CIAA: What Should Matter Most For Cloud Security

CIAA: What Should Matter Most For Cloud Security

CIAA: What Should Matter Most For Cloud Security Everyday there are more articles citing security as the top concern holding back public cloud adoption. While cloud means many things to different people, so does the term security. In discussions with business and industry experts, security concerns really boil down to the classic CIA—now CIAA—triad: confidentiality,…

Gartner’s Big Data Definition Plays Out in Sports

Gartner’s Big Data Definition Plays Out in Sports

As Gartner analyst, I am fortunate to frequently meet amazing people. Qaizar Hassonjee from Adidas is not only one of them, but one of the most memorable ones among the amazing people. He is at the heart of miCoach, including miCoach Elite, the system developed in partnerships with the top soccer players, coaches and teams of the world…

VMworld 2014 – My Impressions of Cloud Announcements

VMworld 2014 took place in San Francisco, CA this week, with ~22,000 attendees descending for the annual event that showcases VMware’s newest announcements and product/service advancements.  I attended once again to pay particular attention to VMware’s cloud movements.  Here are a few of my impressions. vCloud Air Read the source article at Gartner Blog Network

The Video of our “Social Software Smackdown: Yammer Versus Box Versus Salesforce” is Now Available Online

This week at our Catalyst Conference in San Diego, I hosted our first ever “Social Software Smackdown,” a panel discussion among Chris Yeh (Box), Steve Gillmor (salesforce.com) and Adam Pisoni (Yammer). I am happy to report that the video of this session is now available from Gartner Events on Demand (note: requires registration or login…

How the Role of Chief Marketing Technologist is Changing.

How the Role of Chief Marketing Technologist is Changing.

The role of chief marketing technologist hasn’t even reached its tenth anniversary. Yet it’s already starting to change.  Why? In many cases, marketing executives are recalibrating the role to focus on more strategic efforts. For example, one CMO I recently interviewed told me she had inadvertently tasked her chief marketing technologist with the type of …

How to Use the Internet of Things to Fight Slumlords

How to Use the Internet of Things to Fight Slumlords

Google's Nest thermostat makes it easy to save money by automatically turning down the heat when you're not around. But many people don't have the luxury of controlling their own temperature settings, let alone the money to buy expensive gadgets that can do it automatically. But now a group of civic-minded hackers is using the…

Science’s Big Data Problem

Science’s Big Data Problem

Modern science seems to have data coming out of its ears. From genome sequencing machines capable of reading a human’s chromosomal DNA (about 1.5 gigabytes of data) in half an hour to particle accelerators like the Large Hadron Collider at CERN (which generates close to 100 terabytes of data a day), researchers are awash with…

Federal Cybersecurity Director Found Guilty on Child Porn Charges

Federal Cybersecurity Director Found Guilty on Child Porn Charges

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images. But DeFoggi—convicted today in Maryland on three child porn charges including conspiracy to solicit and distribute child porn—must have believed his use of…

Fitness Trackers Show How Many People Woke Up During the Bay Area Quake

Fitness Trackers Show How Many People Woke Up During the Bay Area Quake

The earthquake that struck Northern California early Sunday morning sent many local residents stumbling from their beds and scrambling for steady ground. How many? You can get good sense of all this nocturnal movement from an unexpected source: wearable fitness trackers that measure the sleeping patterns of the people who wear them. The Jawbone UP…

Facebook

Digital Transformation: Miracle and Wonder

Digital Transformation: Miracle and Wonder

Digital Transformation These are the days of miracle and wonder. I’ve been leading a small, global research team at the Tau Institute for the past few years to examine the dynamics of IT adoption in more than 100 countries throughout the world. We’ve developed several indices that show how well these nations are doing on a relative basis. We ranked the nations…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Leveraging Carrier Ethernet To Connect To The Cloud

Leveraging Carrier Ethernet To Connect To The Cloud

Connecting To The Cloud Determining the Best Cloud Connectivity Solution With the Cloud only being as good as employees’ ability to effectively access it, the overall user experience depends highly on enterprise network connectivity. Today, the Internet is the predominant method to connect to Cloud applications services. Internet connectivity is readily available in all markets.…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Wearable Tech News: Google Android Wear Now Works With iPhone

Wearable Tech News: Google Android Wear Now Works With iPhone

When you wear something every day, you want to be sure it really works for you. That’s why Android Wear offers countless design choices, so you can find the watch that fits your style. Want a round watch with a more classic look? Feel like a new watch band? How about changing things up every…

Report: Cybercriminals Rely On People To Access Corporate Environments

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed 10 million users as well as 1 billion files and more than 91,000 applications and…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising