Category Archives: Guest Writers

Is My Public Cloud Too Public? Part 5

Is My Public Cloud Too Public? Part 5 (Conclusion) Continued From Part 4 The ideal cloud equation Control + Visibility = Trust A cloud deployment that overcomes these myths is built on trust. Trust cannot be achieved without control and visibility across the cloud infrastructure, identities, and information. Control Availability: Ensure access to resources and recovery…

The Cloud Scares Me, Why Manufacturing Should Think And Work More Like Microsoft!!!

The Cloud Scares Me, Why Manufacturing Should Think and Work More Like Microsoft!!! Supply management and manufacturing is now about data, massive numbers of transactions created and shot through thousands of pathways around complex global information networks most wetware cannot, or would prefer not to imagine. Migraine city! Added to the ordinary business of running…

Controlling Complexity In Converged Infrastructure

Controlling Complexity In Converged Infrastructure Converged infrastructure is very similar to an Airbus 380 – it has a tremendous amount of capacity, but there is no way a human can control it without the help of a very sophisticated control system. And just as this type of control system is relatively new to aircraft, the…

Enterprise Cloud Curves Ahead, PaaS Carefully

Enterprise Cloud Curves Ahead, PaaS Carefully

Enterprise Cloud Curves Ahead, PaaS Carefully We’re seeing a lot of changes in the IT landscape. Oracle buying its way into the Cloud, AMD wants in on the server business, Dell is no longer a PC company, and some legacy players are learning about the Cloud market the hard way. Harris claims customers have a preference for on…

Leveraging a Virtualized Data Center to Improve Business Agility – Conclusion

Leveraging a Virtualized Data Center to Improve Business Agility – Conclusion

Leveraging a Virtualized Data Center to Improve Business Agility – Conclusion Read Part 1,    Part 2… Virtualized Data Center – Keeping it Simple Early designs of cloud computing focused on blades with an independent Storage Area Network (SAN) architecture. This blueprint consolidated the CPU and memory into dense blade server configurations connected via several high-speed…

Cloud Computing: Its Implications on Education

Cloud Computing: Its Implications on Education

Cloud Computing: Its Implications on Education Cloud computing is something which has become popular in almost all aspects of our lives. Indeed, it has even attracted the attention by the people in the academe, more specifically, in the field of education. But there is really no need to be surprised about it; in fact, some…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter