Category Archives: Cloud Computing

Dell Announces Launch Of The Dell SonicWALL Ahead Of RSA Event

Dell Announces Launch Of The Dell SonicWALL Ahead Of RSA Event

Dell Security Multi-Engine Approach Advances Sandboxing Beyond Threat Detection to Complete Prevention with New SonicWALL Capture Advanced Threat Protection (ATP) Service SAN FRANCISCO–(BUSINESS WIRE)–Dell today at RSA announced the launch of the Dell SonicWALL Capture Advanced Threat Protection Service, which enhances organizations’ ability to safeguard against today’s shape-shifting cyber threats. Taking a first-to-market, adaptive, multi-engine…

The Lighter Side Of The Cloud – F96qL#5

The Lighter Side Of The Cloud – F96qL#5

By David Fletcher Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our comics to generate leads to a specific landing page, newsletter, presentation or social media campaign,…

Lessons Learned From Recent Cloud Security Debacles

Lessons Learned From Recent Cloud Security Debacles

Recent Cloud Security Debacles Just as cloud computing is on the rise, so are cloud security threats, and they should be on the top priority list of every organization that has embraced cloud-based services. Incidents of cybercrime are being reported quite frequently, but the majority of them are not being reported at all. Many organizations…

Microsoft Powers Up With Purchase Of Xamarin

Microsoft Powers Up With Purchase Of Xamarin

Microsoft’s Recent Acquisition  To many tech commentators, the emerging cloud economy looked like it would be dominated by two familiar giants: Google and Amazon. Google recently announced that Spotify would be using its cloud architecture for its backend, while AWS continues to expand and draw players large and small into its vast orbit like a…

2016 Mobile Marketing Tips For Cloud Services

2016 Mobile Marketing Tips For Cloud Services

Mobile Marketing Tips Mobile marketing is continually evolving and at such a fast pace, if you are not currently using mobile marketing in your advertising strategies, then you have already been left behind. Why? Because 70 percent of all Smartphone users consider SMS marketing to be the best way to grab their attention. And, 50%…

2016 Connected Enterprises Report

2016 Connected Enterprises Report

Connected Enterprises Report Dimension Data’s 2016 Connected Enterprise Report is out, discussing collaboration trends, insights, and strategies in the digital age. With the promise of lower costs coupled with greater productivity, increased agility and better customer engagement, collaboration technologies are providing tools for real-time communication, file sharing, project management, and social networking which benefit product…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…