Category Archives: Computing

Homeland Security Subcommittee on Cybersecurity Conducts Hearing on Cloud Computing

Sometime back I had written an article on how US government officials had expressed reservations on adopting cloud computing (See: Does Moving to the Cloud work for the US Federal Government?). However, as per the testimonies from several Federal officials before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, it would seem that, in…

NetApp World-Record Benchmark Result Shows 35% Performance Increase with Less Than Half the Infrastructure

NetApp Enables Companies for Future Growth and Innovation while Maintaining IT Efficiency SUNNYVALE, Calif.—November 2, 2011 —NetApp (NASDAQ: NTAP) today announced six high-performing SPECsfs2008 NFS benchmark results, including a world record, further validating that NetApp customers don’t need to compromise efficiency and flexibility to achieve high performance. The speed of business has changed, and companies…

When the Cloud Goes Dark…

The demand for cloud computing is an undeniable, unavoidable trend in business IT. Business managers are hearing all about the benefits of the extensible, flexible and scalable features that the cloud offers. This puts pressure on the IT team to pull together some sort of cloud solution for the organization. However, without a clear set…

How Companies Are Adopting and Adapting to Cloud Computing: KPMG

How Companies Are Adopting and Adapting to Cloud Computing There have been several studies attesting to the growth of cloud computing, and some of them have been covered in earlier articles (See: Where Is Cloud Computing Going? Up, Up And Away! and How BIG Is the Cloud Computing Market?). Now, KPMG has come out with study…

Webinar: New Demands for Security and Compliance in Online Collaboration

Trends in Online Collaboration: When Security, Compliance and Productivity Collide Featured Analyst Firm: Gartner Speakers: Jeffrey Man Paul Hands Type: Audio (53 minutes) External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and…

Whitepaper: Fair to Partly Cloudy

Whitepaper: Fair to Partly Cloudy

Fair to Partly Cloudy While the cloud is often referred to in singular fashion, the reality is that enterprises looking to embrace cloud computing can choose from some very different approaches, each providing specific benefits—and challenges. This paper will describe IaaS, PaaS, and SaaS, revealing the unique characteristics of these cloud service delivery models. In addition, it…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter