Sorry, we couldn't find any posts. Please try a different search.

POPULAR

Financial Management Finds a Welcome Home in the Cloud

Financial Management Finds a Welcome Home in the Cloud

Cloud Based Financial Management The most cautious person in any organization is likely to be the CFO. After all, they’re ...
AI – The Present in the Making

AI – The Present in the Making

I attended the Huawei European Innovation Day recently, and was enthralled by how the new technology is giving rise to industrial revolutions ...
VR Gaming

How The Cloud Will Make VR Gaming More Popular

VR Gaming Cloud As far as many gamers are concerned, the future of video games lies in two main areas: ...
Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information ...
Cloud Architecture

Cloud Architecture – The Multi-Tenant Versus Multi-Instance Debate

Cloud Architecture Winston Churchill quotes, “We shape our buildings; thereafter they shape us”. We can truly extend this analogy to ...
How to Simplify Multi Cloud Complexities Before Adopting

How to Simplify Multi Cloud Complexities Before Adopting

Simplify Multi Cloud Complexities The enterprise is moving quickly from a single-cloud deployment strategy to one that encompasses multiple clouds ...
PODCAST - EPISODE 2: Trains, Security and AI

PODCAST – EPISODE 2: Trains, Security and AI

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using ...
Matthew Cleaver

Identifying Threats and Trusting a Third Party with Your Data

Third Party Data With data security breaches and identity thefts increasing every year, it is important for businesses to consider ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Companies Must Be More Transparent About Security Moving Forward

Companies Must Be More Transparent About Security Moving Forward

Security and Transparency You may remember, Home Depot was affected by a sizeable data breach in 2014. The incident is widely ...