China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law will consolidate government control over digital data and consequently have significant consequences for international and…

Queralt Secures Apple iPads with Cloud

Queralt Secures Apple iPads with Cloud A new cloud based management, tracking, and notification application by Queralt is enabling users to track and secure Apple iPads in schools and businesses. Queralt, a developer of value-based RFID and sensor technology applications, notes that it has developed iOs enabler for iQ3 framework to help businesses know where…

Cloud Computing Goes Mainstream

Cloud Computing Goes Mainstream When does a technology actually become mainstream, an established part of our daily lives? Is it when it becomes part of the popular vocabulary, or when there’s an addition to the Oxford English Dictionary confirming its existence? Is it when companies make money selling that technology, or when people make money…

RIM Introduces Cloud Service for Small Business

RIM Introduces Cloud Service for Small Business Research In Motion (RIM) has unveiled a free online service for small businesses to centrally manage company- or employee-owned BlackBerry smartphones in the cloud. The new service-BlackBerry Management Center- also can protect business-related content stored on the handsets. “We are pleased to introduce RIM’s latest cloud service designed…

Cloud Service ‘InMage’ Announces Industry Visionary Kumar Malavalli as CEO

SANTA CLARA, Calif. – August 15, 2011 –InMage® (www.inmage.com), the leading independent software vendor of award winning, disk-based, business application recovery solutions and cloud computing solutions, today announced the appointment of technology industry icon Kumar Malavalli as CEO. Malavalli is widely considered to be a leading visionary in network storage fabrics, the fundamental technology that…

Templeton Leverages Microsoft to Build Cloud for CPA Firms

Templeton Leverages Microsoft to Build Cloud for CPA Firms Templeton Solutions has build a cloud-based practice management system exclusively on Microsoft Dynamics CRM 2011.  This program -TC Practice Management -offers professional services firms to achieve faster growth and greater profitability.  Through this initiative, Templeton Solutions is eliminating the need of toggling between programs as its…

The New Chinese Cloud OS

The New Chinese Cloud OS While the bulk of cloud computing coverage, here and elsewhere, deals with news and events in the US, there’s a whole wide world out there that has taken to cloud computing with a storm. Over the last few months, I have tried to include locations outside the US in my…

Justifying Your Cloud Investment: Web Sites

Justifying Your Cloud Investment: Web Sites This report examines the case for deploying Web sites onto an IaaS cloud computing environment. Agility is a common cloud advantage, and this translates into faster time-to-resources for application development and operations professionals. But business justification only comes from ensuring the right fit between the applications and the cloud…

IBM Cloud Boosts Sales for S&S Worldwide

IBM Cloud Boosts Sales for S&S Worldwide IBM cloud has driven personalized product recommendation sales for S&S Worldwide via its Web sites.  S&S, a national distributor of sporting goods products for recreation, health care, and education professionals grew recommendation sales 75 percent in just three months with IBM Smarter Commerce software in the cloud. Before…

How is the Software Outsourcing Industry Embracing the Cloud

How is the Software Outsourcing Industry Embracing the Cloud One of the cloud computing trends I identified referred to custom cloud computing services and I believe that outsourcing providers will gradually turn into experts in migrating to the cloud and offering this type of services. Whether you wish to migrate some of your applications or…

IoT

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting Did you know that 113 phones are lost or stolen every minute? What about the fact that 1 in 10 computers are infected with a virus every month? Thanks to World Backup Day, an independent initiative that was started in 2011, awareness is being raised about…

Leveraging Carrier Ethernet To Connect To The Cloud

Leveraging Carrier Ethernet To Connect To The Cloud

Connecting To The Cloud Determining the Best Cloud Connectivity Solution With the Cloud only being as good as employees’ ability to effectively access it, the overall user experience depends highly on enterprise network connectivity. Today, the Internet is the predominant method to connect to Cloud applications services. Internet connectivity is readily available in all markets.…

3 Ways To Keep Fit With The Cloud

3 Ways To Keep Fit With The Cloud

3 Ways To Keep Fit With The Cloud The recent launch of Google Glass brought with it several interesting and exciting prospects for the future of wearable tech. Although wearable tech has arguably existed since the introduction of the ‘calculator watch’ in the 1980s, it is only with the growth of the cloud computing industry…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Report: Cybercriminals Rely On People To Access Corporate Environments

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed 10 million users as well as 1 billion files and more than 91,000 applications and…

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms The National Security Agency (NSA) has announced that it plans to introduce methods of cryptology that will make quantum computers secure. Acknowledging that quantum computers are likely to become a reality in the not too distant future, they say they are committed to the transition and are doing everything…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising