Category Archives: Technology

Cloud Accessories – Future Trends

Cloud Accessories – Future Trends

If CES told us anything, it is that the next trend of consumer electronics will be focused on wearable technology. Fitness bands, smart watches and smart bands plagued the floors of the convention, with everyone from Metawatch to Razer showing off wearables. (Image Source: Google) ABI Research, a firm with 20 years experience in the technology…

iWeb Launches Microsoft Private Cloud Hosting

iWeb Launches Microsoft Private Cloud Hosting

Cloud scalability on dedicated private infrastructure takes business IT to the next level MONTREAL, QUEBEC (January 30, 2014) – iWeb, Canada’s leading cloud service provider, today announced its new Microsoft Private Cloud service, designed to give businesses complete control and flexibility of their IT infrastructure. Businesses can now choose the Microsoft Private Cloud to quickly…

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach – Lessons Learned

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

MONROE, La., and PHOENIX – January 29, 2014 – CenturyLink (NYSE: CTL) and IO today announced a strategic agreement to expand the CenturyLink Technology Solutions colocation footprint using IO’s Intelligent Control technology platform, with initial deployments at IO Phoenix and nearby IO Scottsdale. CenturyLink Technology Solutions, which formerly operated under the name Savvis, will enter the Phoenix market as…

Cloud Infographic: Personal Data Security

Cloud Infographic: Personal Data Security

Recently, Dashlane released a report that analyzed the password policies of the top 100 e-commerce sites. The results of this report are staggering. They demonstrate that the majority of the top e-commerce sites fail to comply with the recommended password security principles. In their infographic titled “The Illusion of Personal Data Security in E-commerce”, they…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter