Category Archives: Host

Big Data And eDiscovery: Professionalism Pays

Big Data And eDiscovery: Professionalism Pays

Big Data and eDiscovery: Professionalism Pays Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they…

Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations

Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations One example of an unhealthy fixation is the 2012 survey by Security Alliance who learned that the top threat listed by survey participants is data loss. Of course security risks on the cloud cannot be ignored but clearly this problem is hugely overstated. Why executives…

Laws And Regulations Governing The Cloud Computing Environment

Laws And Regulations Governing The Cloud Computing Environment Cloud computing technologies developed around them a complex legal and regulatory environment.  There are federal, international and even state laws that impose responsibilities to both cloud computing tenants and providers. Regardless of which side your business is on, you have to consider the legal issues, especially those…

Companies That Pass On UCaaS Don’t Know What They’re Missing

Companies That Pass On UCaaS Don’t Know What They’re Missing This post is sponsored by CIO Collaboration Network and Avaya. As the helicopter hovers above the water, a young lieutenant checks his HUD. It shows an altitude at 8 meters with wind gusting at 17 knots. His eyes flick to the right and he checks his position. Right…

Five Reasons Why Hosted PBX Makes Good Business Sense

Five Reasons Why Hosted PBX Makes Good Business Sense If you’re in the market for a new phone system or want to upgrade your existing phone system, you should definitely check out what hosted PBX solutions have to offer. Unlike traditional PBX systems that consist of extensive hardware and equipment investments, hosted PBX needs little…

Key Cloud Computing Trends In Each Of The Five Continents

Key Cloud Computing Trends In Each Of The Five Continents Going by recent surveys in all the five continents, it is telling that bigger things are yet to come in cloud computing. While Europeans are taking an exacting, albeit generic approach to changes visiting upon the scene, the Americans are considering the capital side of…

Important IaaS Cloud Industry Platforms Worth Knowing

Important IaaS Cloud Industry Platforms Worth Knowing Every now and then one often hears of a new terminology in the cloud platforms. As the industry grows by leaps and bounds, it is hardly necessary to expect nothing short of dramatic and innovative changes. In this wave of developments, the established companies bask in all the…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter