Category Archives: Cloud Computing

Top 25 European Rising Stars 2012: CanvasDropr

Top 25 European Rising Stars 2012: CanvasDropr

Top 25 European Rising Stars 2012: CanvasDropr ….File Sharing The Visual Way, Software Compatibility the Smooth way-CanvasDropr The first thing that meets the eye in CanvasDropr’s blog is the lurid presentation of information. It is like the team from Denmark are indeed technically showing just how smooth their synchronization technology can get. They are masters,…

Cloud Infographic: Security And The Cloud 2012

Cloud Infographic: Security And The Cloud 2012

Cloud Infographic: Security And The Cloud 2012 When it comes to cloud computing, security is top-of-mind for each institution, public and private. In a recent study, defense contractor Lockheed Martin and its Cyber Security Alliance partners acquired feedback from government agencies in an effort to measure attitudes around cloud computing and cybersecurity. 85% of government technology decision…

Major Cloud Outages Of 2012 To Learn From

Major Cloud Outages of 2012 to Learn From According to a recent report by the International Working Group on Cloud Computing Resiliency, each year a cloud computing service is usually down for an average of 7.5 hours.  Companies who use the cloud for running their operations totally or partially were severely affected this year. So,…

Cloud Infographic: The Rise Of Cloud Gaming

Cloud Infographic: The Rise Of Cloud Gaming

Cloud Infographic: The Rise Of Cloud Gaming Cloud gaming is a service that uses a high speed Internet connection to stream games to a subscriber’s technology device of choice. For many gamers, gaming depends on a specific console device, such as a Wii or an Xbox, and the only possibility for playing games at another…

Benefits Of Cloud-Based Disaster Recovery

Benefits of Cloud-Based Disaster Recovery Developing a proper disaster recovery plan is quite a challenging task for any type of organization, especially small and medium business segments. When a disaster strikes your business, restoring it can be a really arduous task. Many companies are implementing cloud computing services for their disaster recovery plan. Cloud-based disaster recovery can be described…

Cloud Predictions For The New Year

Cloud Predictions for the New Year Making predictions for the coming year has become a time-honored tradition in the tech field, so I thought we’d have a little fun with it here at CloudTweaks by predicting what’s not going to happen. 1. Amazon won’t continue to be synonymous with the cloud. EC2 and S3 are…

Cloud Infographic: Avoid Outrageous Mobile Data Expenses

Cloud Infographic: Avoid Outrageous Mobile Data Expenses

Cloud Infographic: Avoid Outrageous Mobile Data Expenses Cloud computing has impacted the telecommunications industry across crucial fronts and now is in the process of amply changing its ecosystem.  As telecommunication architectures move towards a more cloud-oriented structure, there will be more demand on self-services. This is even more significant in the mobile telecoms where people are now…

A Look Back At The Cloud Computing Trends Of 2012

Cloud Computing Trends Of 2012 This year, the winds of change have blown the cloud to a higher level. Studies predict that cloud computing will be on the rise for some a long period of time and that it will be a major source of revenue and employment globally by 2015. Industry experts also say…

Top 25 European Rising Stars 2012: Elastoffice

Top 25 European Rising Stars 2012: Elastoffice

Top 25 European Rising Stars 2012: Elastoffice …Emancipate Office Administration and Filing Work on C9 Cloud, Says ElastOffice Elastoffice(EO) launched its business operations in mid-2011 in Hungary, but had already conceptualized and made feasible business commitments towards this realization half a decade before. This qualifies the startup as one of the European Rising Stars in…

CloudTweaks Comics
Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

Social Media Continues To Shape Martech

Social Media Continues To Shape Martech

Social Media and Martech Martech and social media are inextricably linked and so it should come as no surprise that many CMOs have filled their 2017 martech wish lists with tools that make social media platforms more easily shoppable, media and data partners that emphasize responsible practices and accurate insights, and martech bundles able to…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…