Category Archives: Case Study

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving…

Case Study: Cellphone Provider Switches To Acumatica, Implements ERP In 90 Days

Case Study: Cellphone Provider Switches To Acumatica, Implements ERP In 90 Days

Case Study: Cellphone Provider Switches to Acumatica, Implements ERP in 90 Days Open Mobile is a mobile telecommunications provider that serves tens of thousands of customers across Puerto Rico, and which enjoys direct relationships with major cellphone suppliers such as Samsung and Apple. With eighteen stores, several towers, hundreds of employees and a thousand vendors,…

Bad Bots – What Are They And Where Do They Come From?

Bad Bots – What Are They And Where Do They Come From?

Bad Bots – What Are They And Where Do They Come From? A ‘bot’, short for ‘web robot’, is a small software application that can run automated tasks over the internet. Their primary function is to fetch script and analyse web server information at a considerably faster rate than a human could achieve. Unfortunately, cyber-criminals…

The Power Of Custom Metrics

The Power Of Custom Metrics

The Power of Custom Metrics Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a deal. A well-run auction is a fascinating event to watch, and most interesting of all…

More Distributors Considering Launch Into Cloud Services

More Distributors Considering Launch Into Cloud Services

A white paper released today by CompTIA indicates that many technology distributors are setting their sights on the cloud as a means of boosting their bottom line and enhancing value for their clients. According to CompTIA’s white paper The Role of IT Distribution in a Cloud World, most distributors recognize the huge market segment available…

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud In my last article I discussed the importance of conducting a comprehensive assessment of your current IT environment before deciding on any kind of a cloud strategy. To summarize: you must know exactly where you are before you can accurately chart a…

Cloud Infographic: Big Data – How Will It Affect Your Business

Cloud Infographic: Big Data – How Will It Affect Your Business

Cloud Infographic: Big Data – How Will It Affect Your Business For many years, companies have been building data warehouses to analyze business activity and produce insights for decision makers to act on to improve business performance. These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured,…

What The Gartner Big Data 2013 Report Means For The Industry

What The Gartner Big Data 2013 Report Means For The Industry

What The Gartner Big Data 2013 Report Means For The Industry Gartner’s 2013 Big Data survey was recently released and has highlighted some of the long held beliefs in Big Data with survey evidence to prove it. The survey itself was primarily focused on companies currently working with Gartner. Despite this, due to the numbers and…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter