Category Archives: Computing

BitNami Open Source Cloud Hosting Introduced

BitNami Cloud Hosting Introduced BitNami Cloud Hosting is a new service that will be launched on February 8 after being in private beta for several months, the company announced. At present, the system offers support for Amazon EC2, allowing customers to deploy and manage open source and other applications in the cloud. BitNami.org offers free,…

How To Secure Your Cloud Hosting? Part 3

Practically Speaking About Cloud Computing: How To Secure Your Cloud Hosting? Part III Authentication (Contd.,) For signing in to the cloud account AWS goes with mail id and password as the usual credentials. Rackspace goes with user id and password. AWS introduced Multi Factor Authentication long time back. Multi Factor Authentication involves an authentication device.…

CloudTweaks Forms Strategic Alliance With CIO Dialog

CloudTweaks Forms Strategic Alliance With CIO Dialog

CloudTweaks, Media Partner For The March 28th, 29th Event The CIO Dialog on March 28th and 29th, 2011, at the Hotel Palomar in Dallas, TX,  is the exclusive international networking event for IT executives from the public and private sector to network, share best practice and discuss strategies to ensure IT continues to deliver real…

Cloud Computing Risks (And How to Deal With Them)

Cloud Computing Risks (And How to Deal With Them) “Fear of failure must never be a reason not to try something.” – Frederick Smith, founder, chairman, president, and CEO of FedEx. There is absolutely no doubt that cloud computing is beneficial to companies looking to revolutionize their IT infrastructures. However, there is no denying that…

Runa Capital Sets Aside USD 50 Million to Back Cloud Computing and IT Companies

Runa Capital Sets Aside USD 50 Million to Back Cloud Computing and IT Companies Moscow-based venture capital company Runa Capital decided to increase its funding program to USD 50 million aimed at backing technology and Cloud Computing companies in Russia and abroad. The goal of the venture capital fund is to invest in early-stage Russian…

The Top Ten Considerations For Cloud Computing

The Top Ten Considerations For Cloud Computing

The Top Ten Considerations for Cloud Computing Business and IT decision makers are increasingly confused by the rising number and type of cloud computing solutions. Everyone it would seem is now promising to save you time and money with this or that kind of web-based service for everything from email and enterprise applications to storage…

How To Secure Your Cloud Hosting? Part 2

Practically Speaking About Cloud Computing Before getting into the nitty gritty of what we did in our projects for hardening the cloud servers hosted by us, we would like to emphasize the following, so that these can be firmly embedded in the mind set of readers. First, the way cloud computing is attracting attention is…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter