Category Archives: Technology

Cloud Infographic –  DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Juniper Reports Discovers Mobile Commerce Growth Powered By The Cloud

Juniper Reports Discovers Mobile Commerce Growth Powered By The Cloud

Juniper Reports Discovers Mobile Commerce Growth A recently unveiled report from Juniper Research has found that the total number of users who plan to engage in mobile transactions is going to grow considerably over the coming years. They predict that just over 2 billion mobile phone or tablet users will make mobile commerce transactions by…

Project Loon – From Wi-Fi to High-Fi

Project Loon – From Wi-Fi to High-Fi

Project Loon Although the Internet appears universal and omnipresent to those who use it, the majority of the world still lacks access to it, due to many factors, including economics, terrain, political instability and straight-up poverty. A handful of high-profile Internet giants is setting about changing that, by changing the way the Internet signal travels: instead of…

IBM and Apple promises to make apps more sticky

IBM and Apple promises to make apps more sticky

Creating Apps that Stick A new partnership between IBM and Apple promises to make apps more sticky and responsive. Speaking at the IBM XCITE 2014 conference recently in Singapore, Tim Greisinger, IBM vice president for its Smarter Cities arm discussed the shortfalls of current apps and the potential for this marriage of industry behemoths moving…

Internet of things: Poised to be a security headache?

Internet of things: Poised to be a security headache?

IBM’s X-Force Threat Intelligence Quarterly on Monday noted that security threats to the Internet of things are already out there. Firmware can be exploited as well as building systems and the networks that connect end points. IBM proposed a security… Read the source article at ZDNet

Amazon Moves to Extend Cloud-Computing Dominance

Amazon Moves to Extend Cloud-Computing Dominance

Cloud-Computing Dominance Amazon Web Services already provides so-called cloud computing services at low prices for customers including the Central Intelligence Agency and Netflix . At a conference here last week for the web-services unit, company officials explained that Amazon … Read the source article at The New York Times

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising