Category Archives: Security

Accessing The Real Risk Of Cloud Computing

Accessing the Real Risk of Cloud Computing: Is the Sky is Falling or are the Failures a Blip on the Radar Screen? It’s interesting to follow the big money that big companies are spending. It’s a lot like watching a huge ocean liner set sail for exotic places or a stretch limousine glide though town.…

How Cloud Computing Companies Make Their Data Centers Hacker-Proof

Cloud computing naysayers have long cited security and privacy as their number one concerns. While more and more companies are adopting cloud services, many corporations and small businesses are still hesitant to embrace the cloud because of concerns about lax security and hacker attacks. Companies like Microsoft, Google, and Amazon claim to have extremely strong security…

The Rise Of The Progressive SMB

The Rise Of The Progressive SMB

The Rise Of The Progressive SMB While startups and big enterprises are moving rapidly to the cloud, some SMBs are still stuck in traditional IT infrastructure. Unlike startups, these businesses have already invested such a sizable chunk in their enterprise IT that they are unwilling to spend more. And unlike the bigger enterprises they don’t  have the…

Changing The Script: Understanding How Mental Schemas Delay Cloud Technology Adoption

Changing The Script: Understanding How Mental Schemas Delay Cloud Technology Adoption Fans of the TV show Seinfeld know exactly what to expect. The effects of repeated episodes finds the viewer primed to expect laughter at Jerry’s cleverness, Kramer’s odd interpretations, George’s neuroticism, and Elaine’s adventures. The series is organized around a Peter Pan theme of…

Can Telematics Be A Path To Securing The Cloud?

Can Telematics Be A Path To Securing The Cloud? There are various terminologies that describe the use of Wi-fi, signals and data sensors to help send a message securely and fast. Telematics is one of these and it deploys its reach in three patterns: from one device to another, from a device to a person…

The Cloud, Week In Review: November 9th, 2012

The Cloud, Week In Review: November 9th, 2012 The presidential elections and the aftermath of hurricane Sandy have turned the past week in one of the most significant weeks of this year. These events have had a significant influence on most of our lives and some of them have even influenced the existence of the…

Making The Cloud Transaction Psychologically Secure: Overcoming The Availability Heuristic

Making The Cloud Transaction Psychologically Secure: Overcoming The Availability Heuristic A cognitive heuristic is a shortcut our brains employ when forming beliefs or making decisions (Reber and Reber, 2001). An availability heuristic is a type of shortcut designed to make decisions quickly based on information already existing within one’s mind and assumed to be accurate.…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising