The Lurking Threat Called Passivity

The Lurking Threat Called Passivity

By Steve Prentice | February 22, 2016

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around…

Security: The Goodwill Virus That Keeps On Giving

By Steve Prentice | February 11, 2016

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced.…

Hybridization: A Mindset Approach

By Steve Prentice | February 3, 2016

The Social Data Cloud One of the most amazing attributes of the cloud and its related technologies is its sheer openness. New companies and ventures spring up daily, fueled, in some cases, by one single good idea. They launch first…

Hybridization: The Executive Roundtable

By Steve Prentice | January 27, 2016

Hybridization When discussing migration to the cloud, the use of hybrid cloud and all other cloud-related issues, people generally place the focus on the technology itself. What sometimes gets overlooked is the group of individuals who are — or at…

Video Meetings And The Face To Face Conundrum

By Steve Prentice | December 17, 2015

The Face To Face Conundrum Meetings have been a scourge on business productivity for many decades. British comedy genius John Cleese released a corporate training film back in 1976, entitled Meetings, Bloody Meetings, which not only became an instant classic,…

The Blended Mindset – Converging Through The Screen

By Steve Prentice | December 7, 2015

The Blended Mindset It has been a long time since a phone was just a phone. In fact, people start to show their age when they refer to their device as a “cellphone.” It is far more than that. The…

The Rise of The As-a-Service Industry

By Steve Prentice | November 17, 2015

No Longer Doing It by the Book: The Rise of the As-a-Service Industry In mid-2015, a world leader in online book sales announced a ground-breaking approach to royalty payments to authors whose books were listed on their e-book lending service.…

The Idiosyncrasies of Bitcoin and the BlockChain

By Steve Prentice | November 10, 2015

The ‘Centerless’ Economy Have you ever wondered why certain coins have ridged edges? They are prevalent within the currencies of many nations. The mint actually calls it “reeding.” But what is it for? There was a time when the coins…

Furthering Business By Seeing Beyond

By Steve Prentice | October 22, 2015

Furthering Your Business Here is a typical customer service story that illustrates the gap between the power of modern commerce and the struggling mindset of business. John is a retail customer, who, like many people, enjoys shopping at specific stores.…

POPULAR

Uh – Oh! Is This the Year of the Tipping Point for You?

Uh – Oh! Is This the Year of the Tipping Point for You?

Cloud Tipping Point One survey says most workloads are still in on-premise data centers. Another analysis says it’s all going ...
Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attacking Targets Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers In ...
Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the ...
Safeguarding Data When Employees Leave The Company

Safeguarding Data When Employees Leave The Company

Safeguarding Data Employee turnover is unavoidable. According to CompData Consulting, the average employee turnover rate in 2015 in the US ...
The Security of Cloud-Based Software and Client Communication

The Security of Cloud-Based Software and Client Communication

Cloud-Based Software Security The fear of not having a secure cloud-based software should far outweigh the fear of switching to a ...
How IoT and OT collaborate to usher in the data-driven factory of the future

How IoT and OT collaborate to usher in the data-driven factory of the future

The Data-driven Factory The next BriefingsDirect Internet of Things (IoT) technology trends interview explores how innovation is impacting modern factories and supply chains ...
Cloud’s Mighty Role - Why Custom Development is the Next Big Thing (Again)

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes ...
Big Data and Autism

Can Big Data Help Us Create a Medical Test for Autism?

Big Data and Autism Many mysteries surround autism spectrum disorder. Arguably, one of the largest is how to authoritatively diagnose ...

NEWSLETTER SUBSCRIBE

CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to recieve our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Excluisve promotions and our popular Comic series.

JOIN US

Something went wrong. Please check your entries and try again.