Ericsson Turns to Silicon Valley Scientist in Cloud Effort

Ericsson Turns to Silicon Valley Scientist in Cloud Effort

Since starting in March as head of Ericsson’s newly created cloud unit, Jason Hoffman, 42, has helped orchestrate a takeover of a California software provider and struck a partnership with a security company to bolster his division and differentiate its offering. While information-technology giants such as International Business Machines Corp. (IBM), Hewlett-Packard Co. and Microsoft…

News: Spanning Is Acquired By EMC Corporation

News: Spanning Is Acquired By EMC Corporation

Company Continues To Do Business as Spanning Cloud Apps in EMC’s Core Technologies Division; Serves as Foundation for EMC’s “Born-in-the-Cloud” Data Protection Strategy AUSTIN, Texas – October 28, 2014 – Spanning Cloud Apps, Inc., the most trusted provider of data backup and recovery for cloud applications, today announced that it has been acquired by EMC…

Will Virtual Reality Replace The Virtual Desktop?

Will Virtual Reality Replace The Virtual Desktop?

Ever since Facebook acquired the rapidly growing Oculus Rift, it seems like virtual reality has not stopped gaining attention in the tech world. Virtual reality is becoming more than just a sci-fi special effect as the quality and wearability continue to improve. People like Oliver Kreylos, who works for the Institute for Data Analysis and…

Do Organisations Face A Security Risk From Apps?

Do Organisations Face A Security Risk From Apps?

Yesterday we looked at the growing area of Shadow IT within organisations. We concluded that even though Shadow IT has the potential to be a force for good, there is still a significant threat posed by the usage of apps that do not align with a company’s security, compliance, reliability, documentation or control. How much…

Shadow IT – Threat or Opportunity?

Shadow IT – Threat or Opportunity?

Shadow IT Shadow IT – sometimes referred to as Stealth IT – describes the usage of IT systems and solutions that are built and used inside businesses and organisations without explicit approval from IT departments and/or management. Fueled by the growth of BYOD policies, Christopher Rentrop, Professor of Informatics at Konstanz University of Applied Sciences, believes…

Cloud: Enabling Virtualised Banking Environments

Cloud: Enabling Virtualised Banking Environments

Enabling Virtualised Banking At the outset it is important to understand where cloud will fit into the existing banking landscape and in order to do so, one must first recognize that the biggest development of recent times is the complete transformation and virtualisation of traditional banking services. Emphasis is on the digitisation of products and…

Critical Thinking And Big Data

Critical Thinking And Big Data

In a deeply moving TED talk about the importance of critical thinking when dealing with data, big or small, Susan Etlinger reminds us why it’s important to think twice before assuming anything, even when backed up by data. Inevitably, morality comes into play too. As more and more problems, including perhaps fundamental ones, are tackled…

CloudTweaks Comics
5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…