Category Archives: Computing

Big Data And eDiscovery: Professionalism Pays

Big Data And eDiscovery: Professionalism Pays

Big Data and eDiscovery: Professionalism Pays Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they…

How Hackers Are Getting Inside Help

How Hackers Are Getting Inside Help There are more people today aware of the security risks they expose themselves and their companies during their regular internet activities than there have ever been before. The media has made it clear to all internet users just how often and easily their online privacy is threatened and each time some…

Survival In The Cloud Depends On Experimentation

Survival In The Cloud Depends On Experimentation I was fascinated to hear Jeff Bezos comment that Amazon’s expected $1.5 billion in revenue via their Amazon Web services business was successful due their focus on experimentation. The experimentation paradigm is the most important strategy for cloud executives to execute successfully, lest they fail to take full advantage of the…

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified Researchers at North Carolina State university and University of Oregon have proposed a jaw-dropping price tag for performing heavy duty cloud computing task – as low as zero dollars. Experiments reveal that cloud-based web browsers can be exploited to hijack the underlying computational power, and that as…

Cloud Infographic: Fresh Insights Into Cloud Adoption Trends

Cloud Infographic: Fresh Insights Into Cloud Adoption Trends

Cloud Infographic: Fresh Insights Into Cloud Adoption Trends Cloud computing is now in heavy use in the industry and even the consumer market is starting to consider the benefits of cloud computing. Even though it is using the same technology that we have since more than 10 years ago, the cloud computing paradigm made all…

What Is The Key Criterion For Selecting A Cloud Service Provider?

What Is The Key Criterion For Selecting A Cloud Service Provider? Cloud computing has matured enough for a lot of people that jumping on it is no longer scary. The technology has also advanced enough that even data conversion and migration are no longer considered as daunting, just a little annoying. Because of this new influx of…

Cybersecurity Act Of 2012 And The Cloud

Cybersecurity Act of 2012 and the Cloud Speaking of Laws and Regulations Governing the Cloud Computing Environment, we cannot ignore the latest cybersecurity bills proposed this year. There have been many cyber bills proposed, but none was as important as the Cybersecurity Act of 2012, supported by the Obama Administration. Cybersecurity is a top administration priority for…

See You In Health: Cloud Computing For The Healthcare Industry

See You In Health: Cloud Computing For The Healthcare Industry The healthcare industry has been making its move toward technology, putting iPads and tablets into the hands of healthcare professionals and now, the latest big move has been adopting the concept of cloud computing to organize, share data and protect patient information and healthcare data…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter