Dreaming of a Cloud Transition and Transformation Framework

Dreaming of a Cloud Transition and Transformation Framework

Cloud Transition and Transformation Framework Many years ago I was introduced to the concepts that comprise the visual architecture process. During the process of learning about the concepts and process of visual architecture, I adopted many of the concepts, ideas and tools to use in my own processes. In particular, there was a component that…

Category Archives: Host

Is My Public Cloud Too Public? Part 4

Is My Public Cloud Too Public? Part 4

Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level of control. To do that,…

Is The Federal Government Moving Fast Enough On Cloud Computing?

Is The Federal Government Moving Fast Enough On Cloud Computing?

Is The Federal Government Moving Fast Enough On Cloud Computing? At a time when the Federal Government is being congratulated for saving billions by moving to the cloud (See: Research Report: Feds Rejoice the Cloud Way, with $5 bn In Annual Savings), the title of this article may seem somewhat incongruous. Before I delve into…

Web Hosting Moves To The Cloud With Managed Cloud Hosting

Web Hosting Moves To The Cloud With Managed Cloud Hosting In years past, companies looking to host a high-traffic website have had one of three main options: Shared Web hosting services Dedicated Web hosting services Hosting on local IT infrastructure Shared Web hosting services have been most popular with small businesses, but they suffer from…

Recent

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising