Author Archives: John

Scalability, Simplicity And Velocity On The Cards Of IBM’s New PureSystems Upgrade

Scalability, Simplicity and Velocity on the Cards of IBM’s New PureSystems Upgrade Last week, International Business Machines (IBM) had rolled out an upgrade of its PureSystems in a push towards handling gargantuan terabytes of data with an ease and scalability not apparent in the previous edition. The team behind the upgrade has given a green…

Rackspace Has Nipped Vendor Lock-in By Hiring Executive From ‘Land Down Under’

Rackspace Has Nipped Vendor Lock-in by Hiring Executive from ‘Land Down Under’ The global technology giant in cloud hosting and computing, Rackspace, has had its brimful of technological firsts, but it now has an even more clear-sighted breakthrough after hiring the former Chief Information Officer at Altium, Alan Perkins. Alan Perkins will now major as…

A Cloud Computing Super Drive: Creating Traction Of Auto Parts

A Cloud Computing Super Drive: Creating Traction of Auto Parts Software as a Service (SaaS) is the main ingredient for the traction of auto parts from manufacturing to distribution stages. Many companies in the auto industry are using this budget-worthy provision of cloud computing to help make a cheap, highly efficient vehicle whose every part…

Cloud Trend: Global Logistics Companies In Search Of Optimal Performance

Cloud Trend: Global Logistics Companies In Search Of Optimal Performance Though logistics has always been an inherent part of Information Technology, supply and transportation niches, it has never been as international as it is now. Due to the emergence of the cloud as the preferential storage and communication network, changes are coming knocking. One may…

What Governments Are Thinking About Cloud Security

What Governments Are Thinking About Cloud Security The take of any government on cloud security is an interesting and vital issue towards better safety standards. Analysts define the governmental role as important in integrating multi-tenancy app development, access layers and infrastructure parts of the cloud through firm policies. Governing the keeping, utility and accessibility of…

The Big Bang Theory Of The Cloud And Educational Resources

The Big Bang Theory of the Cloud and Educational Resources Educational resources on the cloud are almost theoretical in scope because they comprise of hitherto unexploited beginnings. Look at pedagogy for example which faces the challenge of defining an instructional methodology in schools using new software resources and methods like the interactive Student Information Systems.…

Top 25 European Rising Stars 2012 – Adpoints

Top 25 European Rising Stars 2012 – Adpoints

Top 25 European Rising Stars 2012 – Adpoints ……Adpoints Adds Points Advertising Videos Selectively in the Cloud TV station…? Internet website…? Adpoints, to be sure, straddles both worlds. It might be a television channel to some whereas to others it is a cloud tool with a site of its own for selective ad viewing. It…

Top 25 Rising European Stars 2012 – Besol Tapp

Top 25 Rising European Stars 2012 – Besol Tapp

Top 25 Rising European Stars 2012 – Besol Tapp …Tapp Scores a Hat Trick via Semi-Autonomous Cloud Management Interface After making it to the prestigious shortlist, the firm’s Chief Executive Officer Hector Rodriguez said:There are the realists and then there are the wannabes. Besol, a startup, just a year-old from Spain is not one of the wannabes,…

Contributors

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter