Category Archives: How to

Cloud Computing – The Business Case for Project Portfolio Management

The Business Case for Project Portfolio Management The expression “better, faster, cheaper” is commonly associated with supply chain initiatives, where companies have developed an edge by getting products to market faster and more efficiently than their competitors. However, in the new world of cloud computing, more companies are looking at their IT department as a…

To the Cloud? – Developing a Cloud Migration Strategy

To the Cloud? – Developing a Cloud Migration Strategy Following the Microsoft Worldwide Partner Conference last year, it became pretty clear that cloud computing had risen to dominance. This was going to be the next big thing, and following Microsoft’s lead, the concept of “cloud” rose to the top of everyone’s mind. So it was…

What Does the US Military Want from Cloud Computing?

What Does the US Military Want from Cloud Computing? Polytetraflouroethylene or PTFE was an exotic substance accidentally invented by DuPont chemist Dr. Roy Plunkett in 1938. In spite of its less-than-ordinary origins, PTFE was found to have some extraordinary properties – high heat resistance, high corrosion resistance and the lowest coefficient of friction of any…

Disaster Recovery and the Cloud: New solutions for offsite data protection

Disaster Recovery and the Cloud: New solutions for offsite data protection The typical backup model adopted by most companies is fairly simple: once a week, the business’s data servers are copied to magnetic tape. Incremental changes are backed up as the week progresses. In general, a full week’s tape set is regularly sent offsite. Some…

Amazon Web Services Deployment The Right Way

Amazon Web Services Deployment The Right Way In general, when considering all things “cloud” it’s healthy to retain a skeptical mind set and avoid succumbing to hype. But the fallout from the recent Amazon Web Services (AWS) outage is actually a very positive sign for Cloud Computing. Sure some sites got taken completely down, including…

Featured WhitePaper: Cloud Computing – 90 Seconds To Revolutionize The Way You Manage IT

Cloud Computing – 90 seconds to revolutionize the way you manage IT Cloud computing has enabled IT to deliver scalable, high-performance, on-demand, always-on business services. These same powerful operating models, and somewhat early adopter technologies, bring both tremendous value and serious consideration to the organization. If the proper time is taken to understand this mix…

Which Cloud Computing Quality Works For You?

Which Cloud Computing Quality Works For You? As any successful entrepreneur worth his millions will tell you, “The customer is always right.” However, in a technology paradigm as new as cloud computing, the customer does not always know enough to be right. In such a situation, the customer has to go ahead to what is…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter