Author Archives: CloudTweaks

Chi-East Selects Equinix as its Primary Cloud Data Hosting Provider

Chi-East Selects Equinix as its Primary Cloud Data Hosting Provider SINGAPORE — August 24, 2011 — Chi-East, the independent, pan-Asian trading venue, and Equinix, Inc. (Nasdaq: EQIX), a provider of global data centre services, today announced that Chi-East has chosen Equinix’s Singapore 2 (SG2) International Business Exchange™ (IBX®) as its primary data centre. Chi-East, which…

Amazon Announces ElastiCache

Amazon Announces ElastiCache Amazon ElastiCache is a web service that makes it easy to deploy, operate, and scale an in-memory cache in the cloud. The service improves the performance of web applications by allowing you to retrieve information from a fast, managed, in-memory caching system, instead of relying entirely on slower disk-based databases. Amazon ElastiCache…

Model Metrics Identifies Top Five Enterprise Cloud Computing Priorities

CHICAGO – August 22, 2011 – Model Metrics, the leader in cloud computing services for the enterprise, today identified the top five enterprise cloud computing priorities for 2011, based on more than 150+ enterprise customer projects completed so far this year. As one of the earliest cloud services companies, Model Metrics has a unique vantage…

Hewlett-Packard May Spin Off PC Business To Focus On Cloud Computing

Hewlett-Packard May Spin Off PC Business To Focus On Cloud Computing Hewlett-Packard Co (HPQ.N), which may spin off the world’s largest PC business, is no longer a “safe haven” stock, said Robert W. Baird, which downgraded the stock to “neutral” on weak results and the company’s decision to overhaul its portfolio. As part of a…

3 Handy Cloud Computing Price Comparison Engines

3 Handy Cloud Computing Price Comparison Engines We’ve researched a number of sites for the best cloud specific price comparison search engines.  And we’ve come up with 3 of them which should help you in determining the best service for the best price. If you run a small, medium or large business you should be…

Red Hat Enterprise Virtualization 3.0 Beta Now Available

Red Hat Enterprise Virtualization 3.0 Beta Now Available Latest Red Hat Enterprise Virtualization release includes new advanced virtualization management features and industry-leading performance and scalability Mumbai – August 18, 2011 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the release of the Beta of Red Hat Enterprise…

Cloud Music: Rdio Killed The iTunes Star

Rdio killed the iTunes star You may have heard of Apple’s iCloud, the Amazon Cloud Player and Google Music Beta, remote music storage services for smartphones, laptops and desktop computers. Rdio is another such service, lesser known but at least equally connected, and with one major advantage over its competitors. Founded by the creators of…

Contributors

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter