Category Archives: Computing

From storage to processing – the cloud’s next step?

From storage to processing – the cloud’s next step?

What is the cloud’s next step? When speculating about where the cloud is heading next, we often think about extra security layers and how hybrid models might grow in prevalence. However, collaboration on the cloud is becoming more of a consideration as files grow. Could the cloud’s next big step be from mostly storage to…

Minimizing Downtime During Mergers & Acquisitions

Minimizing Downtime During Mergers & Acquisitions

Minimizing Downtime As economic conditions gradually improve, North American companies are starting to recover their confidence, and are looking beyond mere survival. A recent survey by KPMG focusing on mergers and acquisitions demonstrated cautious optimism, with 21 per cent of companies planning to initiate at least one acquisition this year, and 16 per cent planning for…

The Most Powerful Free Cloudware Tools Available to Modern Businesses

The Most Powerful Free Cloudware Tools Available to Modern Businesses

5 Essential Cloud Tools for Your Innovative Business Why these cloudware tools are a must for any modern business Smart business owners are always on the lookout for ways to save money. One of the best ways is capitalising on some of the best free cloudware tools available to businesses. Sixty percent of small and medium…

Smart Cities: Market Opportunities Worth USD 1.5 trillion By 2020

Smart Cities: Market Opportunities Worth USD 1.5 trillion By 2020

Smart Cities: Market Opportunities Worth USD 1.5 trillion By 2020 SINGAPORE, Nov. 7, 2014 /PRNewswire/ — By 2025, it is expected that approximately 58% of the world’s population – or 4.6 billion people will be living in urban areas. The process of urbanization has become so important that it has become a catalyst in the transformation…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Big Data Insights on The Way We Perceive Other Human Beings

Big Data Insights on The Way We Perceive Other Human Beings

Big Data Insights For all its great potential, Big Data sometimes simply corroborates our gut feeling or gives us something that we didn’t need, or want to know. Christian Rudder, co-founder of the dating website OKCupid, makes sure we get this early on in his Dataclysm, a fascinating study of social, dating-related data that he…

4 Things To Know Before Virtualizing Your Desktops

4 Things To Know Before Virtualizing Your Desktops

Forrester Research: The Keys to a Successful Deployment Desktop virtualization projects are transformational. They can dramatically minimize IT costs while better empowering workers with more ubiquitous access to the applications and data they need to be productive. In fact, according to recent research by Forrester, worker productivity when working remotely across multiple devices, increased 51%…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter