Category Archives: White Papers

Four Free Information Assets For The Mid-Size Company CIO

Four Free Information Assets for the Mid-Size Company CIO “Knowledge is of no value unless you put it into practice.”                                            – Anton Chekov (1860-1904), Russian playwright and master of the modern short story. At CloudTweaks, we know that many of our readers are looking for ways to better leverage cloud computing at their workplaces.…

4 Whitepapers CIOs Must Read!

4 Whitepapers CIOs Must Read!

4 Whitepapers CIOs Must Read “An investment in knowledge pays the best interest.” – Benjamin Franklin (1706-1790), author, politician and scientist. At CloudTweaks, we are ardent believers of collecting, and disseminating, knowledge about cloud computing. That is why we have engaged writers from different industries and geographies to offer their unique perspectives on the subject. From info…

Mobile Network And Data Center Spending Driving DDos Appliance Growth

Mobile Network And Data Center Spending Driving DDos Appliance Growth

Whitepaper: Mobile Network And Data Center Spending Driving DDos Appliance Growth Distributed denial-of-service (DDoS) prevention appliances are the first line of defense for most service providers and large enterprises looking to protect themselves from brute-force attacks on network or resource availability. With the unprecedented number, size, and coverage of DDoS attacks over the last 24…

7 Essentials Of Hybrid Cloud Backup

7 Essentials Of Hybrid Cloud Backup

7 Essentials of Hybrid Cloud Backup Understanding the Cloud Options A hybrid cloud solution combines private (internal/on-premise) and public (external) cloud deployment models. With a typical private cloud solution, one would build, develop and manage their own cloud infrastructure. The most common deployments of private cloud solutions are in enterprise-level environments. Businesses that have the…

Whitepaper: Big Security For Big Data

Whitepaper: Big Security For Big Data

Whitepaper: Big Security For Big Data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data. It is because information is so pervasive that businesses want to capture this data and analyze it for…

Whitepaper: The Journey To Private Cloud

Whitepaper: The Journey To Private Cloud

The Journey to Private Cloud Based on a recent Enterprise Management Associates® (EMA™) research study, the main reasons for adopting cloud computing, mentioned by 52%-62% of respondents, were as follows: a) Agility: Accelerating service creation and provisioning b) Performance and resiliency: Improving the performance and resiliency of business services c) Resource optimization: Reducing operational and…

Information Collection: Business Builds Big Data

Information Collection: Business Builds Big Data In the beginning there was the electronic computer. It was a tool for defending freedom, useful to use in breaking enemy communications codes and crunching equations for the Manhattan Project. Eventually it became the plaything of hobbyists and garage experimenters. In their garages, they eventually cobbled together machines that…

Red Hat Cloud Services And Training

Red Hat Cloud Services And Training

Red Hat Cloud Services And Training Red Hat Services offers a complete spectrum of cloud services solutions built to accelerate your journey to cloud computing. Our portfolio of consulting and training services provides you with the expertise to help you quickly ramp up Red Hat® CloudForms deployments while establishing the foundation for intelligent, open hybrid…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Cloud Security In The Workplace

Cloud Security In The Workplace

Workplace Cloud Security Our workplaces are changing and much of it for the better. Increased flexibility – pushed by cloud services – is behind many of the changes. Home working, increased collaboration – it’s all good, and it’s all delivering significant business benefits. We know that. That’s so 2013. But fewer than 10% of businesses…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter