Russia May End Imminent Cloud’s ‘Ides of March’

Russia May End Imminent Cloud’s ‘Ides of March’

Russia May End Imminent Cloud’s ‘Ides of March’ as it Improves on International Scoreboard

Russia has a cloud and big data conference this October, in the central-European nation of Austria, just marches away from Latvia. The latter is the destination at which most Moscow cloud companies have set base for their cloud servers, to eschew persecution at home. Indeed, Latvia has been the telltale sign of where the legendary Ides of March, which signaled the end of a king in Shakespearian lore, would have come from, were it not for the encouraging news of an improvement in Russia. The large country that stretches from Eastern Europe to the far lands of Asia currently ranks highly, on the global cloud scoreboard.

Forbes.com recently ranked the country position 14, ten slots down from the United States, signaling a great improvement. This means that despite the close watch at home of what cloud computing companies are doing, Russia is also relaxing its grip on the various resources that power the operations of server-based technology.

The improvement is due to a consciousness about IP. The report stated that Russia was instrumental in ratifying Internet Protocol concessions, thus expanding the horizon of identity for would-be users of the cloud in the country. It is worth to find the Russia’s story quite progressive, in contrast to half-a-dozen other continental nations that had negative growth, in the same report.

scorecard-cloud

The latest news, however, May 12, points out to a continuing erosion of major firms from the country that are working from within but whose servers are in, mainly, Latvia. A single data warehouse in the latter nation says that it has five hundred projects, from Russia and its scion, Ukraine.

The above development is easy to confirm. Over the weekend of May 11-12, the web went awash with how Russian law enforcement personnel visited a cloud center and demanded to have a chat with the staff, before confiscating equipment. This, however, does not prevent work from continuing for most of the nation’s cloud resources, including servers, software, and apps, all have infrastructural base in neighboring nations.

The saving hand of cloud technology in the last remaining bastion of the former USSR, where policy matters may steal a march on technology, is manifest in the ease of forfeiting capital-intensive machinery. Cloud requires none of the common bulky hardware to enable one operate from a typical work base. What matters is a data center, which can be external, an email service, file-sharing applications and storage-scaling equipment, all of which need not be in-house. At least this is how most Russian kingpins of the cloud do in order to keep their data secure.

Russia Cloud Conference

In spite of these policy distractions, the country’s tech community is still on the fast lane of technological commitment. The best epiphany is the Russia Conference, for big data and cloud computing that will occur in Central Europe on the seventh day of October of the year. The major focus will be on the issue of security, advantages of the cloud, as well as, limitations of computing, and the entrepreneurial appropriation via the cloud, among others. The conference, interestingly, also has the helping hand of the authorities since the national and local administrations will be in attendance, besides Chief Technology Officers.

By John Omwamba

(Image Source: http://cloudscorecard.bsa.org/)

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…