Category Archives: Cloud Computing

Access Management In A Cloudy, Mobile World

Access Management In A Cloudy, Mobile World Lately, I’ve noticed that user access management is a recurring topic of discussion with customers and partners. Two major trends transforming industries today – mobile and cloud – are acting as catalysts for a renewed focus on this critical area of security. As mobile devices proliferate at a…

Whitepaper: Microsoft SharePoint On The AWS Cloud – Learn How!

Whitepaper: Microsoft SharePoint On The AWS Cloud – Learn How!

Whitepaper: Microsoft SharePoint On The AWS Cloud – Learn How! Amazon Web Services (AWS) provides a complete set of services and tools for deploying Windows® workloads, including Microsoft® SharePoint® Server, on its highly reliable and secure cloud infrastructure platform. This white paper discusses general concepts regarding how to use these services and provides detailed technical…

Solving Problems On The Cloud Part 2: PaaS Adoption Rates Lag Behind SaaS, Again

Solving Problems On The Cloud Part 2: PaaS Adoption Rates Lag Behind SaaS, Again Continued From Part 1 In the 1920s Gestalt Psychologists developed the concept that by reimagining a difficulty one could solve a problem. This meant restructuring a problem’s components by recasting one’s mental picture. Perhaps this is what’s needed when it comes to…

Cloud Infographic: What Is Big Data, Anyway?

Cloud Infographic: What Is Big Data, Anyway?

Cloud Infographic: What Is Big Data, Anyway? In information technology, big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools. The challenges include capture, curation, storage, search, sharing, analysis, and visualization. The trend to larger data sets is due to the additional…

The State Of Online Schools: More Heads Than Ever Are In The Cloud

The State of Online Schools: More Heads Than Ever Are in the Cloud Online education is certainly nothing new to today’s students, though advancements in the field are making available programming more complex—and in many ways more compelling—than ever before. Internet-based university learning began decades ago as a way for older students to continue their…

The Great Arms Race For Security: Virtualization

The Great Arms Race For Security: Virtualization Since its infancy in the early seventies when the first computer virus was created, the malware and anti-malware business has grown into multi-billion dollar industries. No longer are script kiddies creating malware for notoriety, instead the malware industry is run by organized criminals who invest time and money…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter