Tag Archives: monitoring

I Don’t Know What I Don’t Know

I Don’t Know What I Don’t Know

I Don’t Know What I Don’t Know What happens when the IT person doesn’t know where the source of a system failure is? What happens when that same IT person has to go and explain to an executive that the source of the problem cannot be found quickly, due to an organically-evolved legacy system or…

An Antidote To Overprovisioning

An Antidote To Overprovisioning

There are many situations in this world – both the virtual world of computing, and the real world, where preparedness means having more than you need. Stocking up on food, medicines, or printer paper and toner makes it easy to get things done in a timely fashion rather than having to run back out to…

Where Does The Buck Stop In The Cloud?

Where Does The Buck Stop In The Cloud?

Where Does The Buck Stop In The Cloud? Who is responsible for outages caused by IaaS failures. Is the relationship between traditional data centers and customers better for small and medium businesses? Consider these two scenarios. One You are hosting your busy website on a cluster of managed dedicated servers located in a trusted data center.…

Making Business Resiliency Part Of Business As Usual

Making Business Resiliency Part Of Business As Usual

Making Business Resiliency Part of Business As Usual Business continuity and disaster recovery (BCDR) have become non-negotiable requirements for virtually every IT department. Business resiliency is an umbrella concept that must address everything from basic business continuity to high-level risk management, security, crisis management, and more. With today’s IT architectures supporting servers, networks, and applications,…

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index Based on daily monitoring of security for more than 4,000 clients, IBM has determined that DDoS attacks are on the rise. The average large company must filter through 1,400 cyber attacks weekly according to the IBM Cyber Security Intelligence Index. But many organizations do not have the on-site…


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising