Category Archives: Computing

Infographic: Most Commonly Used Cloud Applications

Infographic: Most Commonly Used Cloud Applications

Most Commonly Used Cloud Applications Websites, backup and recovery, email and calendars were rated as the most commonly used cloud applications. The high ranking (fourth) position for testing and development is explained by the way in which cloud delivery simplifies setup and dismantling of test and development environments. Here’s plenty of growth potential for backup…

Cloud Computing Startups Raise Big Money: UPDATE 5

Cloud Computing Startups Raise Big Money: UPDATE 5

Cloud Computing Startups Raise Big Money: UPDATE 5 This is the fifth in a continuing series on startups raising funding. Today, there are two startups in focus – Xeround and SurDoc. Xeround (http://xeround.com/) Xeround, a California-based startup that describes itself as “The Cloud Database”, announced the successful completion of its Series C round of funding…

Apache Hadoop v1.0: Open Source "Big Data" Cloud Computing Platform Powers Millions…

The Apache Software Foundation Announces Apache Hadoop™ v1.0 Open Source “Big Data” Cloud computing platform powers millions of compute-hours to process exabytes of data for Amazon.com, AOL, Apple, eBay, Facebook, foursquare, HP, IBM, LinkedIn, Microsoft, Netflix, The New York Times, Rackspace, Twitter, Yahoo!, and more. 4 January 2012 —FOREST HILL, MD— The Apache Software Foundation (ASF),…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter