The Lighter Side Of The Cloud – Virus Control

By Christian Mirra | March 18, 2016

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our

Automatic Braking Sensors Expected In Future Automobiles

By CloudBuzz | March 17, 2016

Automatic braking will be standard in most cars and light trucks within six years, and on heavier SUVs and pickup trucks within eight years, according to an agreement that transportation officials and automakers announced Thursday. The voluntary agreement with 20

Edutech and the Online Education Industry

By CloudTweaks | March 17, 2016

Edutech Trends Over the last 20 years we have seen the classroom evolve in very tactile ways. Blackboards became whiteboards to reduce dust in the classroom, pencils became pens as a means to reduce instrument breakage and the need for

How To Develop A Business Continuity Plan Using Internet Performance Management

By Jeremy Daniel | March 16, 2016

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some

4 Industries Being Transformed By The Internet of Things

By Jeremy Daniel | March 15, 2016

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with

Pinup: CloudRAIL – Laying Down The IoT Tracks With API’s

By Jeremy Daniel | March 14, 2016

The Internet of Things and API’s If you have been paying attention to the technology press in 2016, it’s likely that you will view the impending arrival of the Internet of Things (IoT) as an inevitability. The IoT, coupled with

Are Cloud Solutions Secure Enough Out-of-the-box?

By Sarah Patrick | March 14, 2016

Are Cloud Solutions Secure? Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In

IoT Innovations Expand To New Industries

By CloudTweaks | March 14, 2016

IoT Innovations The Internet of Things has moved far beyond a commonly tossed around buzzword. Instead IoT has solidified its place globally as a ‘must have’ for today’s most innovative companies. Organizations across a wide variety of industries are opening

The Evolution Of The Connected Cloud

By Scott Andersen | March 11, 2016

The Connected Cloud Cloud computing is interesting first, but not only, because of the prevalence of cloud projects. There are many of them launched every day. Some have lofty expectations for business benefits (cost saving of 20 percent or more)

Medical Professionals Face Unique Challenges Using The Cloud

By Leo Welder | March 10, 2016

Medical Professionals Using The Cloud The presence and value of Cloud tools have seeped into virtually every industry, and the medical profession is certainly no exception. However, because of the special rules regarding patient privacy, specifically those found in HIPAA,

SECURITY

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing ...
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing ...
Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attacking Targets Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers In ...
The Unintended – and Intended – Consequences of Cloud Data Sovereignty

The Unintended – and Intended – Consequences of Cloud Data Sovereignty

Cloud Data Sovereignty It seems that everything has unintended consequences – whether positive or negative. Intended consequences are those that ...
Four Cloud Security Mega Trends

Four Cloud Security Mega Trends

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid ...
Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy ...
The Connected Car: The Unknown Hero of Automotive Innovation

The Connected Car: The Unknown Hero of Automotive Innovation

Connected Car Innovation Spanning the last decade, the automotive industry has seen an explosion of technological innovation which has, and ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
Cloudification - Budgets are Shifting Toward a “Cloud-first” and “Cloud-only” Approach

Cloudification – Budgets are Shifting Toward a “Cloud-first” and “Cloud-only” Approach

Cloudification and the Budget Shift Gartner has recently predicted that by 2020, a corporate "no-cloud" policy will be as rare ...
Business Intelligence And Analytics In The Cloud, 2017

Business Intelligence And Analytics In The Cloud, 2017

Business Intelligence In The Cloud, 2017 78% are planning to increase the use of cloud for BI and data management ...