Category Archives: Security

The Impact Of Google’s ISO 27001 On Business

The Impact Of Google’s ISO 27001 On Business Google has recently acquired an ISO 27001 security certification. This certification is provided by an independent body to companies that pass various security requirements. For a company to obtain the ISO 27001 certification, it must agree to be examined by an internationally recognized, independent body for information…

Cloud Resource Orchestration

Cloud Resource Orchestration  I. Introduction The cloud computing paradigm is steadily shifting the course of computing away from physical hardware with locally managed software platforms toward virtualized, cloud-based services. This new paradigm, brought about by cloud computing, provides users with instant access to virtually unlimited computing resources and, at the same time, allows providers to deploy…

No More Cloud Delusions!

No More Cloud Delusions! I am sick and tired of the myriad cloud urban myths that run amok both in and outside of the IT community. One by one, I’d like to dismantle three of my biggest pet-peeve cloud delusions. Let’s begin with one of the more attractive and “boho-chic” cloud tall tales that never…

Can The Gov’t Avoid Gaffes In The Cloud?

Can the Gov’t Avoid Gaffes in the Cloud? It’s no surprise that programs that shape our government on all levels of jurisdiction are rapidly and eagerly enlisting into the cloud computing fray. Finally, several of cloud’s noteworthy assets — scalable and streamlined storage and infrastructure, and services purchasable a la carte, for example — have…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor