Seven Hidden Truths About Personal Clouds

Seven Hidden Truths About Personal Clouds

Seven Hidden Truths About Personal Clouds 

Increasingly, people are discovering the joy of using personal clouds for a wide range of tasks, such as photo and video sharing, mobile backup, anytime music and project collaboration. Consequently as their popularity increases, people’s skepticism about worrisome aspects, such as privacy, security and reliability, is starting to ebb and growing desire and expectation for anytime access of personal content is trumping concerns.

This article highlights some key potential gotchas that personal cloud providers prefer users don’t know, but, being aware of these is essential as it helps adopters gain the most from personal clouds while avoiding potential pitfalls.

#1: The service is free (except when it isn’t). Every personal cloud service offers free sign up, but the catch is the ‘freemium’ model that relies on users upgrading to a paid service or mining user data for advertising. So even though a service appears free, there is no such thing as a free cloud.

#2: We don’t care about your data (we want your $). Although personal clouds tout their many benefits, they are really offered to sell people things such as more storage, devices, mobile data and content. Or they are offered to reduce switching because your data is in their cloud. This is a modern version of the strategy of giving the razor away for free in order to sell the blades i.e. the aforementioned stuff. Don’t be fooled, keep a close tab on your wallet.

#3: Trust us, your data is safe & secure (unless it isn’t). A personal cloud service accessible by the public has a good chance of being hacked, even with stringent safeguards. Law enforcement and intelligence agencies can legally search cloud information, depending on location and circumstance. You should still not put anything online that you don’t want Uncle Sam or other unknown relatives to access.

#4: We are 100% reliable (except when we’re not). There have been numerous outages and incidents affecting personal clouds, resulting in data loss, despite best efforts to avoid this. It is too costly to 100% guarantee that all data will be available forever. The chances may be slim that you will lose data sometime, but if you really want to be careful, maintain an off-cloud version of important stuff. It’s like dentists say, you don’t need to floss all your teeth, only the ones you want to keep.

#5: Get a lot of storage for cheap (that you probably won’t use). Most personal clouds offer a nominal amount of free storage and a lot more storage for a modest fee. How do they do this without going broke? Is it economies of scale, storing data on low cost media, compression or storing a single copy of commercial content such as movies and songs? The answer is yes , but it’s also a numbers game. Services are based on the premise that a high percentage of purchased storage is never used. When you run out of free storage and upgrade for more, it takes time to fill it up, which for most people, never occurs, for many reasons. When this happens, you are actually paying for free storage for other people.

#6: Having a bad cloud day? (Good luck getting help). How many personal cloud services offer phone support? OK, stop laughing. If zero popped into mind, that would be about right. Many services offer online support, which may be ok for techies. If you are non-technical, you should befriend a techie or there is safety in numbers i.e. stick to popular services because if millions use something, it must work.

#7: We’re not mining your data (but we might tomorrow). Popular personal cloud services are legit, with privacy policies that prevent data from being mined without consent. That’s fine until they change. They can publish a revised policy with fine print that may relax privacy restrictions. How many people read the fine print? About the same as the number of providers offering phone support. So while, you enjoy the convenience of your personal cloud, treat confidential data with utmost care, by keeping it off-cloud.

In sum, these seven hidden truths may cause you to pause before using personal clouds. That wasn’t the intent of this article; it was to make people aware, so they know how far they can rely on personal clouds. As a final word of advice, personal clouds are here to stay; it’s best to make them your ally, which you can do by being aware of potential gotchas.

By Hal Steger,

hal-imageHal Steger is Vice President of Worldwide Marketing and Business Development at Funambol. He has more than 20 years of marketing and business development experience. Steger co-founded and was VP Marketing of Rubric, where he positioned the company as the leader of the new category of Marketing Automation solutions. Rubric was acquired for $370M. Prior to Rubric, Hal held product management and product marketing positions at Oracle, Uniface/Compuware, and other high profile Silicon Valley companies. He holds an undergraduate degree from the University of Michigan with a double major in Computer Science and Economics, and an M.S.I.A. (MBA) degree from Carnegie-Mellon’s Tepper School of Business (formerly GSIA).

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…