Author Archives: CloudTweaks

Building Trust In The Cloud

Building Trust In The Cloud

Building Trust In The Cloud Security has always been a pressing issue whenever sensitive data is involved no matter what. The problem, however, is compounded by the ever increasing complexity of technology and the sheer number people and businesses that have access to your data. With billions of people having access to the internet, that is a…

Net Neutrality Is Not Needed In Next Generation Networks

Net Neutrality Is Not Needed In Next Generation Networks

Next Generation Networks I have always marveled at how quickly the Information Technology landscape has changed. A prime example of the magnitude of the change comes from my two daughters. Although my oldest girl has barely reached school age, she grew up at a time when it was still common to read newspapers. As a…

Cloud Infographic – Workplace Tech

Cloud Infographic – Workplace Tech

Workplace Tech Revolution – Key Trends BYOD has been discussed on CloudTweaks several times over the past number of years. As mobile workforce management tools and techniques have matured, more companies have been able to integrate them. According to IDC analysts Christopher Chute and Raymond Boggs, this has been especially advantageous for small and medium-sized…

XERO – iPad Accounting Now Available

XERO – iPad Accounting Now Available

iPad Accounting Now Available SAN FRANCISCO, CA, March 5, 2015 – Xero (@Xero) for Apple® iPad® is available immediately in global Apple® iTunes® stores. Building on its award-winning Web application for all devices and platforms, Xero has been redesigned to complement the simple aesthetic principles and unique capabilities of the Apple® iPad®. Xero is used millions…

The Untaggables: Allocating All Cloud Costs

The Untaggables: Allocating All Cloud Costs

The Untaggables: Allocating All Cloud Costs Enterprises often use tags to organize and optimize cost allocation. Although AWS services like EC2, EBS, RDS, and S3 can be tagged, there are many that can’t, making it quite difficult to allocate their cost. We previously touched on the basics of cloud resource tagging in an early post.…

Video Conferencing For Effective Customer Engagement

Video Conferencing For Effective Customer Engagement

Video Conferencing for Effective Customer Engagement It’s no small feat to consistently engage with customers; if you want to connect with prospective clients from around the world, this task gets even more daunting. Thankfully, cloud based video conference technology from companies like Blue Jeans makes it possible not only to contact and communicate with people…

Popular

Top Viral Impact

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising