The Cloud, Week In Review: November 30th, 2012

The Cloud, Week In Review: November 30th, 2012

This week, Google and Amazon have brought forth new goodies for consumers that are going to make our lives even easier than before. And the privacy of the data we are going to use through their services may receive a new level of privacy security if a bill proposed by Patrick Leahy will be passed.

Google Drive Attachments Raised to 10 GB

Google has risen this week the maximum attachment size to 10 GB of data. It is a natural upgrade seeing how users have been uploading huge files to their Google Drive accounts and sharing them with everyone they needed. Now Google has simply created a seamless integration of its 2 services, Google Drive and Gmail and users can send directly through their email. In actuality the Google Drive account is the one being used and this is both an advantage and a disadvantage. It is an advantage because the files are stored on a data center and are thus very easy to download. But it is also a disadvantage because it makes for a very lovely trap: when you will attempt to upload anything above the 5 GB storage that comes for free from Google Drive you will have to buy the extra space, thus receiving the Google upgraded service for $2.49/month.

Amazon Launches a Data Warehouse Service RedShift

For most individual users it is almost impossible to imagine data gathered on such a monumental scale that it simply cannot be analyzed. And yet there are companies that need to buy the services of a data warehouse to report and analyze their data. However, this service used to be so expensive that the small and medium companies could not afford it and were forced to through away almost 90% of their data. But the new Redshift service that is integrated in the Amazon Web Services has been lunched in a scalable model that allows companies to choose exactly how much they are going to spend. What’s even more tempting is that even when using the maximum petabyte Redshift cluster users will pay less than $100 per year.

Google Avoids Webmasters Tools Disaster

Google is constantly trying to improve the level of service they provide their users so it is a statistically inevitable that they would do a blunder from time to time. This week they reactivated several obsolete Webmasters Tools user accounts. By doing this they have given former employees access to sensitive data of companies they were no longer working with. The issue was solved in time but it has put a rather unfavorable highlight on the integrating services they are providing. Having access to one service means users will automatically gain access to any number of other services like Google Docs, Analytics and even AdSense.

New Privacy Bill to Be Brought Up

Senate Judiciary Committee Chairman Patrick Leahyhas brought up a bill that will increase the level of privacy internet users currently have. According to the current law state and federal authorities may access any email that is older than 6 months. The new legislature argues that electronic communications are as private as any personal letter and should enjoy the same level of privacy. Even so a federal judge’s subpoena can allow law enforcers to access any email they want as long as they can show a reasonable suspicion of crime. So, if passed, the new law may raise security standards to a new level but not so high as to make our private lives truly private.

Predictive Software May Be the Way of the Future

Jeff Hawkins, one of the most famous lecturers in neuroscience, has co-founded a big data company called Numenta. However the extraordinary thing about this company is that it does not look the trillions of data that have been gathered by companies for years. Instead it uses Hawkins theory on how the brain works to work on stream of real-time information from sensors. The system called Grok is still in a limited release form but it is already delivering results that surpass traditional benchmarks like revenue, machine servicing and optimal purchasing mixes.

By Luchi Gabriel Manescu

About Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…