Category Archives: Security

Importance Of Cloud Computing Interoperability

Importance Of Cloud Computing Interoperability

Importance Of Cloud Computing Interoperability Cloud Computing and Provider Lock-In Provider lock-in is well known obstacle of cloud computing business model. It is characterized by the inability or limited ability to connect to resources that are not part of the selected cloud offer. Migration of application and corresponding data to alternative cloud services may be…

VMware Leads Industry In Support For The Mobile Workforce With New Capabilities

VMware Leads Industry in Support for the Mobile Workforce with New Capabilities Across Its End-User Computing Portfolio Integration of VMware HorizonTM View and Horizon MirageTM Headline List of Enhancements Focused On Cost, Management and Performance  BARCELONA, Oct. 15, 2013 — Today at VMworld® 2013 Europe, VMware, Inc. (NYSE: VMW), the global leader in virtualization and cloud infrastructure, introduced new…

Benefits of Cloud Gaming

Benefits of Cloud Gaming

Benefits of Cloud Gaming Cloud gaming is gaining considerable momentum for a number of reasons and is positioning itself as the future of how games will be played. Reminiscent of the Sega Channel- perhaps one of the first derivative examples of game streaming- cloud gaming presents players with an alternative to conventional methods of purchase…

Cloud Infographic: Where’s Your Data

Cloud Infographic: Where’s Your Data

Cloud Infographic: Where’s Your Data Big Data is all the rage today. There’s a lot of buzz about how it will transform your business with diagnostics and dashboards distributed directly to business users. The truth is someday Big Data will do just that… if your organization can clear a few hurdles in getting it under…

Do You Have The Right IT Monitoring And Management Strategy?

Do You Have The Right IT Monitoring And Management Strategy?

Do You Have The Right IT Monitoring And Management Strategy? As more organizations embrace hybrid IT, the task of monitoring and managing these environments becomes more complex. Virtualization and cloud add layers of abstraction, making detection and resolution of a performance/availability issue extremely challenging for the IT operations department. Without the correct process and tools…

IBM Bolsters Cloud Portfolio While Infusing Analytics Into New Cloud Offerings

IBM Bolsters Cloud Portfolio While Infusing Analytics Into New Cloud Offerings

IBM Bolsters Cloud Portfolio While Infusing Analytics Into New Cloud Offerings Infuses analytics into new cloud offerings to help clients drive business transformation $2 billion SoftLayer investment to underpin its high value cloud capabilities Singapore – 09 Oct 2013: Building on its $2 billion acquisition of SoftLayer, IBM (NYSE: IBM) today announced a series of new offerings that fuse together…

4 Ways To Improve Cloud Security

4 Ways To Improve Cloud Security

4 Ways Of Improve Cloud Security As cloud computing increases in popularity there is a surefire need to ensure that the business data available is always safe and secure. Those wishing to access the system could cause untold misery if allowed into the system, meaning security measures are more important than ever. Indeed, many companies have listed…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Cloud Security In The Workplace

Cloud Security In The Workplace

Workplace Cloud Security Our workplaces are changing and much of it for the better. Increased flexibility – pushed by cloud services – is behind many of the changes. Home working, increased collaboration – it’s all good, and it’s all delivering significant business benefits. We know that. That’s so 2013. But fewer than 10% of businesses…

Are Made For Mobile Apps Really Different?

Are Made For Mobile Apps Really Different?

Mobile Apps Environment Mobile employees need mobile apps. Mobile apps help field personnel to be more productive and often enable them to generate new revenue streams and improve customer service (and the corporate brand!). However, as companies seek to integrate mobile technologies into their application infrastructures, they are faced with an important choice. Is it more…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter