Category Archives: How to

Pavlov And Cloud Computing: How We Will Overcome Our Anxiety

Pavlov and Cloud Computing: How We Will Overcome our Anxiety It’s interesting to consider why we struggle to accept the cloud-computing model of data management. It seems safer to have our critical data and applications within walking distance from our desk where we can check its pulse anytime we want. Like Pavlov’s dogs we are…

Cloud Computing Security – 10 Tips For Keeping Your Cloud Data Safe

Cloud Computing Security – 10 Tips For Keeping Your Cloud Data Safe

10 Tips For Keeping Your Cloud Data Safe While we are all very happy about the entire cloud data storage concept and feel that it’s a breath of relief from the constant battle against malware, key loggers, PC monitoring software, and whatnot, we tend to forget that there are steps which we need to take…

Simple Ways For Businesses To Leverage The Cloud For A Competitive Advantage

Simple Ways For Businesses To Leverage The Cloud For A Competitive Advantage Cloud computing is one of the best technologies of the century. It allows companies to leverage their computing functions on other company’s servers. When corporations, small businesses, or nonprofit organizations adopt this technology, they get many benefits. The common ones are streamlined costs,…

Cloud Confusion: The ‘Fluffy White Thing’ And The Potential Within

Cloud Confusion: The ‘Fluffy White Thing’ And The Potential Within A recently conducted national survey has revealed that the layman American consumer is not precisely aware of what cloud computing in actual is and how, in essence, does it function. The research survey, initiated by Citrix and carried out by Wakefield Research, incorporated responses from…

Cloud Security: Fears And Challenges

Cloud Security: Fears And Challenges Recent studies have shown that more than 60% of IT managers admit to security as the main stumbling block to their integration of cloud computing, with data protection and a perceived lack of regulation being their chief concerns. In another global study by IBM that involved more than 500 IT…

ROI (Return on Investment) From Cloud Computing

ROI (Return on Investment) from Cloud Computing A business organization often measures the value of investments or any move that requires money in terms of the return on investment (ROI). Perhaps it is the only reason that top management will agree to any proposal, especially bold ones like adapting the relatively new and untested cloud…

Is My Public Cloud Too Public? Part 4

Is My Public Cloud Too Public? Part 4

Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter