Category Archives: Computing

Laws And Regulations Governing The Cloud Computing Environment

Laws And Regulations Governing The Cloud Computing Environment Cloud computing technologies developed around them a complex legal and regulatory environment.  There are federal, international and even state laws that impose responsibilities to both cloud computing tenants and providers. Regardless of which side your business is on, you have to consider the legal issues, especially those…

Cloud Archiving And The Benefits For Your Business

Cloud Archiving And The Benefits For Your Business Cloud archiving is a document storage solution that means that data and documents no longer need to be stored as physical, paper documents, but can be transformed into digital format and stored in ‘the cloud’. Many businesses have mounds of paper documents and filing cabinets stacking up…

Can Natural Disasters Doom The Future Of Cloud Computing?

Can Natural Disasters Doom The Future Of Cloud Computing? In the wake of Hurricane Sandy, many people are asking whether cloud computing can withstand nature’s wrath. The storm took several major cloud computing companies offline, including Amazon Web Services (at least on the East Coast), and left thousands of websites and online services down for…

Cloud Whitepaper: Virtual Network Architecture

Cloud Whitepaper: Virtual Network Architecture

Cloud Whitepaper: Virtual Network Architecture Looking back at how the IT landscape has evolved over the past 20 years, it is amazing to see the striking parallel between the evolution of technology and the evolution of business. In the Client /Server era, it was normal for IT initiatives to take months or even years on…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter