The Lighter Side Of The Cloud – Adopted
The Lighter Side Of The Cloud – The Meaning Of Cloud
The Lighter Side Of The Cloud – The Knock-Off
Russia May End Imminent Cloud’s ‘Ides of March’

Russia May End Imminent Cloud’s ‘Ides of March’

Russia May End Imminent Cloud’s ‘Ides of March’ as it Improves on International Scoreboard

Russia has a cloud and big data conference this October, in the central-European nation of Austria, just marches away from Latvia. The latter is the destination at which most Moscow cloud companies have set base for their cloud servers, to eschew persecution at home. Indeed, Latvia has been the telltale sign of where the legendary Ides of March, which signaled the end of a king in Shakespearian lore, would have come from, were it not for the encouraging news of an improvement in Russia. The large country that stretches from Eastern Europe to the far lands of Asia currently ranks highly, on the global cloud scoreboard.

Forbes.com recently ranked the country position 14, ten slots down from the United States, signaling a great improvement. This means that despite the close watch at home of what cloud computing companies are doing, Russia is also relaxing its grip on the various resources that power the operations of server-based technology.

The improvement is due to a consciousness about IP. The report stated that Russia was instrumental in ratifying Internet Protocol concessions, thus expanding the horizon of identity for would-be users of the cloud in the country. It is worth to find the Russia’s story quite progressive, in contrast to half-a-dozen other continental nations that had negative growth, in the same report.

scorecard-cloud

The latest news, however, May 12, points out to a continuing erosion of major firms from the country that are working from within but whose servers are in, mainly, Latvia. A single data warehouse in the latter nation says that it has five hundred projects, from Russia and its scion, Ukraine.

The above development is easy to confirm. Over the weekend of May 11-12, the web went awash with how Russian law enforcement personnel visited a cloud center and demanded to have a chat with the staff, before confiscating equipment. This, however, does not prevent work from continuing for most of the nation’s cloud resources, including servers, software, and apps, all have infrastructural base in neighboring nations.

The saving hand of cloud technology in the last remaining bastion of the former USSR, where policy matters may steal a march on technology, is manifest in the ease of forfeiting capital-intensive machinery. Cloud requires none of the common bulky hardware to enable one operate from a typical work base. What matters is a data center, which can be external, an email service, file-sharing applications and storage-scaling equipment, all of which need not be in-house. At least this is how most Russian kingpins of the cloud do in order to keep their data secure.

Russia Cloud Conference

In spite of these policy distractions, the country’s tech community is still on the fast lane of technological commitment. The best epiphany is the Russia Conference, for big data and cloud computing that will occur in Central Europe on the seventh day of October of the year. The major focus will be on the issue of security, advantages of the cloud, as well as, limitations of computing, and the entrepreneurial appropriation via the cloud, among others. The conference, interestingly, also has the helping hand of the authorities since the national and local administrations will be in attendance, besides Chief Technology Officers.

By John Omwamba

(Image Source: http://cloudscorecard.bsa.org/)

John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

Latest posts by John (see all)

Sorry, comments are closed for this post.

Popular

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford…

The Cloud In 2015: Eight Trends To Look For

The Cloud In 2015: Eight Trends To Look For

The Cloud In 2015 For organizations of all sizes, in 2014 the cloud emerged as a critical part of the default consideration set when implementing any new application – in large part due to the cloud’s proven ability to handle data storage and processing demands in an elastic manner, improved verifiable standards around data security and…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Recent

The Importance Of Cloud Security For Wearable Technology

The Importance Of Cloud Security For Wearable Technology

Wearable Technology Starts With Cloud Security The integration of wearable technology into our society is all but inevitable. Today, major players in the wearable tech field include Google, Fitbit, Boston Scientific and Apple. As users continue to demand ever increasing availability and functionality from their devices, so do security concerns for wearable tech. The future…

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines for Maximum Upselling and Cross-Selling in a World Gone Cloud With the growth of the subscription economy, companies can no longer assume that a sale means that the deal is closed. Companies need to prove their worth every minute of every hour, every hour of every day and so on. A big…

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security Over the past decade, drones, also known as UAVs (unmanned aerial vehicles), have become a fact of life. Beginning as underpublicized but extremely effective items in the U.S. military’s arsenal, drones have since come into wide use by government agencies for everything from geographic surveys to law…

Contact Us

Sending
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising