Cloud Infographic – Santa’s Cloud ERP Workshop

Cloud Infographic – Santa’s Cloud ERP Workshop

Santa’s Cloud ERP Workshop In the spirit of the holiday season. Ever wonder what Santa’s workshop looks like in the era of cloud computing? Hint: Santa is not only gifting wearables this holiday season, he and his crew are using them in conjunction with the workshop’s CRM and ERP systems to ensure a seamless front to…

Cloud Infographic – Marketing The Cloud

Cloud Infographic – Marketing The Cloud

Marketing The Cloud There is no denying that Marketers have realized the power of using words and phrases such as “Cloud computing“. However, too many times the term is overused/misused which treads down the questionable path of Cloud Washing. Normally these are imitators and sometimes a few reputed companies that have been swayed by the attraction…

Digital Meets Analog: Problems With Digitizing The Physical World

Digital Meets Analog: Problems With Digitizing The Physical World

Digital Meets Analog Although the world has in some ways become what Sci-Fi authors thought it would, some ideas, like self-driving cars, are rather far from becoming a reality. The problem? The earth is just too much, and too diverse information. To investigate this, we should look at the on-going attempts to map the physical…

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop The mannequin in the store window stares blankly ahead as shoppers look at the clothes it is dressed in and contemplate a purchase. One shopper makes some comments. “It’s nice. I wonder if they have my size.” Another takes a few steps inside the store to see where these particular clothes might…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Public or Private Cloud: Costs The Main Factor After All?

Public or Private Cloud: Costs The Main Factor After All?

Are Cloud Costs The Main Factor? Even though private and public cloud is usually a choice between flexibility/security and loss of control versus keeping it, there is increasing evidence that, for all the benefits of the public cloud, many companies would actually save by establishing a private cloud. A report on the subject states that…

Four Considerations for Businesses Who Want To Participate In the Internet of Things

Four Considerations for Businesses Who Want To Participate In the Internet of Things

Businesses Who Want To Participate In the Internet of Things The internet of things is one of the biggest technology buzzwords at the moment, and with good reason. As more devices come online, more opportunities for enterprises present themselves, and more people engage with the industry, there is a belief that by 2020 we could…

Humor Library

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

Hoarders And Data Collectors: On The Brink Of Unmanageability

Hoarders And Data Collectors:  On The Brink Of Unmanageability

Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

DRaaS: Can Make Providers Life Easier

DRaaS: Can Make Providers Life Easier

DRaaS Planning Earlier in Part 1 this week we’ve touched on “What Is DRaaS?”. Now we will explore this a little further.  Disaster recovery situations are always high pressure, stressful affairs which require cool heads and excellent planning. What can service providers of DRaaS to do to make life easier for their customers and to…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising