Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

7 Cloud Security Mistakes Bound To Bite You

7 Cloud Security Mistakes Bound To Bite You

7 Main Cloud Security Mistakes  Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise’s data apply. Cloud computing is to IT what Shark Week is to summertime: a cultural feeding frenzy.…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

What Don’t You Know About Your Cloud?

What Don’t You Know About Your Cloud?

Looking Under The Hood Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels like you barely know them at all. You’re right In many ways it’s…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

CIO Enterprise Forum – Top Cloud Computing Blogs 2014 Edition

CIO Enterprise Forum – Top Cloud Computing Blogs 2014 Edition

In 2012, IDG’s Colin Browning wrote an Enterprise CIO Forum article listing the top cloud computing blogs for CIOs. But cloud computing, like all enterprise technology, has changed in two years. And we’ve updated our list to focus on the latest in cloud computing. Some may look familiar, and others new. Take a look at our 2014…

Smart Home, Internet of Things, and Connected CE Key Topics

Smart Home, Internet of Things, and Connected CE Key Topics

DALLAS, TX–(Marketwired – Nov 13, 2014) – Top-level executives in the connected home technology industries will participate in the ninth-annual CONNECTIONS™ Europe: Monetizing Strategies for the Connected Home, 18-19 November at the Mövenpick … Read the source article at Marketwired

The 4 Factors of Planning a Cloud Deployment

The 4 Factors of Planning a Cloud Deployment

Organizations must take into account four important factors: security, performance, integration and legal requirements. Read The 4 Factors of Planning a Cloud Deployment Read the source article at biztechmagazine.com

Microsoft data center says no to the grid

Microsoft data center says no to the grid

Not so at the Microsoft Data Plant in Cheyenne, Wyoming, however. This data center was built alongside a wastewater treatment plant, where anaerobic digesters break down you-know-what to produce the gas that feeds the fuel cells that keep the… Read the source article at cnbc.com

Top 10 Myths Of Cloud Computing

Top 10 Myths Of Cloud Computing

Myths Of Cloud Computing Myth 1: You still don’t know what the cloud is Yes, you do, most likely. Some of the cloud technologies that the majority of businesses have used at some stage include Dropbox, Office 365 and Facebook and LinkedIn. And if you have had experience of using these systems and their storage…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

The History Of Back-Ups

The History Of Back-Ups

The History of Back-Ups There’s no doubt about it – we are spoilt. With external hard-drives, CDs, USB memory sticks, SD cards, online storage and multiple devices with vast memories we can save, access and back up our data more easily and more efficiently than ever before. (Image Source: Maxim Yurin, SoftLogica)  It’s not always been…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Announces Intent to Acquire OpenDNS Acquisition to Accelerate Cisco’s Cloud Delivered Security Portfolio SAN JOSE, Calif. – June 30, 2015 – Today, Cisco announced its intent to acquire OpenDNS, a privately held security company based in San Francisco. OpenDNS provides advanced threat protection for any device, anywhere, anytime. The acquisition will boost Cisco’s Security…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7


Contributor Spotlight

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising