Category Archives: Big Data

Big Data and Geographical Analytics

Big Data and Geographical Analytics

Big Data and Geographical Analytics Not long ago we wrote how geotagged tweets are used for mapping trends like race opinions and for charting real-time events like the 2012 Kentucky earthquake. A similarly themed set of articles was published at Quartz recently, showcasing the use of location-enabled tweets for the noble goal of mapping nationwide…

Data Superheroes

Data Superheroes

During the past couple of years we have seen a fever pitch in organisations’ anointing proxies to the status of superheroes in respect to data and analytics officers. Read article source at Information Age  

Keeping A Lid On Your Data

Keeping A Lid On Your Data

Data Discretion As discussed on CloudTweaks not too long ago, invisibility is the one thing that’s very important when bringing the Internet of Things to the kitchen. That is, the process of working a home appliance has to be convenient to the point of invisibility, just like it’s with tap water–it’s simply there when we need…

Cisco Jumps Into Big Data

Cisco Jumps Into Big Data

Cisco has unveiled its Cisco Connected Analytics for the Internet of Everything portfolio, a set of eight “easy-to-deploy software packages” aimed at helping customers use data from the Internet Of Things to improve business operations. The packages … Read the source article at CRN

Big Data College Education

Big Data College Education

Big Data’s Use In Colleges Much has been written about how Big Data and cloud computing can be used for diversifying educational learning platforms. For example, Big Data is being used to track students’ academic performance and alert them and their supervisors to falling grades, attendance or both. Even before the future students pack their…

Big Data In The Courtroom

Big Data In The Courtroom

Big Data’s Place in the Legal System Big Data has found its niche in the legal system as well. Some 20 states have implemented data-driven evaluation of future crime risk in sentencing individuals, and many are considering to do so. Using algorithms that take measurable risk factors into account can lead to fairer decisions and…

Does Proprietary Data Hinder Research?

Does Proprietary Data Hinder Research?

Does Proprietary Data Hinder Research? A widely-discussed article at Newsweek about the ‘data problem in medicine’ sheds light on the fact that doctors don’t have access to data about the very medicines the prescribe. In fact, of all clinical trials, as many as half are never published, leaving doctors in the dark and patients at…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter