Newsletter Subscribe

Bringing you thought leadership, news, infographics, resources and our own brand of comics each week to your inbox...

CloudTweaks Tech News and Resources Home

GreenTech and the Corporate Social Responsibility

A Corporate Culture Of Green In today’s business culture there is a new type of corporate strategy emerging, one that is becoming particularly prevalent in Silicon Valley – Corporate Social Responsibility. These green credentials are ...
Read More
/

Ransomware, Backups and the Aging IT Specialist

Small Business Cloud Right now, two technology trends characterize the small business ecosystem: a growing migration to the cloud, and a growing susceptibility to cybercrime, particularly in the form of ransomware. Recently, I discovered this ...
Read More
/

Blockchain Across All Industries

Blockchain Industries Blockchain, typically understood as the technology that powers the virtual currency bitcoin, in fact, provides market applications far beyond cryptocurrencies. It’s expected that the fintech industry will be the first area in which ...
Read More
/

Security Risks Lurk Behind Corporate Wearables Adoption

Security risks and wearables adoption Wearables makers were expected to sell 274.6 million devices in 2016, according to a Gartner report. Nearly three quarters of millennials, 71 percent, say their companies should give them wearables ...
Read More
/

5 Recommendations for Effective Governance, Risk and Compliance Management

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a ...
Read More
/

Business Applications for IOT

IoT Business IoT devices for the office are making their way into the limelight with digital assistants, security devices, and mobile workflow tools advancing swiftly. According to Gartner, by 2020 over 50% of major new ...
Read More
/
ENGLEWOOD CLIFFS, N.J., Feb. 21, 2017 /PRNewswire/ -- LG Electronics' webOS 3.5 Security Manager is the first smart TV platform certified for its effective cybersecurity capabilities by UL, one of the world's foremost experts in safety, security and sustainability. The webOS 3.5 Security Manager was tested for malware susceptibility and vulnerabilities, software weaknesses and security controls that help protect users' ...
Read More
Health Cloud Capabilities ORLANDO, FL. - 20 Feb 2017: At the 2017 Health Information Management Systems Society (HIMSS) conference in Orlando, IBM (NYSE: IBM) today introduced expanded capabilities for the Watson Platform for Health Cloud and a specialized Watson Health Consulting Services unit dedicated to helping clients and partners across the healthcare ecosystem capture the business opportunity of cognitive computing ...
Read More
Philips spotlights connected technology, predictive analytics software, and artificial intelligence advancing population health and precision medicine at HIMSS 2017 AMSTERDAM, Feb. 17, 2017 /PRNewswire/ -- Featuring new and enhanced connected health offerings at the 2017 HIMSS Conference & Exhibition (HIMSS17), Royal Philips (NYSE: PHG,AEX: PHIA), a global leader in health technology, will showcase a broad range of population health management, ...
Read More
Cupertino, California — Apple today announced its 28th annual Worldwide Developers Conference (WWDC) — hosting the world’s most talented developer community — will be held at the McEnery Convention Center in San Jose. The conference, kicking off June 5, will inspire developers from all walks of life to turn their passions into the next great innovations and apps that customers ...
Read More
When Cisco Systems Inc. reports earnings Wednesday, the big question will be if the networking giant’s repeated gambles on software can reverse a yearlong sales slide, or at least point to a reversal of that trend in the future. Cisco CSCO, +1.06%  is scheduled to report fiscal second-quarter earnings less than a month after announcing its latest multibillion-dollar software acquisition, ...
Read More

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation that 80% of content most ...
Read More
Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As essential as these responses are, companies need additional layers of audit and defence further up the hierarchy if they are ...
Read More
Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of new driver experiences, including a ...
Read More
Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It's something that comes to mind for many IT managers and engineers tasked with the job of evolving their network environments while ...
Read More
A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site's host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed to have been driven through ...
Read More
Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: "Your files have been captured and encrypted. To release them, you must pay." Ransomware has grown recently to become one of the primary threats to companies, governments and institutions worldwide ...
Read More

POPULAR

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to ...
Read More

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide ...
Read More

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference - So Stop Comparing We are all familiar with the old saying “That's like comparing apples ...
Read More

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating ...
Read More

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies ...
Read More

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, ...
Read More

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion ...
Read More

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up ...
Read More

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it ...
Read More

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It's no secret that organizations are embracing the cloud and all the benefits that it entails ...
Read More