THOUGHT LEADERSHIP PROGRAM

The CloudTweaks thought leadership contributor program is free to join and includes a customized profile, high visibility profile rotation, newsletter marketing, social amplification and more... Stand out as an expert in your field. 

The program is currently only available to consultants, influencers or executive level contributors.

Cohort Analysis in the Age of Digital Twins

By Bill Schmarzo | July 19, 2018

To be actionable, Big Data and Data Science must get down to the level of the individual – whether the individual is a customer, physician, patient, teacher, student, coach, athlete, technician, mechanic or engineer. This is the “Power of One.”

How Theranos Hurt the Entire Medical Tech Industry

By Kayla Matthews | July 17, 2018

Medical Tech Industry The medical field is no stranger to fraud. With so much money changing hands on a daily basis, there are bound to be a few individuals who try to take advantage of the situation. But one of

Strategies for Monetizing Data: 2018 and Beyond

By Ronald van Loon | July 16, 2018

Strategies for Monetizing Data The data revolution is here, and it creates an investment priority for enterprises to stay competitive and drive new opportunities. One of the brightest areas is data monetization, which describes how to create economic benefits, either

Where Business Intelligence Is Delivering Value In 2018

By Louis Columbus | July 13, 2018

Executive Management, Operations, and Sales are the three primary roles driving Business Intelligence (BI) adoption in 2018. Dashboards, reporting, end-user self-service, advanced visualization, and data warehousing are the top five most important technologies and initiatives strategic to BI in 2018.

Driving AI Revolution with Pre-built Analytic Modules

By Bill Schmarzo | July 12, 2018

What is the Intelligence Revolution equivalent to the 1/4” bolt?   I asked this question in the blog “How History Can Prepare Us for Upcoming AI Revolution?” when trying to understand what history can teach us about technology-induced revolutions.  One of the

Secure Business Agility

Why Information Security Need to be Empowered to Manage Data Breaches

By Evelyn de Souza | July 11, 2018

Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of

Data Protection Officers

Free Linux Firewalls of 2018

By CloudTweaks | July 11, 2018

A firewall is an important aspect of computer security these days, and most modern routers have one built in, which while helpful, can be difficult to configure. Fortunately there are also distributions (distros) of the free operating system Linux which

How to Install Nginx with Let’s encrypt and get A+ from SSLLabs Test

By CloudTweaks | July 11, 2018

In this tutorial, I will show you step-by-step how to install and configure the Nginx web server with Letsencrypt certificate. This guide will tell you about installing Nginx web server, installing the let’s encrypt tool, generating SSL certificate lets encrypt,

POPULAR

The Digital Economy: Embracing The Latest Technological Advancements

The Digital Economy: Embracing The Latest Technological Advancements

The Digital Economy As you would expect, for any business to achieve successful growth and meet its objectives, it must ...
How To Be Data Compliant When Using The Cloud

How To Be Data Compliant When Using The Cloud

Data compliant Companies using the cloud for data storage, applications hosting or anything else, have to carefully consider data compliance ...
How artificial intelligence and analytics helps in crime prevention

How artificial intelligence and analytics helps in crime prevention

How Artificial Intelligence Helps Crime Prevention According to a study released by FBI, there is an annual increase of 4.1% ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

Machine Learning Explained Once we start delving into the concepts behind Artificial Intelligence (AI) and Machine Learning (ML), we come ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...