Cloud News Round Up – February 2nd

Cloud News Round Up – February 2nd

Cloud news weekly roundup

HP-logo

HP To Provide Cloud Computing to UK Educational Institutions – It seems that essays and study schedules aren’t the only thing that higher and further educational institutes are up to in the UK, as large amounts of both student and curriculum-related data has necessitated the need for cloud computing to store it all. The UK education industry administrative systems supplier has hand-picked HP to provide the cloud storage service, covering more than 150 Further Education colleges and over 100 Higher Education universities, meaning that thousands of UK students will be involved in cloud tech in some way. The deal has already been signed between HP Enterprise Services and UNIT4 Business Software, meaning that the service could be rolled out in the UK soon.

IBM Unveil Cloud-Based HR Service – The news that Lenovo have bought some of IBM’s low-end servers to power their cloud offerings may still be fresh in the media’s eyes and headlines but now, it seems that even with this sale, IBM themselves are not looking to ditch cloud tech altogether, recently unveiling the ‘IBM Kenexa Talent Suite’. Powered by the cloud, the Kenexa Talent Suite allows Human Resource departments and hiring managers to have a greater knowledge about their employees’ feelings and thoughts. Kenexa helps HR put together stats from across social, big data and analytical lines from places social media sites and it can even offer up more info about work experience, letting companies hire more efficiently, being able to find better suited workers or to just help them in promoting employees that they already have, features which could make the Kenexa Talent Suite an incredibly useful business tool.

CloudLock Secure $16.5 Million in Funding – CloudLock, a business that adds security to your data even when you upload it into the cloud, has just successfully raised $16.5 million in a recent round of funding. The funding is said to allow CloudLock to hire more employees, expanding its current workforce of 52 people, as well as letting them expand into new markets, which will perhaps bring even more cloud data safety to our phones and computers than CloudLock have brought users previously.

By Jennifer Livingstone

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…