Category Archives: IT

The Power Of Custom Metrics

The Power Of Custom Metrics

The Power of Custom Metrics Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a deal. A well-run auction is a fascinating event to watch, and most interesting of all…

How Big Data Is Changing The Film Industry

How Big Data Is Changing The Film Industry

How Big Data is Changing the Film Industry The film industry is huge, generating in excess of $520 billion revenue in the USA in 2013. Imagine if this behemoth of the entertainment world could be further refined by taking account of consumers’ preferences, viewing habits and cultural interests? Big data makes this refinement possible. As consumers…

Pinup: Fortscale – Leader In Cyber Security Analytics

Pinup: Fortscale – Leader In Cyber Security Analytics

Pinup: Fortscale – Leader In Cyber Security Analytics A leader in the field of cyber security, Fortscale offers organizations of all sizes the opportunity to implement enterprise-class cyber analytics to protect valuable corporate data and intellectual property from potential threats. Founded in 2012 by a group of Israeli high-technology professionals with expertise in cyber security,…

Google’s Android Services And Their Migration To The Cloud

Google’s Android Services And Their Migration To The Cloud

Google’s Android Services and their Migration to the Cloud  I am a true believer that in the future, we are all going to rely on cloud computing to store our information. I don’t have any insider information to support my claims, it’s more than a hunch I’ve had for the past several years. Nowadays, it…

AlgoSec Partners With Qualys To Help Manage Security Risks

AlgoSec Partners With Qualys To Help Manage Security Risks

AlgoSec Partners With Qualys Allowing Organizations to Manage Security Risks in a Business Context New Integration Delivers Application-Centric Vulnerability Management, Aggregating and Scoring Vulnerabilities Based on Risk and Continuously Monitoring for Changes Within Data Center Environments  BOSTON, MA–(Marketwired – Feb 19, 2014) – AlgoSec, the market leader for Security Policy Management and Qualys, Inc. (NASDAQ: QLYS),…

Investment In Chinese Cloud Continues To Grow

Investment In Chinese Cloud Continues To Grow

Investment In Chinese Cloud Continues To Grow With the Chinese government focused on enhancing the country’s capabilities in cloud computing, United States-based organizations including Intel have opted to invest in several promising cloud providers. Intel’s venture capital arm this week announced plans to invest funds in Wuxi China Cloud Technology Service, a cloud infrastructure provider;…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter