Four Considerations for Businesses Who Want To Participate In the Internet of Things

Four Considerations for Businesses Who Want To Participate In the Internet of Things

Businesses Who Want To Participate In the Internet of Things The internet of things is one of the biggest technology buzzwords at the moment, and with good reason. As more devices come online, more opportunities for enterprises present themselves, and more people engage with the industry, there is a belief that by 2020 we could…

What do cloud vendors want, part 2?

What do cloud vendors want, part 2?

Last month, I wrote about part of my recent conversation with in-house counsel from several major public Canadian and U.S. cloud vendors in connection to the Canadian IT Law Association’s Annual Meeting in October. Here are some more thoughts from them on the big issues surrounding cloud computing. Read the source article at CanadianLawyerMag

Keeping A Lid On Your Data

Keeping A Lid On Your Data

Data Discretion As discussed on CloudTweaks not too long ago, invisibility is the one thing that’s very important when bringing the Internet of Things to the kitchen. That is, the process of working a home appliance has to be convenient to the point of invisibility, just like it’s with tap water–it’s simply there when we need…

MIT – Could Online Courses Replace Professors In Classrooms?

MIT – Could Online Courses Replace Professors In Classrooms?

Then came the backlash. A high-­profile experiment to use MOOCs at San Jose State University foundered. Faculty there and at other institutions rushing to incorporate MOOCs began pushing back, rejecting the notion that online courses could replace the nuanced work of professors in classrooms. The tiny completion rates for most MOOCs drew increasing attention. Thrun…

Zymatic brews beer at home with head in the cloud

Zymatic brews beer at home with head in the cloud

I just spend a few weeks living with a PicoBrew Zymatic, the cloud-connected, robotic beer-making machine developed in Seattle by veterans of Microsoft and the food industry. It’s hard to stop thinking about beer when you’re living with a beer robot. Read the source article at the Seattle Times

Certificates, trusted identities and the Internet of Things

Certificates, trusted identities and the Internet of Things

First, consider the rise of wearable technology . Today, wearables are primarily used for fitness and health care, but the fundamental premise is to use real-time data from the user and his or her surroundings to enhance interactions. We are just beginning to … Read the source article at SecureIDNews  

Cyber Security Is BIG Business

Cyber Security Is BIG Business

Cyber Security Investments Are Growing Cyber Security shares on Wall Street are soaring as hackers continue to crack into the cyber defense systems set up by government agencies, banks and retailers. Ongoing high-profile breaches have led to larger-than-life share increases of numerous US companies, as well as the exponential growth of a “passive investment” fund…

Internet of Things
Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

Is Docker The Next Big Thing?

Is Docker The Next Big Thing?

Is Docker The Next Big Thing? We often hear that a particular product or idea is going to be the ‘next big thing’, and analysts and commentators are frequently falling over themselves to predict an emerging trend or developing idea. In the case of Docker, it might actually be justified. The open source technology is…

The History Of Back-Ups

The History Of Back-Ups

The History of Back-Ups There’s no doubt about it – we are spoilt. With external hard-drives, CDs, USB memory sticks, SD cards, online storage and multiple devices with vast memories we can save, access and back up our data more easily and more efficiently than ever before. (Image Source: Maxim Yurin, SoftLogica)  It’s not always been…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereignty regulations SUNNYVALE, Calif., July 30, 2015 – Blue Coat Systems, Inc., a market leader in enterprise security, today announced it has acquired Perspecsys, Inc., a leader in enterprise cloud data protection…

Global Leaders In Malware And Malicious C2 Traffic

Global Leaders In Malware And Malicious C2 Traffic

Malware and Malicious C2 Traffic Nearly half of all malware threats in the past three months originated in the US, while both the US and China are global leaders when it comes to malicious command and control (C2) traffic. This was revealed in the latest quarterly report from NTT Group security company Solutionary released this…

Domain Shadowing – Wild West Of Internet Cyber Attacks

Domain Shadowing – Wild West Of Internet Cyber Attacks

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from Bromium Labs, security analysts, that study key trends in the cyber attack landscape and specialize…

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment  China’s Alibaba Group Holding Ltd (BABA.N) said on Wednesday it would invest $1 billion into its Aliyun cloud computing arm to challenge Amazon.com Inc’s (AMZN.O) lucrative Web Services division, opening a global front in the battle between the two e-commerce giants. With the global cloud computing market estimated by…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising