Author Archives: CloudTweaks

Cloud Infographic: The Cloud Is Here To Stay

Cloud Infographic: The Cloud Is Here To Stay

Cloud Infographic: The Cloud Is Here To Stay Three factors were individually tested to measure server performance – processor, memory and storage – and each were evaluated working jointly during workloads for an overall server performance grade. A bare-metal dedicated server was used as a benchmark control. Read More Edit: An infographic provided by Firehost with statistical sources from Cisco,…

First High Performance Cloud Benchmarks Unveiled

First High Performance Cloud Benchmarks Unveiled Study highlights need for transparency in the cloud Dallas – May 14, 2013 – Until now, there have been very little verifiable, objective cloud performance benchmarks. FireHost, the secure cloud hosting company, has again bridged an important gap for enterprises that require a cloud they can trust before they’ll…

Cloudera Not Cutting It With Big Data Security

Cloudera Not Cutting It With Big Data Security  Cloudera is, for the moment, a dominating presence in the open source Hadoop landscape; but does it have staying power? While Cloudera’s Big Data platform is the darling of the Hadoop space, they and their open source distribution competitors have so far failed to adequately address the…

HR Security Risk Prevention…

HR Security Risk Prevention… With the rapid adoption of the Cloud by SMEs as well as large enterprises, it has become vital to review and update HR policies to mitigate information security threats that come with this paradigm shift. Cloud systems differ from traditional, in-house IT infrastructure in a way that businesses now have less…

Are PCs Committing Suicide? The Windows 8 Buyer Reactions

Are PCs Committing Suicide? The Windows 8 Buyer Reactions

Are PCs Committing Suicide? The Windows 8 Buyer Reactions When we use the term “Personal Computer”, we are generally talking about machines that can trace their ancestry to the original IBM 5150 PC, the computer architecture that brought computing to the masses. Introduced in 1981, the 5150 architecture, along with the Microsoft PC-DOS operating system,…

IT Disaster Recovery For SMEs

IT Disaster Recovery For SMEs

IT Disaster Recovery For SMEs According to credible estimates, an hour of outage may cost a medium sized company $70,000. Yes, that is accumulated losses when IT systems go offline. What’s interesting to note here is that in contrast to the popular belief that natural disasters constitute the primary reason for IT system failure, a…

Data Encryption For Education

Data Encryption For Education

Data Encryption For Education Schools, colleges and universities are facing data security issues on a regular basis and the nature of their IT systems present unique challenges. Balancing diverse information with required security control is complicated when the IT infrastructure is decentralized and difficult to manage. Adding to these challenges is a diverse user population and…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Five Reasons SMBs Fear The Cloud

Five Reasons SMBs Fear The Cloud

Five Reasons SMBs Fear the Cloud Fear of the cloud has been around since the Cloud began. SMBs were traditionally afraid of security issues, while large companies fretted about increasing the complexity of their IT infrastructure. What many budding start-up companies don’t realise is Cloud Computing helps place them on a level playing field with…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising