Author Archives: CloudTweaks

Vyatta Secures $12 Million in Funding Led by HighBAR Partners

Vyatta Secures $12 Million in Funding Led by HighBAR Partners Software Networking Innovator to Fuel Virtual Networking and Cloud Growth BELMONT, Calif. – November 15, 2011 – Vyatta, the leader in software-based networking for physical, virtual and cloud infrastructures, announced today it has completed a funding round of $12 million led by HighBAR Partners. Also…

Building the Dell Private Cloud with Advanced Server and Storage Virtualization Dell Solutions Tour

We invite you to join us for an information-packed, educational opportunity with the Dell Compellent-VMware virtualization team. Building the Dell private cloud with advanced server and storage virtualization   Dell Solutions Tour – North America, November 2011 We invite you to join us for an information-packed, educational opportunity with the Dell Compellent-VMware virtualization team. Reserve…

Virtualization: Thin on Thin Provisioning – Good Idea or Recipe for Disaster?

Virtualization: Thin on Thin Provisioning – Good Idea or Recipe for Disaster? I was part of a panel at a recent GreenPages event and a question was asked by the audience regarding best practices for thin provisioning in a virtual environment.  More specifically, the question was, what is the best practice regarding thin on thin…

Symantec Instant Messaging Security. cloud Addresses Security and Compliance Issues for Corporate Instant Messaging Platforms

Survey finds Instant Messaging is the weakest link when it comes to corporate security and compliance MOUNTAIN VIEW, Calif. – Nov. 14, 2011 – Symantec Corp. (Nasdaq: SYMC) today announced the worldwide availability of Symantec Instant Messaging Security. cloud (IMS.cloud) with support for Microsoft Lync. Symantec is one of the first SaaS vendor to support Microsoft…

What Is Cloud Computing? Yes, Another Perspective – Part 2

What Is Cloud Computing? Yes, Another Perspective – Part 2: CLOUD COMPUTING MODELS Continued From Part 1 Cloud computing has several deployment models that are adopted according to need and requirement. Each configuration is implemented according to specific circumstances and necessities. In the following paragraphs, these techniques will be discussed one by one while outlaying…

Contributors

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter