Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

5 Cloud-Based Customer Service Trends

5 Cloud-Based Customer Service Trends

By CloudTweaks | July 1, 2016

Customer Service Trends Customer service has become the new battleground in today’s marketplace. In fact, 97 percent of customers around the world now say that customer service makes a key difference in whether they decide to go with a brand…

Conquering Disease with Artificial Intelligence and IBM Watson

By CloudTweaks | June 30, 2016

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer.…

The Fundamentals of Predictive Analysis

By Jennifer Klostermann | June 30, 2016

Predictive Analysis Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions…

Clouding Around With The Unicorns

By CloudTweaks | June 30, 2016

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16…

Achieving Network Security In The IoT

By Michela Menting | June 30, 2016

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of…

Increasing Efficiency and Reducing Cost with Managed Printing Services

By Jennifer Klostermann | June 29, 2016

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big…

Big Data Predictions: Who Will Win The UEFA Euro 16?

By CloudTweaks | June 29, 2016

UEFA Euro 16 Iceland beating England on Monday 27 June 2016 and causing them drop from UEFA Euro 16 was a surprising result. This is even more unexpected in light of Microsoft Bing’s predictions for how the championship would play…

What Do You Do With A Drunken Sailor? Look To The Cloud

By CloudBuzz | June 29, 2016

Saferide App Petty officer Michael Daigle of the US Navy has rolled out an app to curb drunken driving in the Navy ranks. His Saferide ride-sharing service runs on Voxox’s Cloud Phone service which costs just $15 a month and…

Red Hat Offers Container Native Persistent Storage for Linux Containers

By CloudBuzz | June 28, 2016

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading…

8 Cloud Characteristics Every ERP System Needs

By Aaron Continelli | June 28, 2016

ERP System Cloud-based ERP systems offer many benefits to a growing organization. And those benefits are catching on in a big way in recent years. In fact, according to the RightScale State of the Cloud 2016 Survey, which has collected…


Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation When we think about cryptographic keys, we tend to think about closely guarded secrets. Keys are the only ...
Cloud Migration and Cyberwar

Cloud Migration and Cyberwar

Cyberwar Concerns This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically ...
Advanced IoT systems provide analysis catalyst for the petrochemical refinery of the future

Advanced IoT systems provide analysis catalyst for the petrochemical refinery of the future

Advanced IoT Systems The next BriefingsDirect Voice of the Customer Internet-of-Things (IoT) technology trends interview explores how IT combines with IoT to help ...
Why a White Label Cloud for Emerging Economies

Why a White Label Cloud for Emerging Economies

White Label Cloud  Given our starting point, one of the inquiries we field every now and then is: ‘why did ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
Death of Traditional Enterprise Storage

Death of Traditional Enterprise Storage

Traditional Enterprise Storage Back in 2003, Chris Pinkham and Benjamin Black, two engineers working for Amazon.com, proposed a dramatic overhaul ...
Selfie Drone Privacy Issues

Space Invaders – Is That A Selfie Drone I See Before Me?

Selfie Drone Privacy Issues The growing concept of privacy is one that I find very interesting and this is where ...


CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to recieve our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Excluisve promotions and our popular Comic series.


Something went wrong. Please check your entries and try again.