Tag Archives: Infrastructure

Dreamhost Joins Elite Roster of Nicira’s OpenStack Customers

Cloud Provider Joins Elite Roster of Nicira’s OpenStack Customers Palo Alto, Calif., April 9, 2012 – Nicira, the network virtualization company, today announced that Southern California-based cloud provider DreamHost will deploy its Network Virtualization Platform (NVP).  DreamHost joins global leaders NTT, Rackspace and others using Nicira’s software to reduce costs and accelerate service delivery in…

7 Salient Trends and Directions in Cloud Computing

7 Salient Trends and Directions in Cloud Computing Cloud computing is a rapidly evolving field and as more enterprises join the platform, new trends are emerging. In this post, I will cover the major trends in cloud computing for the immediate future (2012-14). Cloud storage goes mainstream in consumer segment. While cloud based storage services…

Automated Versus Manual Tools For Cloud Migration

Automated Versus Manual Tools For Cloud Migration Back in 2010 most specialists thought of cloud computing mostly as “capacity on demand” with the benefit of not having to deal with infrastructure and scalability issues. Today this is just one of the countless benefits that cloud computing offers. However, the data migration to the cloud, a…

Cloud Computing: Types Of Cloud And Their Relevance – Part 2

Cloud Computing: Types Of Cloud And Their Relevance – Part 2

Types of Cloud and their relevance Continued From Part 1… There are three relevant types of clouds: Private (internal or vendor-hosted), Public (external), and Hybrid (mixed). Each cloud infrastructure has unique characteristics that can meet business objectives. Enterprise Private Cloud A private cloud enables enterprises to implement cloud computing solution at either their own site…

Dell Announces Intent to Acquire Wyse Technology

Dell Announces Intent to Acquire Wyse Technology Red Rock, Texas: Apr 02, 2012  Dell today announced it has signed a definitive agreement to acquire Wyse Technology, the global leader in cloud client computing, to significantly extend its desktop virtualization offerings. The addition of Wyse will expand Dell’s desktop virtualization capabilities and provide new solutions and services opportunities for the…

Fundamental Elements Of Cloud Computing Security

Fundamental Elements Of Cloud Computing Security Cloud security or cloud computing security evolved from information security and includes a wide set of controls, technologies, and policies used to protect the associated infrastructure, applications, and data of cloud computing. It is not related to the cloud-based security software services or commonly referred to as security-as-a-service. Security…

Why Cloud Computing Is Better Than Grid Computing

Why Cloud Computing Is Better Than Grid Computing Several web developers, especially the new ones, have continuously misunderstand grid computing and cloud computing as one and the same. Both concepts, when compared to other solutions, are relatively new concepts in computing. Grid computing is a component of cloud computing to work perfectly, along with thin…

Featured Writers

Top Viral Impact

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Sponsored Posts We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more exposure for…