Author Archives: Steve Prentice

The Internet of Things, 2015 and Beyond

The Internet of Things, 2015 and Beyond

Internet of Things 2015 According to IDC, the upcoming year is going to be a busy one for the Internet of Things, in many cases filling and stretching the systems that have just started delivering its varied services to industry and consumers alike. Presenting at their recent IDC FutureScape: Worldwide Internet of Things 2015 Predictions…

Drilling Through Your Personal Cloud

Drilling Through Your Personal Cloud

Personal Cloud When people ask the question “what is the cloud?” the usual response centers around the fact that it is an “outside thing” where data is stored. But one of the concepts that can be easily overlooked, yet which ties into the soft, amorphous imagery of clouds in general, is how data is accessed…

BYOD Redefines Work-life Balance, But…

BYOD Redefines Work-life Balance, But…

Not Everyone Buys It. The new status symbol of the rat race is the personal device. Not the company issued laptop, but the device, whether smartphone, tablet or laptop that the individual prefers – the one that likely contains both work and personal apps; the one that keeps the IT people up at night wondering…

Google seeks to revitalize advertising through brand lift studies

Google seeks to revitalize advertising through brand lift studies

Google Brand Lift Studies At a recent technology conference, Google’s vice president of display and video advertising products, Neal Mohan, stated that Google is focused on “cracking the brand advertising nut for digital” media. One of the ways they seek to do this is through new methods that measure how ads perform, such as “brand-lift studies,” which…

Hightail and the High Cost of Storage

Hightail and the High Cost of Storage

High Cost of Storage Petabytes don’t come cheap. High-volume file transporter Hightail found this out recently and have chosen to switch providers to keep pace. Based in San Francisco, Hightail started life as YouSendIt, a service that allowed people to send large files, usually in the multi-megabyte size, that were too large for regular email…

E-Cigarettes Can Hurt Your Computer

E-Cigarettes Can Hurt Your Computer

E-Cigarettes Yet more evidence that smoking is bad for you: A brand of e-cigarettes manufactured in China, has been found to carry malicious software that can be implanted into a computer when plugged into a USB port for recharging. E-cigarettes are in actual fact, electronic vaporizers that heat a liquid solution into an aerosol mist that offers the…

Dropbox Goes Mobile With Microsoft

Dropbox Goes Mobile With Microsoft

Microsoft – Out with the old, in with the new There are still some old-timers, people who were alive and working in the 1990’s, who remember when the PC was a stand-alone box, mobile meant carrying a 5¼ inch floppy disk under your arm, and expensive Microsoft products were installed on one machine at a…

Takin’ It To The Tweet: TwitterOffers

Takin’ It To The Tweet: TwitterOffers

TwitterOffers One new twist on this year’s Black Friday madness will involve purchases that include Twitter-enabled discounts. Twitter has recently announced a new feature called TwitterOffers, which seeks to bring customers and retailers together more easily, through the use of “discount tweets” that can be applied to real purchases in-store or online. TwitterOffers is not…

Contributors

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter