Category Archives: Cloud Computing

History’s Worst Data Breaches

History’s Worst Data Breaches

History’s Worst Data Breaches We’ve mentioned before that with all the recent massive hacks on Sony, Microsoft, Home Depot, etc. companies are focusing more and more on the necessity of improved security measures. This recent surge of beefed up security has left some of us in the tech world wondering about some of worst hacks…

Investing In Enterprise Mobility

Investing In Enterprise Mobility

Investing In Enterprise Mobility Guess how many people access business applications from within the corporate environment 100% of the time? In effect, that means once these guys are out of office, they are truly out of office. Professional life over, personal life begins. The percentage of folks that follow such a blissful model of work-life…

Cloud Pinup: Fellow Robots – The Next Explosive Technology

Cloud Pinup: Fellow Robots – The Next Explosive Technology

Robots: The Next Explosive Technology When you look around at the world of 2015, you’ll see many technologies that once belonged purely to science fiction: video phones, tiny handheld computers with incredible processing power, private space flights, and electric cars. There’s only one thing missing. Wasn’t the future supposed to bring us ubiquitous robots? So…

Property Crime Down — If You Don’t Count Cyber Crime, Identity Theft

Property Crime Down — If You Don’t Count Cyber Crime, Identity Theft

If You Don’t Count Cyber Crime, Identity Theft WEST HAVEN, CONN. – The U.S. crime rate continues to fall, according to the latest FBI’s release based on Uniform Crime Reporting from police departments, but researchers say those numbers, which have been on a downward slide since the 1990s, don’t tell the whole story. That’s because…

Recent

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising