Category Archives: IT

Air Traffic Management Set To Meet Cloud Technology

Air Traffic Management Set To Meet Cloud Technology After revolutionizing domains like industrial design and engineering simulation, cloud computing is now set to drastically modify air traffic management technology. In a recent proceeding, General Electric Company and National Aeronautics and Space Administration (that’s NASA) have teamed up to undertake a project aimed at incorporating cloud…

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest. A collaborative project by ISACA and CSA, the Cloud Market Maturity study  provides business and…

Cloud Maturity Study Reveals The Top 10 Issues Eroding Cloud Confidence

Cloud Maturity Study Reveals The Top 10 Issues Eroding Cloud Confidence New Research by Cloud Security Alliance and ISACA Identifies Government Regulations, Exit Strategies, and International Data Privacy as Top Concerns Rolling Meadows, IL, USA (27 September 2012)—Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and…

Cloud Computing: The Next Step Towards the Future

Cloud Computing: The Next Step Towards the Future Cloud computing can be described as computer resources delivered as a service through a network. Although cloud computing has gained popularity recently, its origin can be dated as far back as the early ‘90s. Some may even argue that its conceptual origins date back to the ‘60s,…

The Dynamic State Of Cloud Computing Monitoring And Evaluation

The Dynamic State Of Cloud Computing Monitoring And Evaluation Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient. They also help eliminate failures in cloud computing’s functions, ensuring that business processes are not negatively affected or vulnerable. So far, several providers…

Managed Service Providers Poised To Benefit Most From The Booming Cloud

Managed Service Providers Poised To Benefit Most From The Booming Cloud The opportunities ignited so far by the ever expanding cloud are best evidenced by the increasing number of companies that are fast making what is now turning out to be ‘a clever leap to the cloud’. Providers of high end cloud solutions on the other hand…

PaaS – Top 5 Trends Which May Rule This Lustrum

PaaS – Top 5 Trends Which May Rule This Lustrum The latest buzz in the IT industry is not about iPhone5, but about PaaS (Platform-as-a-Service). The industry is already split into two groups—one shouting for the long life of IaaS and the other cheering for PaaS. PaaS, with its end-user freedom and facilities, has already…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter