Category Archives: Amazon

Cloud Computing Vendors

Cloud Computing and Google Docs

Why Cloud Computing? Imagine the absence of a power grid throughout the nation, necessitating the presence of a generator in every home for producing electricity. Seems inefficient, doesn’t it? Well, if so be the case, why do we have our computers filled with software we use intermittently? Wouldn’t it be meaningful to use software the same…

Yes, the cloud even has some security benefits…

Distributed Denial of Service (DDOS) Protection Security is still cited as a main reason by your large, stodgy corporations for staying clear of cloud computing. And while the cloud does have its security challenges, there is one key security benefit that cloud computing offers — Distributed Denial of Service (DDOS) protection. After all, you can…

Nimbula Director – Highlights of the Beta Version

Nimbula Director – Highlights of the Beta Version

Public Beta announced for Nimbula Director When it comes to cloud management and service system Nimbula is a well-recognized name in the field. While most of the IT world is snoozing off to the upcoming holiday season, Nimbula has released its Nimbula Director Beta version in the true spirit of Christmas! The software is an…

WikiLeaks and the Cloud DDOS Strategy

WikiLeaks and the Cloud DDOS Strategy I found the recent WikiLeaks saga to be fascinating. Never in history has the individual had so much power to collate and distribution sensitive information, with the ability to embarrass governments around the world and put them into damage control. But for a cloud computing vendor like myself, this story…

Recent Developments in Private Clouds – Nimbula

Recent Developments in Private Clouds. While most of the initial interest in cloud computing focused on companies that offered their cloud services for businesses to use as they need, there has recently been a shift towards so-called private clouds. These private clouds leverage an existing data centre infrastructure to provide scalable infrastructure throughout the business,…

Revolutionizing mobile applications: Plugging into the Cloud

Revolutionizing mobile applications: Plugging into the Cloud It is often forgotten that not everyone owns a smart phone. As a result, not every mobile device is entitled to processing powers similar to those of the Snap Dragon processor. Majority of the people still use feature phones with low-end functionality and features. With limited battery life,…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter