Category Archives: IBM

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index Based on daily monitoring of security for more than 4,000 clients, IBM has determined that DDoS attacks are on the rise. The average large company must filter through 1,400 cyber attacks weekly according to the IBM Cyber Security Intelligence Index. But many organizations do not have the on-site…

IBM Awarded 10 Year $1 Billion Foundation Cloud Hosting Services Contract

IBM AWARDED 10 YEAR $1 BILLION FOUNDATION CLOUD HOSTING SERVICES CONTRACT TO ASSIST US DEPARTMENT OF INTERIOR’S MOVE TO CLOUD COMPUTING AUGUST 14, 2013 — ARMONK, NY – IBM today announced it will work with the United States Department of the Interior (US DOI) as the Department embarks on a decade long transformation of their…

IBM Announces A 10-Year Strategic Partnership with UniCredit

IBM Announces A 10-Year Strategic Partnership with UniCredit

IBM Announces a 10-Year Strategic Partnership with UniCredit to Deliver New Services The multi-billion dollar agreement will enable UniCredit to leverage innovative solutions and Cloud technology, gaining significant levels of efficiency and competitiveness ARMONK, N.Y. – 18 Jul 2013: IBM (NYSE:IBM) announced today a multi-billion dollar, 10-year agreement to transform the IT infrastructure that supports all…

IBM To Acquire SoftLayer To Accelerate Adoption Of Cloud Computing In The Enterprise

IBM to Acquire SoftLayer to Accelerate Adoption of Cloud Computing in the Enterprise IBM to Form New Cloud Services Division ARMONK, N.Y. – 04 Jun 2013: IBM (NYSE: IBM) today announced a definitive agreement to acquire SoftLayer Technologies, Inc., the world’s largest privately held cloud computing infrastructure provider. The acquisition will strengthen IBM’s leadership position in cloud computing…

Saudi Arabia Builds A Healthier Tomorrow With The IBM Cloud

Saudi Arabia Builds A Healthier Tomorrow With The IBM Cloud “Health is the greatest gift, contentment the greatest wealth, faithfulness the best relationship.”                                                                 – Gautama Buddha (563-483 BC), spiritual leader and founder of Buddhism. Cloud computing can bestow many gifts on businesses – cost efficiencies, performance optimization, mobility – but when it bestows the gift…

IBM Makes Cloud Computing “Fashionable” With L’Oréal Deal

IBM Makes Cloud Computing “Fashionable” With L’Oréal Deal

NEWS: IBM Makes Cloud Computing “Fashionable” With L’Oréal Deal “It is wiser to find out than to suppose.”                                                               – Mark Twain (1835-1910), legendary author and humorist. There was once a time when businesses were done through intelligence guesswork – you guessed what your customers would like and you provided it, you guessed what the demand…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter