Category Archives: Cloud Computing

Gartner’s top 10 strategic technology trends for 2015

Gartner’s top 10 strategic technology trends for 2015

Gartner’s top 10 strategy technology trends cover three themes: the merging of the real and virtual worlds, the advent of intelligence everywhere, and the technology impact of the digital business shift. Read the source article at Computerworld Singapore

Ericsson Turns to Silicon Valley Scientist in Cloud Effort

Ericsson Turns to Silicon Valley Scientist in Cloud Effort

Since starting in March as head of Ericsson’s newly created cloud unit, Jason Hoffman, 42, has helped orchestrate a takeover of a California software provider and struck a partnership with a security company to bolster his division and differentiate its offering. While information-technology giants such as International Business Machines Corp. (IBM), Hewlett-Packard Co. and Microsoft…

News: Spanning Is Acquired By EMC Corporation

News: Spanning Is Acquired By EMC Corporation

Company Continues To Do Business as Spanning Cloud Apps in EMC’s Core Technologies Division; Serves as Foundation for EMC’s “Born-in-the-Cloud” Data Protection Strategy AUSTIN, Texas – October 28, 2014 – Spanning Cloud Apps, Inc., the most trusted provider of data backup and recovery for cloud applications, today announced that it has been acquired by EMC…

Shadow IT – Threat or Opportunity?

Shadow IT – Threat or Opportunity?

Shadow IT Shadow IT – sometimes referred to as Stealth IT – describes the usage of IT systems and solutions that are built and used inside businesses and organisations without explicit approval from IT departments and/or management. Fueled by the growth of BYOD policies, Christopher Rentrop, Professor of Informatics at Konstanz University of Applied Sciences, believes…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter