Max Azarov

Max

Zero-Rating and Data Consumption

November 15, 2016

Zero-Rating The ordinary mobile user often feels the need to backup their personal files only after they’ve lost it. It’s almost a cliché where a grad student loses their research because a laptop was lost or the father who loses

Read More
Max

White Label Program for Emerging Economies

October 24, 2016

White Label Cloud  Given our starting point, one of the inquiries we field every now and then is: ‘why did we opt to go SaaS?’ By not going the B2C route (like Dropbox and OneDrive), we laid out what we

Read More
Max

What Is RCS Rich Communication Services?

October 10, 2016

Rich Communication Services As a cloud service provider operating in emerging markets, we’re excited about the possibilities of rich communication services (RCS) offered by mobile carriers. You may remember, in the era before smartphones (and a bit after the launch),

Read More
Max

The web and the Convenience Solution

October 5, 2016

Cloud Mobility Buying a new phone is always an exciting endeavour. Whether you had just broken your phone (ouch) or re-upping after a contract expired, it’s something most people look forward to. As a mobile carrier, while your line-up of

Read More
Gary Bernstein
The Dangers of Facial Recognition Technology Facial recognition technology has become increasingly prevalent in our daily lives, from unlocking our phones to boarding airplanes. While this technology may seem convenient, its implications go far beyond ...
Cybersecurity Bootcamps To Help Build Your Career
Cybersecurity Bootcamps We've discussed the importance of training and the hiring of cybersecurity professionals many times on CloudTweaks over the past 10+ years. Now more than ever as the world enters into a dark era ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Gilad David Maayan
What Is Cloud Deployment? Cloud deployment is the process of deploying and managing applications, services, and infrastructure in a cloud computing environment. Cloud deployment provides scalability, reliability and accessibility over the internet, and it allows ...
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...