Category Archives: BYOD

Net Neutrality Is Not Needed In Next Generation Networks

Net Neutrality Is Not Needed In Next Generation Networks

Next Generation Networks I have always marveled at how quickly the Information Technology landscape has changed. A prime example of the magnitude of the change comes from my two daughters. Although my oldest girl has barely reached school age, she grew up at a time when it was still common to read newspapers. As a…

Keeping A Lid On Your Data

Keeping A Lid On Your Data

Data Discretion As discussed on CloudTweaks not too long ago, invisibility is the one thing that’s very important when bringing the Internet of Things to the kitchen. That is, the process of working a home appliance has to be convenient to the point of invisibility, just like it’s with tap water–it’s simply there when we need…

Video Conferencing: Changing The Face of Corporate Meetings

Video Conferencing: Changing The Face of Corporate Meetings

Video Conferencing: Changing The Face of Corporate Meetings Those who are heavily involved in the world of business are probably very well familiarized with the terms “video conferencing” and “web conferencing.” Web conferencing may be the more well-known of the two, since it has been around for the longest period of time. Although video conferencing,…

BYOD Redefines Work-life Balance, But…

BYOD Redefines Work-life Balance, But…

Not Everyone Buys It. The new status symbol of the rat race is the personal device. Not the company issued laptop, but the device, whether smartphone, tablet or laptop that the individual prefers – the one that likely contains both work and personal apps; the one that keeps the IT people up at night wondering…

Cloud Infographic: Mobile At Work

Cloud Infographic: Mobile At Work

Mobile At Work Mobile devices and BYOD are hot topics of conversation.  Provided is an excellent infographic courtesy of the team at Bluebox which focuses on some of the most used mobile apps by employees. Some interesting statistics are: IT Professionals surveyed reported that mobile security was a top concern Fewer than half (40%) reported having a…

The Internet of Everything: Wearables

The Internet of Everything: Wearables

The Internet of Everything: Wearables Imagine a hospital gown capable of reading a patient’s vital signs even during a walk to the washroom or around the grounds. Imagine military fatigues capable of detecting gunshots and allowing for split-second protective or retaliatory action against snipers. Imagine your next smartphone as a color-coordinated piece of jewelry mounted…

The Lighter Side Of The Cloud – Misunderstanding

The Lighter Side Of The Cloud – Misunderstanding

By David Fletcher All David Fletcher comic images on this site are owned by CloudTweaks.com. If you would like to reuse them on your social media network, please feel free to do so as long as there is a clearly defined link to the original comic source. If you would like to use them in a Newsletter,…

6 BYOD Security Best Practices

6 BYOD Security Best Practices

6 BYOD Security Best Practices Bring Your Own Device, commonly known as BYOD, and cloud computing are changing the way we use technology in the workplace. Sixty percent of businesses currently use a BYOD model, and forecasters suggest that number will rise to 90 percent by 2014. Fifty-four percent of American companies also use public…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising