Newsletter Subscribe

Bringing you thought leadership, news, infographics, resources and our own brand of comics each week to your inbox...

CloudTweaks Tech News and Resources Home

The Power of Recurrent Neural Networks

Recurrent Neural Networks A recurrent neural network (RNN) is a type of neural network where connections between units form a directed cycle. They were first created in the 1980s, but have gained new popularity as AI and machine learning ...
Read More
/

Numeraire Cryptocurrency Goes Live

Numeraire cryptocurrency Numerai, a hedge fund started in late 2015 by mathematician Richard Craib. The new cryptocurrency comprises digital tokens that allow crowdsourcing of literary anything. Cryptocurrencies are essentially internet based assets used to finance ...
Read More
/

The Path to the Cloud: A Look at Different Approaches to Cloud Migration

Different Approaches to Cloud Migration The public cloud has gained considerable momentum this past decade. Concerns about cost and security have largely been put to rest as AWS, Azure and newcomers like Google have surged ...
Read More
/

25 Cloud Data Performance Monitoring Companies

Performance Monitoring Companies We have updated our list to include 10 additional performance monitoring companies in 2017.  These services will accompany you in monitoring and safeguarding your data, critical applications and websites in real-time. This ...
Read More
/

The Lighter Side Of The Cloud – Mixed Messages

Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated. By Christian Mirra ...
Read More
/

Cloud Spectator Report: North America IaaS Providers Benchmark

Cloud Spectator Report Cloud Spectator, a cloud benchmarking and consulting agency focused on cloud Infrastructure-as-a-Service (IaaS) performance, has today released the 2017 Top 10 Cloud IaaS Providers Benchmark for North America. Striving for transparency in ...
Read More
/
Dell Accelerates IoT Adoption Dell, the broadest Internet of Things (IoT) infrastructure solutions provider, introduces the new Dell Edge Gateway 3000 Series that offers customers flexibility, connectivity and real-time intelligence from harsh environments and small spaces. The 3000 Series includes three unique models targeted specifically for use cases and embedded solutions in the industrial automation, energy, transportation, and digital signage ...
Read More
Ceph Storage in Rackspace Private Cloud One of the most important assets in any business is its data. Without data, operations are stalled and business is at risk for everything from financial loss to potential loss of life. Yet amazingly, data is often entirely forgotten when building a private cloud. Dependable shared storage is critical when building private clouds. It ...
Read More
Cloud RCS Messaging By Amir Sarhangi Whether we’re receiving a boarding pass for a flight or chatting with friends and family, SMS (better known as text messaging) is a universal way for us to stay connected. But despite its ubiquity, SMS hasn’t evolved to take advantage of all the features that smartphones enable today. We believe it’s important to innovate ...
Read More
Cisco Network Services Orchestrator BARCELONA, MOBILE WORLD CONGRESS – February 23, 2017 – As service providers around the globe explore paths to cloud, IoT and 5G, Cisco is focused on building solutions that offer programmability, automation and virtualization to simplify operations and lower their total cost of ownership (TCO). With more than 73 million mobile customers in Japan, NTT DOCOMO, ...
Read More
OVH New US Data Center Global IaaS Leader Continues North American Deployment Plan, Bringing Innovative Green Data Centers to the US MONTREAL – February 23, 2017 – OVH, a global leader in cloud Infrastructure-as-a-Service (IaaS), today announced acquisition of a new data center facility in the US. Located in Hillsboro, Oregon, this facility joins Vint Hill, Virginia as the second ...
Read More

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience - it's a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you ...
Read More
Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of new driver experiences, including a ...
Read More
A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site's host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed to have been driven through ...
Read More
Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It's something that comes to mind for many IT managers and engineers tasked with the job of evolving their network environments while ...
Read More
Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As essential as these responses are, companies need additional layers of audit and defence further up the hierarchy if they are ...
Read More
Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: "Your files have been captured and encrypted. To release them, you must pay." Ransomware has grown recently to become one of the primary threats to companies, governments and institutions worldwide ...
Read More

POPULAR

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Read More

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It's no secret that organizations are embracing the cloud and all the benefits that it entails ...
Read More

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started ...
Read More

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not ...
Read More

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Read More

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
Read More

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were ...
Read More

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer ...
Read More

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not ...
Read More

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Read More

Noteworthy Resources