Author Archives: Pete Knight

Cloud Computing And Thin Clients

Cloud Computing and Thin Clients When I began looking at thin client applications, I was pretty darned sure that the weight loss industry had come up with yet another way to separate overweight people from their money. Introducing Thin Technology Thin clients have been around for as long as there have been computers tied together…

Information Collection: Business Builds Big Data

Information Collection: Business Builds Big Data In the beginning there was the electronic computer. It was a tool for defending freedom, useful to use in breaking enemy communications codes and crunching equations for the Manhattan Project. Eventually it became the plaything of hobbyists and garage experimenters. In their garages, they eventually cobbled together machines that…

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker Docker started as just a software container on top of a Linux operating system which seemed like a simple optimization for a fat hypervisor. Its disruptive force however comes from the fact that it does force us to rethink many of the layers of the cloud stack. Starting from the way we…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Wearable Tech – Will It Ever Be Fashionable?

Wearable Tech – Will It Ever Be Fashionable?

Wearable Tech – Will It Ever Be Fashionable? Wearable tech is taking over the world, and in that sense, it’s already fashionable. As we noted last week, the sector is expected to grow from $14 billion in 2014 to $70+ billion in 2024. But what about ‘high-fashion’? The catwalks and runways of London, Paris, and Milan? Can…

Predictions For 2015: Social Media, IoT, NFV and Data Center Growth

Predictions For 2015: Social Media, IoT, NFV and Data Center Growth

Predictions For 2015 Social Media Use and IoT Spurs SDN, NFV and Data Center Growth Social media continues to drive Internet growth worldwide with the market leader, Facebook, surpassing one billion registered accounts last year. The social media giant’s growth was fueled in large part by growing mobile user access in the Asia-Pacific region, with…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising