dcsimg

Will The Cloud Be An Advantage in 2012 Election Season?

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


This week Microsoft, along with partner Synteractive, created a buzz at the Web 2.0 Expo in New York when they discussed how a combination of cloud computing and social media can play a huge role in the upcoming 2012 election process.

Microsoft's Townhall platform enables citizens to participate in the electoral process through online media. The code for Townhall is provided by Microsoft as open source software, and it utilizes the Windows Azure cloud platform. The first time the House Republicans used it, it drew 400,000 users in the first week.

This week Microsoft, along with partner Synteractive, created a buzz at the Web 2.0 Expo in New York when they discussed how a combination of cloud computing and social media can play a huge role in the upcoming 2012 election process.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • CEOs, CIOs, boards and shareholders are demanding digital transformation. They want their organizations to be more customer-focused, competitive and strategic to increase revenue. Data drives all of those aspects. A great first step in optimizing data use is moving data to the cloud. It can quickly show benefits. Here are six aspects of a cloud data management strategy that will help your organization more fully move, manage and use valuable data to successfully support digital transformation.

  • The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations striving to realize the full potential of the EoT must also be able to confidentially and reliably transmit highly sensitive data between connected devices. Read this white paper to discover the best cybersecurity strategies to get …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.