Growth Of The European Cloud Market

Growth Of The European Cloud Market

The European Cloud Market We’ve written about the international cloud markets a number of times on CloudTweaks and it makes for some interesting discussion. A number of our 12/12 contributors have touched on some of the key points as to why there are such cloud adoption challenges. Roger Strukhoff discusses: “There are significant issues of data sovereignty…

The Gist Of Virtualization

The Gist Of Virtualization

What Is Virtualization? Virtualization, a foundational element of cloud computing, makes computing environments autonomous from their physical infrastructure. It makes it possible to run many operating systems and applications on one server at the same time and helps businesses increase efficiency, flexibility, and utilization while reducing IT costs. Cloud computing delivers the shared software, computing…

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law will consolidate government control over digital data and consequently have significant consequences for international and…

The Evolution of Data Transfer

The Evolution of Data Transfer

Data Transfer Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have not progressed as far as physical delivery system. Centuries ago, Greek soldiers carried messages across great distances by foot. Today, delivery systems handle daily mail with a network of transportation modes,…

Data Violations – Record Year For Data Breaches

Data Violations – Record Year For Data Breaches

Record Year For Data Breaches The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and last month Ars Technica discussed in detail the information breach at the U.S. Government’s Office of Personnel Management. MSPmentor‘s current IT security news includes the…

A Marketplace of Networks: Simplifying Enterprise Cloud Connectivity

A Marketplace of Networks: Simplifying Enterprise Cloud Connectivity

Simplifying Enterprise Cloud Connectivity and Consumption Cost. Agility. Innovation. For the modern-day enterprise, the advantages of migrating business applications to the Cloud are many. From substantial cost savings realized through economies of scale and pay-per-use models, to faster innovation and time to market, to the agility and flexibility of auto-scaling systems to accommodate growing application…

Pentagon, FBI And NSA Train US And British Officials For Cyber War

Pentagon, FBI And NSA Train US And British Officials For Cyber War

Officials Train For Cyber War Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, Virginia last month. The exercise was designed to train US and British officials and military personnel, as well as several key-companies, for inevitable large-scale cyber…

IoT

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT Prior to joining the consulting side of the industry, I worked in corporate IT for the first 7-8 years of my career. While my time in corporate IT has long come to a close, I can still vividly recall the pain points and dreaded battles I endured. A…

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Big Tech Trends For The 21st Century

Big Tech Trends For The 21st Century

Tech Trends For The 21st Century When the historians of the future look back on the 21st century, what will they say? Inevitably, the biggest stories in the coming century will be political and environmental – wars, revolutions, and natural disasters always dominate historical memory. But perhaps more than any previous epoch, the 21st century…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Report: Cybercriminals Rely On People To Access Corporate Environments

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed 10 million users as well as 1 billion files and more than 91,000 applications and…

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms The National Security Agency (NSA) has announced that it plans to introduce methods of cryptology that will make quantum computers secure. Acknowledging that quantum computers are likely to become a reality in the not too distant future, they say they are committed to the transition and are doing everything…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising