Category Archives: Case Study

The Open Data Center Alliance Publishes New Usage Models

THE OPEN DATA CENTER ALLIANCE PUBLISHES NEW USAGE MODELS AND RELEASES NATIONAL AUSTRALIA BANK CARBON FOOTPRINT BEST PRACTICE PAPER New Usage Models Outline Requirements for Interoperability in the Cloud, Including PaaS and SaaS Interoperability  BEAVERTON. ORE., August 17, 2012 – The Open Data Center Alliance (ODCA) today published two new interoperability-focused usage models focused at PaaS and…

Discover How To Bring Trust To The Cloud: Strong Authentication for SaaS Applications

Discover How to Bring Trust to the Cloud: Strong Authentication for SaaS Applications However, the same exact benefits of the SaaS delivery model that are driving the trend may actually slow down further adoption of the SaaS applications by the enterprises. Why do IT departments get skeptical about moving their mission-critical applications and data into…

Cloud Infographic: Who Will Acquire RIM?

Cloud Infographic: Who Will Acquire RIM?

Cloud Infographic: Who Will Acquire RIM? Mobile Cloud Computing (MCC) is the next logical evolution for cloud computing. Though mobile technology is still evolving, especially the operating systems, it is doing so in a very rapid pace. Most modern mobile devices are now sporting capable web browsers mainly due to advances in mobile operating systems done by…

Cloudy Apps: New Challenges And Complexities

Cloudy Apps: New Challenges And Complexities New technologies often simplify some aspect of life, an aspect which was previously painful. But then, as soon as it is adopted, a technology presents new challenges and new complexities. With cloud computing, you can get a new machine in minutes—less than a minute, in fact, with some of…

Gussy Up Your Employment With Cloud Computing

Gussy Up Your Employment with Cloud Computing With reports of 50,000 new jobs being launched in cloud computing/IT in Los Angeles alone, it’s official: the employment iron is hot. Strike into the fray with a sophisticated grasp of how cloud computing can improve your approach and your potential company. Chasing versus cultivating. The sphere of…

Premise To Cloud: Unified Communications – Converge, Collaborate, Compete

Premise to Cloud: Adopting Hosted Unified Communications to Converge, Collaborate, and Compete Collaboration is the linchpin to being competitively relevant. And being relevant is not solely defined by the products or services that an enterprise now offers. Relevancy is defined by how quickly and effectively an enterprise responds to market needs, incubates new ideas, and…

Cloud Infographic: Speeding Your Way To The Cloud

Cloud Infographic: Speeding Your Way To The Cloud

Cloud Infographic: Speeding Your Way To The Cloud One of the main components to the success of cloud computing is the deliverably and speeds in which to access, retrieve and transfer data files to and from it.  Here is a unique infographic which illustrates the digital agenda between Britain and Europe in the race for broadband speed supremacy.…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter