Category Archives: Security

Cloud Providers Should Welcome End Users’ Scrutiny on Security Practices

Cloud Providers Should Welcome End Users’ Scrutiny on Security Practices

Cloud Providers Scrutiny On Security Practices Few cloud users receive an open invitation from their cloud service provider to come audit them. But with new data privacy laws cropping up around the globe that place the end-user of cloud services directly on the hook for any abuse or mishandling of sensitive data, cloud providers need…

The Effects Of Cloud On Data Center Design & Consolidation

The Effects Of Cloud On Data Center Design & Consolidation

Data Center Design & Consolidation In the CloudTweaks article “5 Ways the Cloud is Redefining Modern-Day Data Centers”, I discussed how cloud computing is driving a major shift in IT business operations and provisioning, as well as within the data center – where it lives. This piece will focus on how the cloud is driving…

MIT’s Eyeriss Chip – Deep Learning Possibilities For Mobile

MIT’s Eyeriss Chip – Deep Learning Possibilities For Mobile

Deep Learning Possibilities For Mobile MIT recently presented their new 168-core chip Eyeriss that has deep learning capabilities for mobile. The excitement at the International Solid State Circuit Conference surrounded the possibilities for this new chip in mobile applications as well as the Internet of Things. Eyeriss offers the possibility of holding features like facial,…

Education Benefits From Cloud Communications

Education Benefits From Cloud Communications

Education Benefits The aging communications infrastructures of various colleges and universities across the globe are producing significant challenges for their leaders. As these administrators search for cost-effective but scalable solutions, the necessity of improving and integrating the communications technology has emerged as a primary concern, but a concern with a tailor-made solution: Cloud communications. Be…

The Lighter Side Of The Cloud – Heightened Security

The Lighter Side Of The Cloud – Heightened Security

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our comics to generate leads to a specific landing page, newsletter, presentation or social media campaign,…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

Hybridization: A Mindset Approach

Hybridization: A Mindset Approach

The Social Data Cloud One of the most amazing attributes of the cloud and its related technologies is its sheer openness. New companies and ventures spring up daily, fueled, in some cases, by one single good idea. They launch first and then seek out operating capital through angels or crowdfunding afterward. This is a whole…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising