Category Archives: How to

How To Secure Your Cloud Hosting? Part 1

Practically Speaking About Cloud Computing: How to secure your cloud hosting? Part 1 So having completed the migration of your application or site to the cloud, say to AWS or RS, be prepared to get surprised by the initial hacker attack attempts on your site! Recently, we had the experience of handling two projects, one…

Cloud Computing vs Utility Computing vs Grid Computing: Sorting The Differences

Cloud Computing vs Utility Computing vs Grid Computing: Sorting The Differences The Pacific Ocean is a water body, but not all water bodies are Pacific Oceans. This may be oversimplifying the situation but you do get the drift. Grid computing and utility computing, though sharing several attributes with cloud computing, are merely subsets of the…

3 Quick Ways To Reduce Your Amazon EC2 Cloud Charges

3 Quick Ways To Reduce Your Amazon EC2 Cloud Charges

Reducing Your Amazon EC2 Cloud Charges The Biggest difference between standard web hosting and cloud-based hosting can be seen when you get the monthly bill. A standard web host, like GoDaddy, will charge you a flat monthly fee and give you access to a single, fixed server. Whereas a cloud-based host, like Amazon EC2 will…

Hosting a WordPress Site In The Cloud

White Paper Of The Week Hosting a WordPress Site In The Cloud For millions of bloggers worldwide, WordPress is the way they express their viewpoints, publish news and expand their blogosphere presence. To see how prolific and popular the free, open-source blogging platform is, one need only look at some of its prestigious blogs including…

Red Hat Live Event: Implementing for IaaS Tools, Components, & How to Put Them Together

Free Registration Cloud Best Practices: Implementing for IaaS Tools, Components, & How to Put Them Together Date: January 26, 2011 Time: 02:00 pm (UTC+1) Dr. Malcolm Herbert — Director, Strategy & Solutions, Red Hat Lee Denison — Senior Architect, Red Hat In this session, Malcolm Herbert and Lee Denison, senior architect at Red Hat, will…

Cloud 101- How To Install And Configure Your First Private Cloud?

Quick and simple Cloud configuration with Ubuntu The Fastest Cloud Ubuntu claims that version 10.10 is now one of the fastest routes to making your own private cloud. But once you have decided to go for it, how long will it take you to install and configure your first cloud? Download and Prepare for Ubuntu…

Emails from Cloud Server – Part I

Practically Speaking About Cloud Computing: Introduction: Recently we had a practical experience of migrating one public website to cloud hosting. The site was with a leading hosting service provider and migrated to a leading cloud service provider. One of the issues that we faced and sorted out is sending email from cloud. Of course for…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter