Category Archives: Computing

Does The Flat Model Offer Enough Security In Cloud Computing?

Does The Flat Model Offer Enough Security In Cloud Computing? The kind of network model that one employs to compile, distribute and exchange data determines the security of its passage through the Internet. This brings the question of whether the flat model can serve as the best security option for cloud computing. This model, first…

Harmonize The Best Capabilities Of Cloud And On-Premise Solutions

Harmonize The Best Capabilities Of Cloud And On-Premise Solutions What distinguishes the most innovative, dynamic backup and recovery solutions from the rest of the pack? Is it the benefits that come with transitioning from tape to disk? Is it shorter backup windows and faster recovery times? Is it the confidence that no matter where data…

Executive Discussions Are Changing To Include The Cloud

Executive Discussions Are Changing To Include The Cloud Cloud computing is a disruptive force.  Having worked with many of Western Canada’s CIOs and senior executives over the past year, rarely have I had a discussion that didn’t include the topic of cloud computing.  This style of computing is improving the way in which technology is…

Factors That Slow Down Cloud Computing Progress

Factors That Slow Down Cloud Computing Progress Cloud computing has become the technology to be relied upon nowadays. Individuals and businesses in equal measure utilize it in different capacities because it has numerous benefits, such as efficiency in running IT function processes and affordability. Despite of this, there are many people who don’t fully take…

Why There Is A Visible Relationship Between Mobile Apps And Cloud Computing

Why There Is A Visible Relationship Between Mobile Apps And Cloud Computing In the last decade, cloud computing has grown immensely. Private companies, individuals, and non-profit organizations have adopted various cloud solutions in equal measure. The most common among these have been the hosting-based applications. More and more companies host their applications in the cloud.…

Can The Security Models Of Google And IBM Combine To Improve Cloud Security?

Can The Security Models Of Google And IBM Combine To Improve Cloud Security? People know Google as a consumer-savvy multinational while they see IBM as a product-oriented company. While the former is famous for its rollercoaster of search services and e-mail hosting platforms, the latter is the mind behind many applications and devices the IT…

Autodesk Cloud Offering To Slash Simulation Cost, Startups Rejoice

Autodesk Cloud Offering To Slash Simulation Cost, Startups Rejoice In a move aimed to strengthen its cloud computing solution product line, Autodesk has recently revealed the latest in its cloud based simulation offerings. Called the Autodesk Simulation 360, the tool set provides a diverse suite of online core-engineering analysis software based on a pay-as-you-go billing…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter