Category Archives: White Papers

Bridging Distances Through Video Conferencing

Bridging Distances Through Video Conferencing

Bridging Distances Through Video Conferencing TIP: If you face issues downloading any of the referenced assets, try refreshing the page – it usually works!  Distance, they say, makes the heart grow fonder, but it’s definitely not good for business. However, with globalization, geographical dispersion is a fact of life. Without the intimacy of in-person interaction, conducting…

Communication – The Most Important Business Skill

Communication – The Most Important Business Skill   “Are you a team player?” – If you’ve interviewed for any position in the last five years, chances are you would have heard this question. But have you ever wondered what has made teamwork more important in business over the last few years? It’s because we live in an era…

Some Reasons Behind Cloud Security Vulnerabilities

Some Reasons Behind Cloud Security Vulnerabilities

Some Reasons Behind Cloud Security Vulnerabilities We have debated back and forth that the Cloud is just as safe as the traditional enterprise option, and even more so. Combined with all the advantages, it is a better option for today’s business world. But the security fears are always just around the corner and pops up…

The Other Cloud Issue – Availability – And What You Can Do About It

The Other Cloud Issue – Availability – And What You Can Do About It

The Other Cloud Issue – Availability – And What You Can Do About It “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”                 – Warren Buffett, legendary investor and one of the richest men in the world. Even as the…

Six Free Assets For The “Big Picture” Technology Executive

Six Free Assets For The “Big Picture” Technology Executive

Six Free Assets For The “Big Picture” Technology Executive “Vision without action is a daydream. Action without vision is a nightmare.”   – Japanese proverb. It’s hard to define success – for some it maybe as temporary as a profitable quarter, for others it means a business that becomes an enduring legacy across generations. In the…

How To Navigate The Alleyways Of Business Continuity Management And Disaster Recovery

How To Navigate The Alleyways Of Business Continuity Management And Disaster Recovery

How to Navigate the Alleyways of Business Continuity Management and Disaster Recovery Two years back, in the aftermath of the Fukushima earthquake in Japan, I had written about how Cloud Computing offers a credible Disaster Recovery option. For companies which cannot afford to spend millions on their own collocation facilities, the Cloud remains the best…

Understanding Technical Debt: Cutting Corners That Can Cost You Later

Understanding Technical Debt: Cutting Corners That Can Cost You Later

Understanding Technical Debt: Cutting Corners That Can Cost You Later Cloud technologies are known to offer many benefits, but it’s safe to say that two words dominate expectations when it comes to development cycles: faster and nimbler. As more organizations implement agile development, it’s becoming clear that expedited time to market is an expected standard…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter