Category Archives: Computing

Smartphone Security And The Potential Pitfalls

Smartphone Security And The Potential Pitfalls

Smartphone Security And The Potential Pitfalls Smartphones, with advanced computing ability and connectivity, have dramatically changed the computing landscape. Smartphones run complete operating system software that provides a standardized interface and platform for a large number of applications in the marketplaces such as the Apple App Store, Android Market, and Amazon App Store. Android Market…

Big Data And Your Intelligence: Lumosity’s Big Data Insights

Big Data And Your Intelligence: Lumosity’s Big Data Insights

Big Data And Your Intelligence: Lumosity’s Big Data Insights Not only Big Data, but cognitive science as well have evolved dramatically within the past few years. Research and books propelled by it have shown that, contrary to everyone’s expectations, fluid intelligence — a term that translates roughly to an individual’s problem solving ability in novel…

Android Smartphone Security And Instagram App Testing

Android Smartphone Security And Instagram App Testing

Android Smartphone Security And Instagram App Testing Our daily lives become more and more dependent on smartphones due to their high processing power and increased capabilities. Smartphones have features of both a mobile phone and a computer, allowing us to talk, text, tweet, email, browse the Internet, make purchases, manage bank accounts, and take pictures.…

Leveraging Cloud Computing Through Automation

Leveraging Cloud Computing Through Automation

If you can define it, you can have it It’s true. The full potential of automation cannot be fully realized until it is informed and supported by an effective IT service management strategy (ITSM) that encompasses your entire IT environment, as well as business objectives, and corporate policy. Technology and business really can function as…

Me, Big Data and I: Mapping Personalities With Big Data

Me, Big Data and I: Mapping Personalities With Big Data

Me, Big Data and I: Mapping Personalities With Big Data Ever since OkCupid’s notorious experiments, people must have been thinking: what if computers were able to read your personality accurately? Sure, OkCupid’s matchmaking (which works, by the way) is somewhat ‘out there’, but it operates on a comparative basis, so per se OkCupid doesn’t need…

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality In part one of our mini two part series, published yesterday, we looked at some of the fallout from the recent celebrity photograph scandal. We looked at Apple’s response, deducing that they correctly believed that users were more responsible than…

MOOC: Massive Open Online Course

MOOC: Massive Open Online Course

MOOC: Massive Open Online Course The advent of new information and communication technologies such as Web 2.0, Learning 2.0, cloud-based learning tools, open content and open source learning tools have transformed the world of education in an unprecedented way. Massive Open Online Course (MOOC) as an emerging method of education is considered as one of…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter