The Lighter Side Of The Cloud – Big Data List By David Fletcher *Please Note: All David Fletcher comic images on this site are owned by CloudTweaks.com. If you would like to reuse them on your social media network, please feel free to do so as long as there is a clearly defined link to the original comic source. If you would like to use them in a Newsletter, Print, Powerpoint or Website. Please contact us regarding the licensing details and policies.
Fog Computing Is A New Concept Of Data Distribution For the last couple of years there have hardly been any new concepts in cloud computing. But hardly doesn’t mean never. Since the summer of 2013 you might have noticed the appearance of a new trend that has been called Fog Computing. The main purpose of fog computing is to gather services, applications, large data volumes in one place and unite them with the networks of a new generation. The aim is to offer data, computing power, memory and services at a really distributed level. The thing is that today’s data
5 Perks Of Cloud-Based Business Phone Systems Every business needs to weigh the pros and cons of any particular system that they use. There are of course certain types of infrastructure that have been used for a very long time. They have become traditional and integral parts of all business operations. As a result, you will rarely question the perks that come with using such devices. Printers, scanners and photocopiers have been around for so long that it is impossible to operate an office without them. When it comes to newer forms of technology, however, a lot of people may
Cloud Infographic: Big Data – How Will It Affect Your Business For many years, companies have been building data warehouses to analyze business activity and produce insights for decision makers to act on to improve business performance. These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse. Typically, a history of business activity is built up over a number of years allowing organizations to use Business Intelligence (BI) tools to analyze, compare and report on business performance over time… Sign in
BitCoin: A Loop of Faith If you find yourself in Allentown, Pennsylvania around lunchtime, feeling a little hungry but without any cash in your pocket, take heart: the Subway franchise on Hamilton Boulevard takes BitCoin. If you have the app on your phone, your sandwich will only cost you 0.006 BTC, or thereabouts. BitCoin, the fabled virtual currency, developed in part by the Winklevoss twins, themselves famous for their early involvement with FaceBook, has upped its status in recent months, from being the currency most favoured by gun and drug runners on the Silk Road website, to receiving cautious endorsement from
Beware of Computer Malware: The Cross-Platform Problem There was a time where you could safely assume a portable drive hooked onto to a windows PC wouldn’t be able to transfer some strain of malware to a MAC system. Most viruses were a match made in heaven for Windows, and MACs were getting none of that action. Things have changed, however. We’re now faced with cross-platform threats such as Koobface, the story of which has been illustrated in the following infographic. Malware such as Koobface is only a tiny part of a much larger botched up security puzzle. One way to
Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies, has come under several cyber attacks by hacking community. Though not publicly acknowledged, some of them may have lead to data breaches as well. Also in between a new adversary has emerged in the form of Govt. assisted programs like NSA. It is now widely