Cloud News On The Cloud: December 21st, 2012

Cloud News On The Cloud: December 21st, 2012

This week the Cloud got a C+ in terms of real usability by small businesses from Forbes but a big A+ for security, Santa is moving his PR division to the Cloud and Red Hat takes one more step towards fulfilling their clients’ needs about the Cloud.

Forbes’ Myths about Cloud Security

Forbes has published this week a list of myths that have been keeping people weary about Cloud security. The articles touches on things like whether the Cloud presents new technology challenges since it is a new system, just how much data sharing is really done in the Cloud and it he presence of the Cloud has really increased that traffic. There are even some very interesting myths that the articles debunks about what the law has to say about data on the Cloud, whether data shared on an offshore server is still as safe as data on local servers or if it is even protected by the same laws. The overall impression is one of confidence since the security on the Cloud is something that has grown as the Internet developed.

Santa Has Moved to the Cloud Too

A 15 year old Santa site is getting more and more traction. Allan Kerr created emailSanta.com 15 years ago because a Postal Service strike was preventing his nephews and nieces to send an email to Santa. The site is currently getting 10 e-mails per second around Christmas time and is bound to get a face lift and a host of apps for Android and iPhone. The interesting thing is that the site is just one more proof of how the Cloud is slowly but surely insinuating its presence in every walk of life.

ManageIQ on Red Hat’s Acquisition List

Red Hat will buy cloud management expert company ManageIQ. The world’s most beloved Linux platform is thus reacting to the response they received from the industry and customers about their open hybrid cloud. The open source software concept has been slowly growing but it is revolution created by the Cloud that has really taken it from being a complex system only accessible to a narrow range of specialists to being the norm for software development. And the fact that Red Hat is only reacting to their own customer’s needs proves once again that the Cloud is getting more and more acceptance from the business world.

Yahoo Is Updating It’s iOS Browser

In a world where Google and Firefox are fighting for supremacy Yahoo is slowly building a reputation as a reliable browser. Firefox became one of the dominant browsers for PCs because it established itself as the best browser and so more and more “family experts” were won over. So there is no reason why the iPhone and, perhaps, Android could not end up being dominated by Yahoo’s Axis rather than by anyone else.

The Cloud Gets a C+ for Potential from Small Business

A Forbes article this week sums up the general feeling about the Cloud by comparing to a brilliant student in class who is just not putting in the effort to get the high grades it deserves. Among the complains about Cloud services is that, while they are the cheapest solution for small and medium sized businesses, they are also unreliable since 3G and 4G services do not have full coverage across the US. The biggest concerns, though, are centered around the fact that cheap cloud services have poor customer support so when accidents happen recuperating your precious data can be a very big hassle.

By Luchi Gabriel Manescu

About Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

View All Articles

Sorry, comments are closed for this post.

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…