Category Archives: Cloud Computing

Developers, the Cloud and Security Concerns

Developers, the Cloud and Security Concerns

Thought Provoking Survey So I got to thinking about security and how this relates to developers in particular. This was prompted by a recent read of the findings reported in a survey, “2014: The Year of Encryption” conducted by Egress Software Technologies, of delegates at Europe’s largest information security event Infosecurity Europe 2014. And you…

IoT – Garage Sale Cyborgs

IoT – Garage Sale Cyborgs

IoT – Garage Sale Cyborgs The Internet of Things, or IoT, is a big hit these days. However, IoT has a few problems that need to be addressed. One of those issues is how there are many devices that all do one specific thing. So if you want to exercise, you need a specific device…

Big Data and Geographical Analytics

Big Data and Geographical Analytics

Big Data and Geographical Analytics Not long ago we wrote how geotagged tweets are used for mapping trends like race opinions and for charting real-time events like the 2012 Kentucky earthquake. A similarly themed set of articles was published at Quartz recently, showcasing the use of location-enabled tweets for the noble goal of mapping nationwide…

Cloud Security In The Workplace

Cloud Security In The Workplace

Workplace Cloud Security Our workplaces are changing and much of it for the better. Increased flexibility – pushed by cloud services – is behind many of the changes. Home working, increased collaboration – it’s all good, and it’s all delivering significant business benefits. We know that. That’s so 2013. But fewer than 10% of businesses…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter