Category Archives: Security

HP Named a Leader in Magic Quadrant for Midrange and High-end Modular Disk Arrays

HP Named a Leader in Magic Quadrant for Midrange and High-end Modular Disk Arrays PALO ALTO, Calif., Dec. 5, 2011 –  HP today announced it has been named a “leader” in the latest Gartner “Magic Quadrant for Midrange and High-End Modular Disk Arrays.” An independent provider of IT and research advice, Gartner’s latest Magic Quadrant…

Cloud Valley: China’s Cloud Computing Initiative And The Man Behind It

The whole world knows about Silicon Valley in California; however, very few are aware of Cloud Valley in China. While calling the 7,000-square-meter technology campus in a Beijing suburb as a “valley” may be an exaggeration, there’s no denying the immense possibilities of this place. As anyone familiar with the history of technological clusters will…

Calculating the ROI on Cloud: The Cost of Cloud – Part 3

Continued from Part 2 The Cost of Cloud Clearly, there is great return potential associated with Cloud-based model. However, transition to Cloud-based model from an on-premise model is not without cost. Direct Ongoing Cloud Costs While the cost savings associated with a cloud-based model over an on-premises model are clearly substantial, there are two areas…

The Cloud and Babies: Parents and Umbrellas

The Cloud and Babies: Parents and Umbrellas I was a member of the first generation of humanity to grow up with computers. We surfed the web as babes, toddlers turning HTML into child’s play. The infants of the 2010s will be the first to mature alongside technology’s own robust, promising infant: cloud computing. What to…

Calculating the ROI on Cloud – Part 2

Calculating the ROI on Cloud – Part 2 Continued From Part 1 Productivity Enhancement Productivity enhancements are more subjective in nature than direct cost savings; they are dependent on the type of business and the current organizational set up. Application Development The notion of Platform as a Service (PaaS) is to extract the common set…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter