Category Archives: Technology

Cloud Pinup: Sqrrl – Using Big Data To Take Big Security Risks

Cloud Pinup: Sqrrl – Using Big Data To Take Big Security Risks

Cloud Pinup: Sqrrl  How often do massive security hacks make front page news? It’s becoming such a common occurrence that many people barely bat an eyelid when a massive breach is announced, even though the risks for companies, consumers, governments is extremely high. Now, one innovative company “Sqrrl” is utilizing big data to build an…

Who’s Ready For The Cloud, And Can Deliver!

Who’s Ready For The Cloud, And Can Deliver!

Cloud Ready In my article last month, I discussed how the managed service provider (MSP) industry has been continuously urged to embrace the cloud, but in the end, could they? I answered the questions by describing several impediments and challenges that I believe are preventing MSPs from generating significant revenue and successfully fulfilling their client’s…

Contactless Mobile Wallets To Reach 200M By 2016

Contactless Mobile Wallets To Reach 200M By 2016

Contactless Mobile Wallets to Reach 200M by 2016 as Apple Pay Boosts Awareness Banks Rolling Out Own-Brand Services HAMPSHIRE, UNITED KINGDOM–(Marketwired – September 07, 2015) – A new study from Juniper Research has found that the number of mobile wallets using contactless technology is expected to reach 200 million by the end of 2016, representing…

BlackBerry COO Marty Beard Discusses Good Technology Acquisition

BlackBerry COO Marty Beard Discusses Good Technology Acquisition

Good Technology Acquisition Today BlackBerry announced plans to acquire Good Technology. For some, this news may be a surprise. That’s why Inside BlackBerry sat down with BlackBerry COO Marty Beard and Good CEO Christy Wyatt to discuss how the two companies are coming together to deliver on a combined vision. IBB: There’s history here with…

The Question Of Obedience Towards IT Security Practices

The Question Of Obedience Towards IT Security Practices

Enforcing Security Policies To comply with global industrial standards, businesses are often required to set up internal security policies. These policies aim to regulate and make transparent the use of digital equipment, networks, and devices for work and pleasure. On some level, the policies are in place to ensure that the organisation has access to…

The Five Imperatives For Digital Business

The Five Imperatives For Digital Business

VMworld 2015 – The Imperatives For Digital Business Pat Gelsinger’s Keynote CEO Pat Gelsinger’s keynote at VMworld 2015 focused on the future of computing and VMware’s vision of the future. Introductory themes covered the oft-heard topics of ubiquitous connectivity, the simplification of heterogeneous enterprise landscapes that VMware is working towards, and maintaining safe and secure systems…

Dealing With White-collar Cyberloafers

Dealing With White-collar Cyberloafers

White-collar Cyberloafers One particular compliance problem with cyber security is how to deal with employees idling in the office and misusing company Internet resources. This can lead to security issues such as worms, viruses, spyware and loss of the reputation for the company network. On some level this kind of problem can be seen to belong…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising