Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

Cloud Computing Round-Up Week 19th-26th of Jan, 2014

data-storage

Here’s a round-up of the 3 top cloud stories making the headlines this week.

Microsoft To Store Foreign Users’ Data Overseas – As the NSA gets grabby with users’ data, when those users happen to be using US based computing services, Microsoft have made a controversial move to begin storing their data overseas, keeping their information out of the reach of the long arm of the American law. Brad Smith, Microsoft’s general counsel, has told the Financial Times that “People should have the ability … to make an informed choice of where their data resides.” The decision, does not, however, keep American users’ data safe, as their information will still lawfully be within the NSA’s jurisdiction and some users may still choose to move their info away from the Redwood, Calif. computer company.

(Image Source: Shutterstock)

Verizon Reveal Figures of NSA’s Data Requests – Thanks to Edward Snowden’s now infamous work to shed light on the NSA’s data dealings, we now know that more than a handful of companies have been subject to data trading with the American group, as a result of the NSA’s counter-terrorism operations. However, despite being required to in many cases, the reputations of many of these companies has taken a hit, with Verizon being one of them. As a result, they’ve revealed that they have received over 300,000 requests (approximately) to aid US law enforcement, including subpoenas, warrants and even NSLs (National Security Letters) from the FBI. While some have said that there needs to be more transparency, it is also important to note that some information (specifically Foreign Intelligence Surveillance Act orders, or FISAs) is required to be kept from the public by Verizon due to the law.

Yahoo Search Gets Automatic Encryption – Also in a move to save face with the tech-using public, Yahoo have now chosen to encrypt the searches that their users conduct via their popular Yahoo search engine. The move by Yahoo comes after it was revealed that there are more than a few ways that hackers can and have made their way into Yahoo’s servers, even leading the company to offer monetary rewards to users who could identify flaws and issues in their security in an effort to discover security problems that Yahoo themselves may have missed. It has also been suggested that this is another way to keep the NSA out of their users’ data. However, the search encryption does not seem to be available in the UK or Japan just yet, with only US users’ searches being encrypted.

By Jennifer Livingstone

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…