Category Archives: Storage

Practical Applications of Cloud Hosting

When compared to the traditional shared or dedicated server environment, the emergence of cloud hosting has presented a viable alternative for growing businesses looking for cost effective IT solutions. Understanding the Cloud By its nature, cloud computing is largely unencumbered by the deficiencies that are often associated with traditional servers. The cloud revolves around a…

Amcom Provides Hosted Cloud Services to Australian University

Amcom Provides Hosted Cloud Services to Australian University Amcom Telecommunications has signed a $9 million contract to provide hosted Cloud services to The University of Western Australia (UWA).  The initial contract is for 3 years and has options for extending. Under the agreement, Amcom will deliver its hosted Cloud solution to UWA that will benefit…

Mainframes in the Age of Cloud Computing

Mainframes in the Age of Cloud Computing Mainframes may be 1960s technology, but they still manage a huge portion of the world’s data. This is mainly because of two reasons – i) continuous improvement of the technology and ii) the huge costs involved in changing them en masse. However, in today’s world of cloud computing…

Min.us Cloud File Sharing Service Acquires Domain Name Minus.com for $115,000

Cloud File Sharing Service Min.us has acquired the domain name ‘Minus.com’ $115,000 Minus is a cloud-based, out of the box, straight-forward file sharing platform which allows the users to upload and share photos, music, videos, PDFs and more… The site is focused on making everything simple and naturally convenient for the users. The site looks, sounds, interacts…

Changing Business with Cloud Computing

Changing Business with Cloud Computing In today’s business climate, instant adaptation and scalability is critical. Planning and preparing for increased web traffic, spikes in the use of computer resources, disaster recovery, and day-to-day business operations is key. Loss of business due to system overload or breakdown leads not only to loss of revenue and customer…

Security as a Service: Business Decision Factors

Security as a Service: Business Decision Factors This paper reviews the business value of IT security, illustrates the business case for SaaS over “do it yourself” premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow. In a companion paper, we show how…

Enterprise Cloud Computing and The Services Led Organization

Enterprise Cloud Computing and The Services Led Organization Charge! That’s the rallying cry not of your IT on the way to the Cloud, but your business units as they use their corporate American Express (AMEX) cards to buy Cloud services. The Cloud, like the Internet before it, it seems deceptively easy. Back then, it was…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter