Category Archives: Technology

The Service Level Agreement

The Service Level Agreement Purchasing goods and services online has become very easy, just a click here and there, input some credentials, and your bank account is now lighter. This is exactly the same with purchasing Cloud Computing services. It has become a bit worrisome if people actually know what they are getting into or…

Google Cloud Platform – Cloud Services To Go One Up Against AWS

Google Cloud Platform – Cloud Services To Go One Up Against AWS

Google unveiled its Google Cloud Platform and Google Compute Engine at I/O Conference in San Francisco to take on Microsoft’s Azure and Amazon’s AWS in the cloud platform. Google said that it has been working on global-scale services for more than fourteen years and launching cloud services is just another step in that direction. Google…

Mimecast Outage “Cloud Kettle Calling The Pot Black”

Mimecast Outage “Cloud Kettle Calling The Pot Black” UK based cloud continuity and security vendor Mimecast today suffered what is looking like from many customers tweets an outrage of over 5 hours effecting customers email flow. Customers appear to have 1st noticed the issue at 11am UK time when news appeared that customers inbound and outbound email…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter