Category Archives: Security

Ad Infinitum – Internet For Everything

Ad Infinitum – Internet For Everything

Internet For Everything “The hypothesis that a new Internet-for-everything society will come, as it is desired by the fundamentalists, is in fact very weak, not to say improbable” —Philippe Breton Despite what Breton wrote in 2011, small devices across the globe are increasingly capable of fully qualified networking. This technological advancement of small, autonomous devices equipped…

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

The Lighter Side Of The Cloud – Taking The Wheel

The Lighter Side Of The Cloud – Taking The Wheel

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our comics to generate leads to a specific landing page, newsletter, presentation or social media campaign,…

Cloud Spectator Releases The 2016 Top Ten Cloud Vendor Benchmark Report

Cloud Spectator Releases The 2016 Top Ten Cloud Vendor Benchmark Report

Top Ten Cloud Vendor Benchmark Report Report Uncovers A Staggering 350% Performance Difference Between The Top 10 Cloud Service Providers BOSTON, MA. JANUARY 13, 2016 – Cloud Spectator, the industry leading IaaS cloud benchmarking agency, today released the Top Ten Cloud Vendor Benchmark 2016 Report, a price-performance analysis of the leading public IaaS (Infrastructure-as-a-Service) vendors in…

The Soft-Edged Cloud: A Security Challenge

The Soft-Edged Cloud: A Security Challenge

The Cloud Security Challenge The use of the term “cloud” to describe global, offsite, computing and storage technology is apt for a number of reasons; not all of them good. The metaphor succeeds largely when people visualize their data hovering over their heads, no longer tied to a single location, and consequently easy to access…

Security Survey: Enterprises Unequipped To Detect And Deal With Attacks

Security Survey: Enterprises Unequipped To Detect And Deal With Attacks

Security Survey: Many Enterprises Still Unequipped Today’s information security teams are expected to mitigate risk in environments where employees are accessing critical and confidential data from anywhere, at any time. The network perimeter has expanded to include cloud services, mobile devices, and global forces that encompass partners and contractors, making it impossible to completely lock down…

Trends: The CIO’s Business Card – Chief Productivity Officer

Trends: The CIO’s Business Card – Chief Productivity Officer

The Chief Productivity Officer After years of enterprises hesitating to migrate their applications and data stores to the cloud, it’s safe to say the debate is over and the cloud is here to stay. IDC even goes as far as to predict that by 2020, we will stop referring to clouds as “public” and “private,”…

Cloud Traffic Growth And Content as a Service (CaaS)

Cloud Traffic Growth And Content as a Service (CaaS)

Content as a Service (CaaS) Content as a Service (CaaS) is a relatively new take on content management systems (CMS). While traditional web content management systems like Drupal and WordPress offer one-stop-shop solutions for both creating websites and managing content, CaaS service providers narrow their focus to pure content management, disregarding the output channels such…

When Artificial Intelligence Becomes Personal

When Artificial Intelligence Becomes Personal

Artificial Intelligence The term ‘artificial intelligence’ is something that would have been associated with sci-fi movies during the 1980s and 1990s, but as the modern world continues to embrace advancements in technology, it does so at an ever increasing pace. (Image Credit: IMDB – Stephen King’s Lawnmower Man – 1992) Many of the advancements made…

How Data Privacy Reform Is Wreaking Havoc In The Cloud

How Data Privacy Reform Is Wreaking Havoc In The Cloud

Data Privacy Reform Is Wreaking Havoc Nations around the globe are stepping up efforts to better protect the personal data of private citizens. In particular, cross-border data security regulations and legislative reform is on the rise. The laws must evolve in order to mitigate theft, abuse and misappropriation of personally identifiable information (PII), better guard…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising