2011’s Top Turkeys: This Year’s Blunders With Less Good Sense, More Gobble

2011’s Top Turkeys: This Year’s Blunders With Less Good Sense, More Gobble

As you candy your yams and stuff your stomach with stuffing, here are some thoughts on cloud computing news this year we weren’t entirely thankful for.

Apple

Major software company Apple essentially helped to pave the way for the ABCs of cloud computing. Yet if everybody plays the fool sometimes, Apple’s failure to “green” up their portion of the cloud is downright silly. GreenPeace’sHow Dirty Is Your Data?” evaluated the data headquarters of the world’s top 10 companies this April, and revealed Apple’s environmental shortcomings. It relies more energy produced from coal burning than any other such organization — a whopping 54.5 percent of its power. Yet Apple remains ignorant to this alarmingly bad publicity. Plans continue for its $1-billion iData plant in North Carolina, the fuel for which will consist more than 60% of coal. Normally we’d condemn the company with a lump of coal for Christmas, but in this case…

Gmail

Arguably, GMail has done more to galvanize the cloud community than any other product. As one of the most ubiquitous web offerings, even retirees in Boca Raton are not immune to its expansive reach. Nevertheless, some circles have chastised the program for boasting a few too many frills. IT in Context reminded us of GMail’s ornate faults: its speed leaves something to be desired, and the cascading e-mail feature annoys more than it pleases. Granted, GMail did recently launch a new and improved interface, just in time for the holiday season. We’d still liken the program’s engineers to Henry Ford. Both have created incredibly useful tools for society. But Lamborghini-level craftsmanship will take some time to reach.

The Cloud’s Security

How easily could we instigate a conversation on the cloud security polemic? We could direct you to the Los Angeles Times, who recently blasted SaaS and the like on the issue. Search for the topic online, and presto: more than 59 million results arrive, ready for you to peruse. This article’s scope prevents us from wading through it all. Yet suffice it to say that the cloud still demands a significant overhaul in terms of its protection for consumers and businesses. InfoSecurity points out that nearly one quarter of companies fear that the cloud doesn’t deserve their trust. Some counsel to keep you safe amid the cloud this holiday? Always back up your files. Heighten your own data center’s security to supermax levels. And perform a recon job on the exact location of your data in the wild blue yonder.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…