What Scientists Want From Their Next Cloud Supercomputing Instance

What Scientists Want From Their Next Cloud Supercomputing Instance Recently, a report was made by the Magellan project regarding the possibilities and viable use of Cloud Computing for scientific purposes. Like most scientific reports, this contained a lot of Yes, No and Maybe but the bottom-line at the end of the report was that the DOE (US…

The Lighter Side Of The Cloud – Cloud Therapy

The Lighter Side Of The Cloud – Cloud Therapy

By David Fletcher Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates.

TOSCA Hybrid Cloud Standards Committee: Google, IBM, Cisco…

TOSCA and Friends setting up Hybrid Cloud Standards In a move that reminds me a lot about the movie quote “When there’s no way out, you find a deeper way in“, TOSCA, IBM, EMC and Cisco have indicated their support for Hybrid Cloud portability standards and specifications. Following on the heels of TOSCA or Topology…

Cloud Computing In Financial Service Organizations

Cloud Computing In Financial Service Organizations While technology seems to be the cost and time efficiency driver in many industries, cloud computing is the emerging solution for the financial service industry, especially capital markets. In order for their assets to be used optimally by multiple consumers, financial organizations require ad-hoc access to significant computing resources,…

The Social Cloud: Facebook IPO – Is This MySpace 2.0?

The Social Cloud: Facebook IPO –  Is This MySpace 2.0? History repeating: 2000 Bubble, Myspace, 2012 Facebook IPO, NBT (Next Big Thing…)  Investors are expected to sink $5 billion into the Facebook IPO. Wow. Well, from a pure spreadsheet perspective it makes some sense. If you take the 800 million Facebook users multiplied by a value…

Battle of the Document Cloud Apps: Google Docs, Apple iWorks…Which One Truly Reigns?

Battle of the Document Cloud Apps: Google Docs, Apple iWorks…Which One Truly Reigns?

Battle of the Document Cloud Apps: Google Docs, Apple iWorks… Throughout the 1990s, 2000s, and today, Microsoft Word has served as the final word in applications designed to maximize the efficiency and output of both businesses and individual computer users regarding their documents. Attempts to unseat its status as the number-one program of its kind…

3 Essentials For IoE Security — And A Proven Approach To Them

3 Essentials For IoE Security — And A Proven Approach To Them

3 Essentials For IoE Security  The Internet of Things (also called the Internet of Everything) is quickly becoming the new normal – with the expectation that anything and everything will be interconnected in our global village and united by the cloud. With an estimated 50 billion connected devices, processes and systems in the IoE by…

Internet of Things
5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereignty regulations SUNNYVALE, Calif., July 30, 2015 – Blue Coat Systems, Inc., a market leader in enterprise security, today announced it has acquired Perspecsys, Inc., a leader in enterprise cloud data protection…

Global Leaders In Malware And Malicious C2 Traffic

Global Leaders In Malware And Malicious C2 Traffic

Malware and Malicious C2 Traffic Nearly half of all malware threats in the past three months originated in the US, while both the US and China are global leaders when it comes to malicious command and control (C2) traffic. This was revealed in the latest quarterly report from NTT Group security company Solutionary released this…

Domain Shadowing – Wild West Of Internet Cyber Attacks

Domain Shadowing – Wild West Of Internet Cyber Attacks

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from Bromium Labs, security analysts, that study key trends in the cyber attack landscape and specialize…

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment  China’s Alibaba Group Holding Ltd (BABA.N) said on Wednesday it would invest $1 billion into its Aliyun cloud computing arm to challenge Amazon.com Inc’s (AMZN.O) lucrative Web Services division, opening a global front in the battle between the two e-commerce giants. With the global cloud computing market estimated by…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising