Author Archives: CloudTweaks

IO To Get Into The Cloud Computing Business

IO To Get Into The Cloud Computing Business

Cloud news round up for the week.


IO To Get Into the Cloud Computing Business – Usually putting all of their manpower into modular data by running modular data centers, IO are reportedly set to get into the cloud computing business. Launching a new service that is aptly titled ‘IO. Cloud’, their brand new cloud powered servers will be built using Open Compute server designs and will run on the OpenStack cloud computing operating system, ensuring that things run smoothly even with shedloads of data. The IO. Cloud website describes the decision to use Cloud Computing with the following, “IO. Cloud is built on Open Compute because it provides [their] engineers with the flexibility to configure and optimize the hardware specifically for cloud scale deployments”.

Is Angry Birds Being Mined for Data by the NSA? – According to recent reports, the answer to that question is ‘yes’. It has come to light that many social networking, mapping and gaming apps are being used to collect data from users, due to the fact that many people are willing to share their data with them. Many people sign up to accounts within these apps using their email addresses and phone numbers and even their credit card details, making it a good place to start for a government organization that collects these things. It is also said that GCHQ, the UK intelligence agency, has been working with the NSA on this data mining project.

Lenovo To Focus On Cloud Tech After Buying IBM ServersIt has been a week since the Chinese hardware maker, Lenovo Group, announced that they are planning to buy IBM’s x86 server business for the pricey cost of $2.3 billion USD, a move that comes almost a decade after Lenovo bought IBM’s PC group. Not only is this a big business move for Lenovo, who are the world’s largest PC maker, it also signals a reshuffling within the company’s organization. From April 1st, it is being reported, Lenovo will restructure to their business to operate four business units, including mobile, enterprise, PC and cloud, a decision that is said to reflect Lenovo’s strategy to grow beyond their PC business.

By Jennifer Livingstone

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

MONROE, La., and PHOENIX – January 29, 2014 – CenturyLink (NYSE: CTL) and IO today announced a strategic agreement to expand the CenturyLink Technology Solutions colocation footprint using IO’s Intelligent Control technology platform, with initial deployments at IO Phoenix and nearby IO Scottsdale.
century link

CenturyLink Technology Solutions, which formerly operated under the name Savvis, will enter the Phoenix market as a hosting and colocation provider, making up to 9 megawatts of additional capacity available to its clients through rapidly deployable IO technology. CenturyLink has a deep understanding of the Phoenix market, where it maintains a substantial network services business and employs more than 1,700 employees.

The IO Intelligent Control technology platform consists of IO.Anywhere® data center modules and the integrated IO.OS® data center operating system, which provides integrated control, data collection and business intelligence across data center infrastructure, IT equipment, applications and users of the data center. In the CenturyLink data center space, IO’s technology will be complemented by CenturyLink’s broad set of colocation, managed services, cloud and network offerings. Clients will also gain access to CenturyLink’s ClientConnect, an online gateway for businesses to expand their capabilities by locating, connecting and sharing services with other businesses residing across CenturyLink’s global data center footprint.

CenturyLink continues to invest in expanding our global data center footprint into key markets like Phoenix and extending our hosting capabilities through new technologies like IO’s Intelligent Control platform,” said Jeff Von Deylen, president of CenturyLink Technology Solutions. “The pioneering IO technology enhances our product mix with the latest options for delivering flexible hybrid IT solutions. IO’s energy-efficient data center technology platform can be deployed just-in-time, helping us to preserve capital and enabling our clients to reduce costs and operate more efficiently.

With its immense global footprint, world-class data center capabilities and Savvis legacy, CenturyLink Technology Solutions is a major force in the industry,” said George D. Slessman, IO chief executive officer and product architect. “We believe CenturyLink’s substantial commitment to IO technology further validates that our Intelligent Control platform can meet the demands of large-scale, global service providers.”

Armed with IO’s prefabricated modular technology and proprietary data center operating system, CenturyLink is rounding out its digital infrastructure offering by combining a sophisticated, agile and intuitive data center platform with its deep stack of IT services, optimizing customer scalability and management capabilities,” said Michael Levy, data centers senior analyst at 451 Research.

This strategic agreement with IO follows recent CenturyLink announcements regarding investments in its hosting capabilities, including the acquisitions of Tier 3 and AppFog and data center construction projects in Toronto and Minneapolis. CenturyLink operates more than 50 data centers worldwide, with more than 2.5 million square feet of gross raised floor space throughout North America, Europe and Asia.

About CenturyLink Technology Solutions

CenturyLink Technology Solutions delivers innovative managed services for global businesses on virtual, dedicated and colocation platforms. For more information, visit

About CenturyLink

CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The company is a global leader in cloud infrastructure and hosted IT solutions for enterprise customers. CenturyLink provides data, voice and managed services in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers for businesses and consumers. The company also offers advanced entertainment services under the CenturyLink® Prism™ TV and DIRECTV brands. Headquartered in Monroe, La., CenturyLink is an S&P 500 company and is included among the Fortune 500 list of America’s largest corporations. For more information, visit

About IO

IO is a global leader in software-defined data centers and has pioneered the next generation of data center infrastructure technology. IO’s integrated hardware and software data center technology platform offers enterprises, governments, and service providers an innovative way to deploy, provision, and optimize data center capacity anywhere in the world. IO technology lowers the total cost of data center ownership compared to traditional data centers, enabling dynamic deployment and intelligent control based on the needs of IT equipment and applications in the data center.

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Most Used Cloud Apps 

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation.

Below is an infographic provided courtesy of the group at Netskope which goes into further detail.


Infographic Source: Netskope

Zenoss Cloud Monitoring Wins Virtualization Review Reader’s Choice Award

Zenoss Cloud Monitoring Wins Virtualization Review Reader’s Choice Award


AUSTIN, TX–(Marketwired – Jan 28, 2014) – Zenoss Inc., the leading provider of unified IT monitoring and management solutions for physical, virtual, and cloud-based IT, today announced that Zenoss’ comprehensive cloud monitoring solution, Zenoss Service Dynamics, is an Editor’s Choice recipient in the 2014 Virtualization Review Reader’s Choice Awards.Virtualization Review is the first and only print publication solely devoted to IT virtualization and cloud technologies. The 2014 awards are chosen by the readers of Virtualization Reviewand presented to vendors in 16 categories ranging from Mobile Virtualization and Cloud Storage to Business Continuity and Virtualization Automation.

There was a lot of consolidation this year, but there were quite a few new companies who emerged from stealth mode and debuted new products and services, showing that there is still room for innovation in this technology segment,” said Virtualization Review Editor in Chief Michael Domingo. “VMware might have looked like the readers’ champion, but it has a lot to do with the solid work they’ve done with every product line. Still, some of the categories came close and we expect them to give VMware some true competition next year.”

E-mail invitations were sent to Virtualization Review readers in October 2013 to vote on more than 400 products. Responses were collected during a two-week period. A team of editors reviewed the results to ensure that they legitimately came from our readers. Vendors were excluded from the voting process nor were they, in anyway, allowed to solicit votes.

“We are delighted to be recognized by the editors of Virtualization Review for our Cloud Monitoring capabilities,” said Bill Karpovich, CEO & Co-Founder of Zenoss. “Virtualization Review has selected a group of high-caliber companies within the virtualization and cloud computing technology space. We are honored to be included among these innovative companies.”

Virtualization Review is the leading vendor ecosystem advocate, and the Reader’s Choice Awards and associated Buyer’s Guide provide a great resource for IT organizations working to optimize their virtual environments with advanced, innovative solutions.

The winners are highlighted in the December 2013/January 2014 issue. A downloadable PDF of the article is also available at:

About Virtualization Review
1105 Enterprise Computing Group’s Virtualization Review is the independent guide to the products, vendors, issues and technologies transforming IT through virtualization and cloud computing. Virtualization Review is the only print publication specifically targeting those IT executives, directors and administrators on the leading edge of this revolution. Visit the Web site for news, analysis, trends, product reviews, roadmaps and best practices on all aspects of IT virtualization including servers, storage, PCs, desktops, applications, management and more.

About Zenoss
Zenoss is a leading provider of unified IT monitoring and management software for physical, virtual, and cloud-based IT infrastructures. Over 35,000 organizations worldwide have deployed Zenoss to manage their networks, servers, virtual devices, storage, and cloud infrastructure, gaining visibility and control of their IT operations.

Cloud Infographic: Personal Data Security

Cloud Infographic: Personal Data Security

Recently, Dashlane released a report that analyzed the password policies of the top 100 e-commerce sites.

The results of this report are staggering. They demonstrate that the majority of the top e-commerce sites fail to comply with the recommended password security principles. In their infographic titled “The Illusion of Personal Data Security in E-commerce”, they provide groundbreaking information to support their stance.

The main findings of their report state that 55% of the top 100 e-commerce sites still accept weak passwords such as “123456” and “password”. Furthermore, 93% of the sites do not offer on-screen password assessments that would tell users the real-time strength level of their passwords. Half of the companies do not block entry after the users provide 10 consecutive incorrect login attempts. As a result, this opens the way for automated password cracking. Lastly, the report states that only 38% of the top e-commerce sites require passwords with at least 1 letter and 1 number.

To summarize the findings of the report, 64% of the top e-commerce sites have highly questionable passwords policies.


Infographic Source: Dashline

Improving Product Quality Through The Cloud

Improving Product Quality Through The Cloud

Maintaining product quality is an amiable goal to have. It is, however, easier said than done. It’s likely that if you do have to maintain documentable quality standards, you are working in a government regulated industry rife with rules, procedures, and regular audits. Because of this, you’ll find that in order to main quality standards, your desk will have a mountain of forms that needs to be checked and authorized, data sheets, policies, SOPs, etc. etc. that will need to be dealt with.


Good news: not only can the cloud ensure that product quality standards are met, it can help save countless man hours that were usually spent pouring over stacks of paper. All quality procedures can be consolidated and expedited into cloud-based quality management software (QMS). There is non-cloud-based QMS out there, but – as usual – the cloud is the better option.

Business Growth

Inevitably, businesses grow. If they do not, they go under. As businesses grow, paperwork increases, more employees need to be trained, and there are more products that need to meet quality standards. Through QMS, all of those issues are taken care of. Of course, as has been discussed countless times about business cloud software, a business’s scalability is nearly infinite since there are no limits to the cloud.

As for keeping up with the paperwork, QMS has document control, which keeps that paperwork from becoming a beast that you can’t tame. It basically creates a repository in the cloud for all documents to be viewed, updated, and authorized seamlessly. One of the problems with manually doing this is that you never know if the document you are currently looking at is up-to-date. With QMS, all documents are up-to-date.

Doing everything manually on paper is horribly inefficient. During an audit you don’t want to be handing out documents that have even the slightest chance of being out-of-date. Production could potentially be halted because of this issue. #notgoodforbusiness

Even if you rely on completely electronic documents and spreadsheets your documents have a chance of being out-of-date without the cloud. Signatures and approvals are essential for any regulated industry as well; with the cloud, documents can be authorized online instantly without any email chains, phone calls, or hassle.

Training Regulation

If your employees aren’t trained properly, your product’s quality will rapidly become subpar, guaranteed. Cloud QMS provides the tools and resources to ensure new employee training is consistent and complete. Tasks associated with training become automated, like automatic grading for online exams. In the document repository, you can store and view all your documents related to training and you can keep records in the cloud of every employee that has completed training.

Customer Management

When your business grows, your customer base also grows. There’s an unfortunate truth that goes along with this: as your customer base grows, so does your number of customer complaints. Every business is going to receive complaints no matter what; the important thing is handling the complaints appropriately. Cloud QMS allows you to track complaints to make sure that they are dealt with properly from the moment the complaint is filed to the moment it is resolved.

To mismanage customer complaints is to mismanage a huge source of revenue. It’s a fact: if you lose customers, you will lose revenue. Cloud-based QMS software ensures that every customer complaint is handled, so that customer retention is increased.

Don’t keep your business grounded: put in the clouds.

By Declan Peltier

21st Century Cybercrime – The Evolution Of Protecting Your Data

“21st Century Cybercrime – The Evolution of Protecting Your Data”


The relentless development of technology has facilitated an increase in cybercrime, affecting individuals and businesses in different ways and to differing degrees. Since the advent of the internet the protection of data has been of paramount importance, however, the development of various technologies has made the protection of data more and more difficult to ensure. In the UK alone, cybercrime was found to cost organisations on average £2.1million per year with an average of 41 cyber-attacks per week.

Back when the internet age was still young, cybercrime was hacker led, largely committed by individuals hoping to prove the existence of glitches in operating system. An example of such was Moonlight Maze when hackers targeted military information held by the Pentagon. Proving the glitch was an end in itself.

As technology has advanced, however, cybercrime has become the domain of organised gangs seeking financial gain from their crimes. The cybercrime network is today a legitimate and sophisticated business with technical innovators at the top.

Information Theft

Information theft is increasingly common, with gangs infiltrating computer systems in order to extract the personal data of users. One headline grabbing infiltration occurred in 2011 when marketing giant Epsilon had their email lists hacked; those lists comprised customers of large firms such as Citibank and JP Morgan. The criminals used these email addresses for phishing.

The development of third party cloud storage technology has assisted cyber criminals as large batches of data are now so often stored within one cloud. It is essential that companies separate out their data across multiple storage options. Experts have indeed highlighted that cloud data is especially prone to crime due to a lack of security measures. For personal cloud storage it is essential to protect your data by using two-step verification if it is available.

Smart Phones

The continued technological advancement of smart phones also poses an opportunity for cyber criminals. Criminals employ those techniques used on PCs alongside new smart phone specific approaches. In particular, social networking apps which hold a wealth of personal information which are often exploited by cyber criminals. The best protection against this both on smart phones and computers is to remove all personal details from your account and lock down your security settings. Worryingly, anyone can develop and retail an app, even criminals. Some users may ‘root’ or ‘jailbreak’ their smart phones. This is the ability to tamper with a phone’s operating system.

A recent study found that the industry most susceptible to cybercrime is the travel industry. This is largely down to a change in consumer behaviour, with more and more people booking their travel online. Social attitudes today mean that people are far more willing to input bank details online and do not recognise that their details are data easily accessible by criminals. There are simple ways in which consumers can protect themselves such as researching the holiday company to ensure it is reputable and pay for holidays using a credit card.

By Akash Valand

CloudTweaks Comics
Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Update: Timeline of the Massive DDoS DYN Attacks

Update: Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…


Sponsored Partners