Category Archives: Technology

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Russia’s New Data Storage Law: Protecting Information Or Silencing Dissent?

Russia’s New Data Storage Law: Protecting Information Or Silencing Dissent?

Russia’s New Data Storage Law: Protecting Information Or Silencing Dissent? News broke late last week that Russia’s lower house of parliament had passed a law which required all internet companies operating inside the country to store Russian citizens’ personal data with the borders of its territory. The law is scheduled to come into effect on…

Cloud Infographic – Leaving Data On The Table

Cloud Infographic – Leaving Data On The Table

Cloud Infographic – Leaving Data On The Table While Big Data enjoys widespread media coverage, not enough attention has been paid to what practitioners think — data scientists who manage and analyze massive volumes of data. Paradigm4 teamed up with Innovation Enterprise to ask over 100 data scientists for their help separating Big Data hype…

Veracode Recognized As “Leader” In The Gartner Magic Quadrant

Veracode Recognized As “Leader” In The Gartner Magic Quadrant

Veracode Recognized as “Leader” in the Gartner Magic Quadrant for Application Security Testing for Third Consecutive Report BURLINGTON, MA–(Source: Marketwired – Jul 7, 2014) – Veracode, the application security company, today announced that it has been positioned in the “Leaders” quadrant of Gartner, Inc.’s 2014’s “Application Security Testing Magic Quadrant”. The quadrant is based on an…

Staying On Top Of The Cloud: Information Governance

Staying On Top Of The Cloud: Information Governance

Staying On Top Of The Cloud: Information Governance Information governance is a broad, relative as well as a subjective term! If you simply look it up at Wikipedia, you will find the following definition: “Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information at an…

Cloud Infographic: Levels Of Big Data Maturity

Cloud Infographic: Levels Of Big Data Maturity

Cloud Infographic: Levels of Big Data Maturity CloudTweaks has published many articles pertaining to Big Data,  Cloud Adoption as well as a unique article that discusses bridging both Big Data Analytics and Cloud Computing together. Today’s infographic provided by Knowledgent is useful and straight to the point that shows you some excellent key points.  See their Big Data assessment tools…

Why IC3, Why Now?

Why IC3, Why Now?

Why IC3 (Internet and Computing Core Certification), Why Now? The enterprise IT industry faces a massive transition. The economics of cloud computing are causing IT organizations to rapidly adopt lean practices. The provisioning, installation and management of IT infrastructure is a $400 billion industry, with more than 1 million employees in the US. The quality,…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter