CloudTweaks Tech News and Resources Home

The Path to the Cloud: A Look at Different Approaches to Cloud Migration

Different Approaches to Cloud Migration The public cloud has gained considerable momentum this past decade. Concerns about cost and security have largely been put to rest as AWS, Azure and newcomers like Google have surged ...
Read More
/

25 Cloud Data Performance Monitoring Companies

Performance Monitoring Companies We have updated our list to include 10 additional performance monitoring companies in 2017.  These services will accompany you in monitoring and safeguarding your data, critical applications and websites in real-time. This ...
Read More
/

The Lighter Side Of The Cloud – Mixed Messages

Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated. By Christian Mirra ...
Read More
/

Cloud Spectator Report: North America IaaS Providers Benchmark

Cloud Spectator Report Cloud Spectator, a cloud benchmarking and consulting agency focused on cloud Infrastructure-as-a-Service (IaaS) performance, has today released the 2017 Top 10 Cloud IaaS Providers Benchmark for North America. Striving for transparency in ...
Read More
/

Top Cloud IPOs To Watch For In 2017

Top cloud IPOs A number of large cloud companies are set for IPO in 2017, with one of them – Mulesoft – suggesting it can go public as early as March with an offering worth ...
Read More
/

The Deep and Dark Web

The Dark Web The Deep and Dark Web, hidden in the depths of the internet, sounds like something out of a nail-biting thriller, but is, in fact, a very real part of our world. Just ...
Read More
/
Cloud RCS Messaging By Amir Sarhangi Whether we’re receiving a boarding pass for a flight or chatting with friends and family, SMS (better known as text messaging) is a universal way for us to stay connected. But despite its ubiquity, SMS hasn’t evolved to take advantage of all the features that smartphones enable today. We believe it’s important to innovate ...
Read More
Cisco Network Services Orchestrator BARCELONA, MOBILE WORLD CONGRESS – February 23, 2017 – As service providers around the globe explore paths to cloud, IoT and 5G, Cisco is focused on building solutions that offer programmability, automation and virtualization to simplify operations and lower their total cost of ownership (TCO). With more than 73 million mobile customers in Japan, NTT DOCOMO, ...
Read More
OVH New US Data Center Global IaaS Leader Continues North American Deployment Plan, Bringing Innovative Green Data Centers to the US MONTREAL – February 23, 2017 – OVH, a global leader in cloud Infrastructure-as-a-Service (IaaS), today announced acquisition of a new data center facility in the US. Located in Hillsboro, Oregon, this facility joins Vint Hill, Virginia as the second ...
Read More
Users empowered with a refined, mobile-first, fully-integrated communications platform accessible from any browser, device or desktop SANTA CLARA, CA--(Marketwired - February 22, 2017) - Avaya today announced the general availability of the industry's first real unified communications (UC) solution, Avaya Equinox. Avaya Equinox delivers simple, mobile-first communications on the devices, and embedded into the applications and browsers, that employees "live ...
Read More
ENGLEWOOD CLIFFS, N.J., Feb. 21, 2017 /PRNewswire/ -- LG Electronics' webOS 3.5 Security Manager is the first smart TV platform certified for its effective cybersecurity capabilities by UL, one of the world's foremost experts in safety, security and sustainability. The webOS 3.5 Security Manager was tested for malware susceptibility and vulnerabilities, software weaknesses and security controls that help protect users' ...
Read More

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term "moonshot" comes from one of America's greatest achievements, the moon landing. If the scientific community can achieve ...
Read More
Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of new driver experiences, including a ...
Read More
Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: "Your files have been captured and encrypted. To release them, you must pay." Ransomware has grown recently to become one of the primary threats to companies, governments and institutions worldwide ...
Read More
Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It's something that comes to mind for many IT managers and engineers tasked with the job of evolving their network environments while ...
Read More
A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site's host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed to have been driven through ...
Read More
Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As essential as these responses are, companies need additional layers of audit and defence further up the hierarchy if they are ...
Read More

POPULAR

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for ...
Read More

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their ...
Read More

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it ...
Read More

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
Read More

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started ...
Read More

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security ...
Read More

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
Read More

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the "Insider Threat"  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have ...
Read More

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated ...
Read More

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, ...
Read More

Noteworthy Resources