THOUGHT LEADERSHIP PROGRAM
The CloudTweaks thought leadership contributor program is free to join and includes a customized profile, high visibility profile rotation, newsletter marketing, social amplification and more... Stand out as an expert in your field.
The program is currently only available to consultants, influencers or executive level contributors.
Impact of AI and 5G This blog post was made in collaboration with Intel. A smarter world is now a possibility that is starting to sound real. Data sits at the center of this change, and data can be referred
Economics of Starting Pitching I’m a big fan of Woody Allen’s earlier movies such as “Bananas”, “Sleeper” and especially the award winning “Annie Hall.” One of the things that always impressed me about Woody Allen was his ability to reframe the
Oil Industry Can Benefit from IoT In 2010, the Deepwater Horizon oil tragedy struck and took the nation’s attention for months. Two-hundred million gallons of oil spilled, 16,000 miles is the range it spread across the coastline from Florida to Texas, 8,000
While Dependency of Organizations Shifts towards In-house Cybersecurity Professionals A major overhaul of data security led by stringent regulatory mandates has caused a meteoric rise in the adoption of data protection tools. Every enterprise dealing with consumer data has to
Insurance Companies and Big Data Your lifestyle, behavior, and attitudes can affect your health, and increasingly health insurance companies are finding ways to gather that information on you. With the rise of technology, many companies are compiling data sets that
Function as a Service Capabilities The cloud has changed. Ten years ago, it was all about cost. The benefits were clear: your IT team could access resources as required – provisioning some storage here, spinning up a VM there –
The Current State Of Cybersecurity 41% of total breaches in 2017 targeted the healthcare industry, making it the most popular target for breach attempts. Personally Identifiable Information (PII) combined with user credentials tops the percentage of breaches with 29% according
Caveats about ‘Password’ Continued from Part 1… Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’. We are of the view that it would be desirable to
When I was a kid, I use to love “Paint by the Numbers” sets. Makes anyone who can paint or color between the lines a Rembrandt or Leonardo da Vinci (we can talk later about the long-term impact of forcing kids
With the increased adoption of public cloud infrastructure services like AWS in the enterprise, there’s also a growing need for clear identity and access policies to ensure sensitive enterprise data is secure. While many organizations have controls around cloud services