Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

Cloud Computing Round-Up Week 19th-26th of Jan, 2014

data-storage

Here’s a round-up of the 3 top cloud stories making the headlines this week.

Microsoft To Store Foreign Users’ Data Overseas – As the NSA gets grabby with users’ data, when those users happen to be using US based computing services, Microsoft have made a controversial move to begin storing their data overseas, keeping their information out of the reach of the long arm of the American law. Brad Smith, Microsoft’s general counsel, has told the Financial Times that “People should have the ability … to make an informed choice of where their data resides.” The decision, does not, however, keep American users’ data safe, as their information will still lawfully be within the NSA’s jurisdiction and some users may still choose to move their info away from the Redwood, Calif. computer company.

(Image Source: Shutterstock)

Verizon Reveal Figures of NSA’s Data Requests – Thanks to Edward Snowden’s now infamous work to shed light on the NSA’s data dealings, we now know that more than a handful of companies have been subject to data trading with the American group, as a result of the NSA’s counter-terrorism operations. However, despite being required to in many cases, the reputations of many of these companies has taken a hit, with Verizon being one of them. As a result, they’ve revealed that they have received over 300,000 requests (approximately) to aid US law enforcement, including subpoenas, warrants and even NSLs (National Security Letters) from the FBI. While some have said that there needs to be more transparency, it is also important to note that some information (specifically Foreign Intelligence Surveillance Act orders, or FISAs) is required to be kept from the public by Verizon due to the law.

Yahoo Search Gets Automatic Encryption – Also in a move to save face with the tech-using public, Yahoo have now chosen to encrypt the searches that their users conduct via their popular Yahoo search engine. The move by Yahoo comes after it was revealed that there are more than a few ways that hackers can and have made their way into Yahoo’s servers, even leading the company to offer monetary rewards to users who could identify flaws and issues in their security in an effort to discover security problems that Yahoo themselves may have missed. It has also been suggested that this is another way to keep the NSA out of their users’ data. However, the search encryption does not seem to be available in the UK or Japan just yet, with only US users’ searches being encrypted.

By Jennifer Livingstone

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…