds are good you’ve adopted some form of the cloud by now, and you’re ready to sit back and enjoy the results. Before you kick up your heels, however, you may want to reevaluate the extent to which you are using the cloud. Cloud-first companies are quickly surpassing those that simply adopt the technology without widespread usage—but luckily, you can …

View Post

Cloud Computing Ate My Computer

In Cloud by Daniel NewmanLeave a Comment

The business world takes advantage of cloud computing more extensively than individual users, but this is poised to change. A number of tech companies are exploring ways to put personal computers entirely in the cloud, eliminating the need for physical storage space and hardware upgrades. Sixa is one such company at the forefront of this movement. Sixa’s efforts began with …

View Post

Creating Mobile Computing Experiences

In Mobility, Security by Daniel NewmanLeave a Comment

The advent of smartphones created the desire for full functionality that fits in the palm of your hand. Apps have become a mainstay of mobile technology, offering specialized functionality in an incredibly vast spectrum of customer desires and interests. Now, mobile technology is a lynchpin of modern business. Users don’t simply want a smartphone—they’re looking for mobile computing experiences. Experience …

View Post

Redirecting Dead-ends in App Development and Beyond

In Technology by Daniel NewmanLeave a Comment

Onboarding, or getting new users familiar with your application, is one of the most critical steps to an app’s success or failure. A confusing or boring onboarding process can alienate users before they even start. Therefore, a key part of the development of new apps needs to be designing an engaging onboarding process. Understanding Onboarding Successful onboarding has many factors. …

View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

View Post

Converting Shadow IT into Change Adoption

In CIO/IT by Daniel NewmanLeave a Comment

Fast-paced technological advances have inadvertently opened the door to increased risks from shadow IT. Cloud-based solutions have given non-IT professionals the opportunity to create and implement applications that expedite workflow. Without being able to control or secure these on-the-fly solutions, chief information officers (CIOs) may see the movement as a security threat. However, efforts to squash the rise of shadow …