Category Archives: Uncategorized

Google Cloud Source Repository

Google Cloud Source Repository

Google hasn’t announced it yet, but the company earlier this year started offering free beta access to Cloud Source Repositories, a new service for storing and editing code on the ever-expanding Google Cloud Platform. It won’t be easy for Google to quickly steal business from source code repository hosting companies like GitHub and Atlassian (with Bitbucket).…

Tech Company Finds Stolen Government Log-ins All Over Web

Tech Company Finds Stolen Government Log-ins All Over Web

WASHINGTON (AP) — A CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web — available for hackers, spies and thieves. Recorded Future, a social media data mining firm backed by the CIA’s venture capital arm, says in a report that login credentials for nearly every federal agency have…

Leaders Of Tech Industry Join Docker In New Open Container Project

Leaders Of Tech Industry Join Docker In New Open Container Project

New Docker Open Container Project More than 20 tech industry organizations have joined forces with Docker in an exciting, new non-profit venture, The Open Container Project (OCP) that aims to unite the industry and establish common standards for software containers. To be run with the support and approval of the Linux Foundation,  the project will…

Docker And Rocket Ready For Liftoff – Software Containers

Docker And Rocket Ready For Liftoff – Software Containers

Software Containers Docker, CoreOS, Google, Microsoft and Amazon are now working on a new standard for software containers with the help of the Linux Foundation. Other members of this coalition include Apcera, Cisco, EMC, Fujitsu Limited, Goldman Sachs, HP, Huawei, IBM, Intel, Joyent, Mesosphere, Pivotal, Rancher Labs, Red Hat and VMware — that is, virtually everybody who…

Keeping Ahead Of Organized Online Crime

Keeping Ahead Of Organized Online Crime

Organized Online Crime LastPass, one of the top password managers available, released a statement last week that suspicious activity had been discovered and blocked on their network. It appears that no encrypted user data was stolen, but email addresses, password reminders, server per user salts, and authentication hashes were compromised. LastPass is now providing additional…

BVP Cloud Report: Top 10 Public Cloud Companies

BVP Cloud Report: Top 10 Public Cloud Companies

Top 10 Public Cloud Companies Byron Deeter of Bessemer Venture Partners was a cloud enthusiast before it gained global recognition. Presenting BVP’s State of the Cloud report, Deeter considers the tipping point of cloud acceptance and adoption to have been reached and observes that while many in the IT industry disagreed with the cloud trend…

IBM’s Bluemix Adopted By Capgemini’s Sogeti

IBM’s Bluemix Adopted By Capgemini’s Sogeti

IBM Bluemix Today, June 18, Capgemini’s Sogeti revealed that it is implementing IBM’s cloud PaaS Bluemix as its global development platform. Damion Heredia, IBM Vice President of Cloud Platform Services, told CloudTweaks, “We are very focused on growing our ecosystem of partners that help clients through the adoption of cloud. We are excited that Sogeti…

The Invasion Of Privacy And The NSA

The Invasion Of Privacy And The NSA

Invasion Of Privacy Recently, the US Justice Department has told a federal magistrate judge that two government agencies are investigating allegations of misconduct during the Thomas Drake – National Security Agency (NSA) leak investigation in 2010. They are the Office of Special Counsel, a federal agency that is responsible for investigating complaints by whistleblowers, and…

Equinix Partners With Aliyun To Provide New Cloud Service

Equinix Partners With Aliyun To Provide New Cloud Service

Equinix Partners With Aliyun US data center and global interconnection company, Equinix, Inc. and Chinese cloud computing business, Aliyun today signed an agreement that will enable Chinese and North American enterprises to do business between China and North America via the cloud. According to a statement released this morning, the agreement will enable Asian and…

Intel Strengthens IOT Position With $16.7 Billion Acquisition

Intel Strengthens IOT Position With $16.7 Billion Acquisition

Intel Strengthens IOT Position With Acquisition Enables New Classes of Products in High-Growth Data Center and Internet of Things Market Segments SANTA CLARA, Calif. & SAN JOSE, Calif.–(BUSINESS WIRE)— Intel Corporation (NASDAQ: INTC) and Altera Corporation (NASDAQ: ALTR) today announced a definitive agreement under which Intel would acquire Altera for $54 per share in an all-cash…

CloudTweaks Comics
Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The CloudTweaks Archive - Posted by
Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…