Category Archives: How to

What Does the US Military Want from Cloud Computing?

What Does the US Military Want from Cloud Computing? Polytetraflouroethylene or PTFE was an exotic substance accidentally invented by DuPont chemist Dr. Roy Plunkett in 1938. In spite of its less-than-ordinary origins, PTFE was found to have some extraordinary properties – high heat resistance, high corrosion resistance and the lowest coefficient of friction of any…

Disaster Recovery and the Cloud: New solutions for offsite data protection

Disaster Recovery and the Cloud: New solutions for offsite data protection The typical backup model adopted by most companies is fairly simple: once a week, the business’s data servers are copied to magnetic tape. Incremental changes are backed up as the week progresses. In general, a full week’s tape set is regularly sent offsite. Some…

Amazon Web Services Deployment The Right Way

Amazon Web Services Deployment The Right Way In general, when considering all things “cloud” it’s healthy to retain a skeptical mind set and avoid succumbing to hype. But the fallout from the recent Amazon Web Services (AWS) outage is actually a very positive sign for Cloud Computing. Sure some sites got taken completely down, including…

Featured WhitePaper: Cloud Computing – 90 Seconds To Revolutionize The Way You Manage IT

Cloud Computing – 90 seconds to revolutionize the way you manage IT Cloud computing has enabled IT to deliver scalable, high-performance, on-demand, always-on business services. These same powerful operating models, and somewhat early adopter technologies, bring both tremendous value and serious consideration to the organization. If the proper time is taken to understand this mix…

Which Cloud Computing Quality Works For You?

Which Cloud Computing Quality Works For You? As any successful entrepreneur worth his millions will tell you, “The customer is always right.” However, in a technology paradigm as new as cloud computing, the customer does not always know enough to be right. In such a situation, the customer has to go ahead to what is…

How To Secure Your Cloud Hosting? Part 1

Practically Speaking About Cloud Computing: How to secure your cloud hosting? Part 1 So having completed the migration of your application or site to the cloud, say to AWS or RS, be prepared to get surprised by the initial hacker attack attempts on your site! Recently, we had the experience of handling two projects, one…

Contributors

Featured Writers

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Cloud and regulation in financial services

Cloud and regulation in financial services

Cloud Regulation When talking about cloud and regulation in financial services, it is important to approach it with a clear understanding of the typical policies that your national regulator will require you to adhere to. Let’s start with outsourcing policy. Cloud mode provides us with a way of outsourcing data centre environments, applications, and services…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter