Category Archives: Technology

How To Re-engineer Your IT Silos

How To Re-engineer Your IT Silos

How To Re-engineer Your IT Silos To Release The Teamwork Within The technology exists today to implement a fully converged infrastructure that integrates servers, storage, networks and management into a single, flexible, and adaptable IT environment. Among its other benefits, a functional converged infrastructure is the gateway to all the advantages of cloud computing. When…

Infographic: Social Media Evolution

Infographic: Social Media Evolution

Infographic: Social Media Evolution Very nice infographic provided by the UK based company ProhibitionPR which outlines the evolution of Social Media Platforms. As most can expect, this area will continue to evolve rapidly with the utilization of cloud platforms and collaborative services to push it along at a quicker pace. Infographic Source: Prohibition PR

Internap Public Cloud Survey Reveals Performance As Top Challenge

Internap Public Cloud Survey Reveals Performance As Top Challenge

Internap Public Cloud Survey Reveals Performance as Top Challenge for Cloud-Wise Organizations Rise of fast, big data applications exposes price-performance obstacles for organizations using virtual cloud  ATLANTA – January 14, 2014 ─ Internap Network Services Corporation (NASDAQ: INAP), a provider of high-performance Internet infrastructure services, today released the findings of its global survey, which highlight the significant differences in public cloud…

Cloud Computing For Businesses: How Much Are You Really Using?

Cloud Computing For Businesses: How Much Are You Really Using?

Cloud Computing For Businesses: How Much Are You Really Using? In the past, think about how companies used to do business. Manpower was one entity that simply needed to be fetched as per necessity from wherever it is available. Whichever industry you work on—automotive, technology, construction, media—you needed to gather critical expertise to work for…

Many Changes In The Realm Of Cloud Security For 2014

Many Changes In The Realm Of Cloud Security For 2014

Many Changes In The Realm Of Cloud Security For 2014! When thinking about information security you may jump straight to the Snowden leaks of 2013. However, this isn’t the only security troubles from last year we can remember. Keep in mind that there were security breaches coming from all over the world, such as the…

Cloud Infographic: Risky Data

Cloud Infographic: Risky Data

Cloud Infographic: Risky Data Regulatory compliance and risk of a data breach are forcing financial institutions to implement more stringent policies and procedures. With the cost of a security breach far outweighing the cost of a solution, the benefits of Single Sign-On (SSO) and strong authentication are too significant to pass up. If you are…

A Dark Night For Dropbox

A Dark Night For Dropbox

A Dark Night For Dropbox San Francisco-based file sharing and cloud storage company Dropbox (www.dropbox.com) suffered a major failure on Friday, January 10, 2014, during which many of its subscribers found it difficult or impossible to access their files over the evening as well as much of Saturday. The company’s homepage presented their version of a…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter