Category Archives: Security

IBM Delivers New Services To Help Clients Move Enterprise Applications To The Cloud

IBM Delivers New Services to Help Clients Move Enterprise Applications to the Cloud Financial, healthcare, government and electronics clients tap IBM SmartCloud Enterprise+; IBM SmartCloud for SAP applications is now available globally ARMONK, N.Y. – 29 January 2013: IBM (NYSE:IBM) today announced global availability for its cloud service on five continents—plus a new center opening…

How Can Cloud IDEs Save Your Time?: Build and Deploy – Part 2

How Can Cloud IDEs Save Your Time?: Build and Deploy – Part 2 IDE in a cloud uses cloud’s resources on demand to make development process more productive.  You can win a minute or so by decreasing IDE boot time. It might look insignificant, but just multiply those minutes to your team size. Add those…

Understanding The Concept Of Big Data

Understanding The Concept Of Big Data Big data is an information technology term defined as the amount of data that gets more bulky, complex, and fast moving that it is very difficult to handle through normal database management tools. Such issues related to big data arise regularly in different fields, such as meteorology or business…

The Cloud Fragmentation – How To Work Together

The Cloud Fragmentation – How To Work Together Cloud computing is rapidly gaining popularity and all major players in the industry are noticing. It is obvious that this paradigm will be the driving force for business in the coming decade mainly due to the proliferation of the internet and the mobile market space. This growth…

How Can Cloud IDEs Save Your Time? Part 1

How Can Cloud IDEs Save Your Time? Part 1

How Can Cloud IDEs Save Your Time? Part 1 Cloud computing is definitely among the most dynamically developing industries in IT. It’s also definitely the one that promises to surprise the global IT community with new technologies, tools and services in 2013. Cloud hosting, document management and data storage have become common and ordinary even…

Security In The Cloud – Maintaining A Secure Environment

Security In The Cloud – Maintaining A Secure Environment One of the most prevalent points brought up by skeptics of cloud computing is the integrity of the security for said systems. Different reservations are held against different models of cloud computing, in particular for public clouds. The mere fact that public clouds host environments for…

Disaster Recovery In The Cloud, Or DRaaS: Revisited

Disaster Recovery In The Cloud, Or DRaaS: Revisited The idea of offering Disaster Recovery services has been around as long as SunGard or IBM BCRS (Business Continuity & Resiliency Services). Disclaimer: I worked for the company that became IBM Information Protection Services in 2008, a part of BCRS. It seems inevitable that Cloud Computing and Cloud Storage…

Single-Tenant vs Multi-Tenant Cloud ERP

Single-Tenant vs Multi-Tenant Cloud ERP Cloud software has grown in recent years because it eliminates some major administration headaches for IT staff and provides access to applications from browser-enabled devices including PCs, Macs, tablets, and mobile phones. One common business question is whether to host their new cloud applications in either single-tenant or multi-tenant mode.…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter