Thought Leadership Program

Bring your insight and experience into the forefront of a growing technology community. Generate interest and have your articles viewed and shared by thousands of readers...

Smart Watches And Cyber Security Concerns

Smart Watches And Cyber Security Concerns

Smart Watches Vulnerable To Cyber-Attack The recent epidemic of cyber attacks has led to increased investment and spending on security. But still, hackers have the upper hand. They can hack your computer, mobile, iPad, Internet-connected vehicle, and even your smart watch. According to HP, Smart watches with network and communication functionality represent a new and open frontier for cyber attack. The study, which was conducted by HP Fortify, found that smart watches are significantly vulnerable…

Should You Invest In A 3D Printer?

Should You Invest In A 3D Printer?

Innovation With The 3D Printer 3D printing awareness and application has been growing slowly but steadily for the last decade and it’s clear that its use will not be limited to prototyping for much longer but instead is likely to revolutionize mainstream commercial and industrial production. Harvard Business Review indicates that more than 30% of the top 300 largest global brands are either evaluating or using 3D printing. With advances in color 3D printing, lowered…

The Lighter Side Of The Cloud – The Dating Game

The Lighter Side Of The Cloud – The Dating Game

By David Fletcher Please feel free to share our comics via social media networks such as Twitter. We fully support the sharing of our comics as long as there is clear attribution (via @cloudtweaks) to the orginal comic source.  If you are a company brand looking to utilize our comics to generate leads to/on a specific landing page, newsletter, presentation or social media campaign, you can contact us regarding commercial licensing rates. 

Big Data Algorithms: Better Journalists Than Humans?

Big Data Algorithms: Better Journalists Than Humans?

Who’s The Better Story Teller? The age of automated storytelling is moving quicker than most might imagine. You can simply specify the topic you want to write, and the software will come up with a new book in a matter of minutes. Yes, the day is not far away when we will no longer see journalists bent over their laptops in newsrooms, working hard to break the news before their competitors. A new generation of…

Promising OpenStack-Based IaaS Launched In US

Promising OpenStack-Based IaaS Launched In US

OpenStack-Based IaaS Launched In US Can Bridge Gap Between Private and Public Cloud The free, open-source cloud-computing software platform, OpenStack is poised to “bridge the gap” between public and private clouds, as the Swedish-based City Network expands its OpenStack-based Infrastructure as a Service (IaaS) into the USA. Called City Cloud, it is the pivotal hub of the company’s focused global expansion program. The OpenStack platform is already supported by most major IT companies and about…

Wearable Tech – 250 Million Smart Wearables In Use

Wearable Tech – 250 Million Smart Wearables In Use

Wearable Tech Expansion By 2018, CCS Insights predicts sales of wearable tech globally to have increased to 135 million, with over 250 million smart wearables in use. Apple Watch has been of particular interest this year, with talks of the Apple Watch 2 already surfacing. Strategy Analytics estimates that 4 million Apple Watches were sold in the second quarter of 2015, helping the overall smartwatch market grow approximately 457% annually. (Image Source: http://wearableworld.co) Technological Advances Advances…

Cloud Security Alliance (CSA) Las Vegas Security Event

Cloud Security Alliance (CSA) Las Vegas Security Event

Keynotes Set For Upcoming Cloud Security Alliance Congress Schedule of Workshops, Trainings and Certifications to Compliment Session Line Up at the only Data Privacy and Cloud Security Conference Featuring Best-in-Class Education and Networking The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the keynote presenters and session line up for the upcoming CSA Congress US at…

New Approach Addresses Cybersecurity Challenges For The IoT

New Approach Addresses Cybersecurity Challenges For The IoT

Cybersecurity Challenges For The IoT The traditional approach to cybersecurity is to assume trust and then take steps to manage what isn’t trusted. But as the concept of an industrial Internet of Things (IIoT) gains momentum, one of the primary challenges facing businesses is safeguarding connections between information technology (IT) and operational technology (OT). With this in mind, a US company has developed an innovative system that improves IT security by securing OT endpoints. Working…