Category Archives: Cloud Computing

Atlantic.Net Introduces FreeBSD For Cloud VPS Hosting Plans

Atlantic.Net Introduces FreeBSD For Cloud VPS Hosting Plans

Atlantic.Net Introduces FreeBSD For Cloud VPS Hosting Plans

ORLANDO, FL – September 03, 2014Atlantic.Net, a SSD cloud VPS hosting solutions provider, today announced the availability of FreeBSD, a complete operating system used to power modern servers, desktops and embedded platforms to its Orlando, Dallas and Toronto data centers. The new operating system will be made available system wide as part of Atlantic.Net’s full line of operating systems, including Windows Server 2012R, and various flavors of Linux. With FreeBSD, users receive an OS that is committed to delivering the best stability, performance, and functionality.

atlantic.net

Atlantic.net is among the first of a new generation of hosting solutions providers to offer a reliable, yet regularly requested substitute for Linux. With this, startups and indie developers alike can now launch their idea for a fraction of the price typically charged – $0.005 per hour – with usage calculated on a per second basis. FreeBSD is a win-win situation that will promote entrepreneurial innovation and the wellbeing of the digital ecosystem.

FreeBSD by design is open source, and is optimized for freedom and flexibility. With this new addition, we can pass these benefits onto our customers to deliver a robust BSD-based OS,” said Marty Puranik, President and CEO of Atlantic.Net. “FreeBSD will help push startup innovation and assist entrepreneurs in launching the next great idea.”

FreeBSD provides users with access to a library of independent applications and the ZFS volume manager. Its advanced networking, security and storage features have made FreeBSD the platform of choice for many of the busiest websites and most pervasive embedded networking and storage devices. FreeBSD understands the relationship between various services and will run them simultaneously or independently, as it best fits the unique situation.

In collaboration with FreeBSD, Atlantic.Net also announced today the availability of a new resize feature that will allow customers to enlarge their server and capabilities. Unlike many hosting solutions providers, resize allows users to enlarge the disk/RAM/processor, rather than just the RAM or processor. FreeBSD and resize features are just two new services on the roadmap for Atlantic.Net as the company continues to build and grow its infrastructure over the next 12 months.

About Atlantic.Net

Atlantic.Net is a web hosting provider specializing in offering cloud server hosting, HIPAA compliant and hybrid hosting, private virtualization, and VPS hosting in the cloud. With a range of certifications and a SSAE 16 (SOC 1) TYPE II (Formerly SAS 70) audited data center that the company owns and operates, the company is also known for its reliability, as dictated by its 100 percent uptime service-level agreement (SLA). For more information, please visit www.atlantic.net.

Should The Cloud Be To Blame Or The App Invasion? – Part 1: The Fallout

Should The Cloud Be To Blame Or The App Invasion? – Part 1: The Fallout

Should The Cloud Be To Blame Or The App Invasion? – Part 1: The Fallout

Recent days have seen an avalanche of private images belonging to celebrities released on to various internet chat boards. The photos claim to show stars such as Jennifer Lawrence, Kate Upton and Victoria Justice in either nude or other compromising positions.

While sites such as Reddit, Imgur, and 4Chan have been working hard to remove the images, the damage has already been done. A lot of the blame has been laid at the door of cloud computing, with users flooding forums to express their disgust at how insecure online storage sites appeared to be, whilst also claiming they would no longer be using services such as iCloud, Google Drive, OneDrive or DropBox.

A look at Reddit’s pages reveal the scale of user dissatisfaction – but also some interesting and reasoned responses from more knowledgeable commentators. What’s the truth behind all the misunderstanding and misinformation? Is the cloud to blame or are apps and users at fault? Is the cloud more or less secure than keeping photos and other data on your own local hard drive?

fallout

The situation is complex. A recent report by the University of New Haven’s Cyber Forensics Research and Education Group says that security flaws, breaches of privacy and additional vulnerabilities in apps as diverse as instant chat services, online dating sites and social media facilities are now putting nearly one billion subscribers as risk of problems. The report has now been released as a series of videos.

Ibrahim Baggili, a Professor of Computer Science at UNH’s Tagliatela College of Engineering says “Anyone who has used or continues to use the tested applications are at risk of confidential breaches involving a variety of data, including their passwords in some instances”. It’s a comment that suggests that the droves of people criticising Apple, SnapChat and Facebook are not being subjective and that poorly designed apps are more responsible for the problems than the cloud. He adds “Although all of the data transmitted through these apps is supposed to go securely from just one person to another, we have found that private communications can be viewed by others because the data is not being encrypted and the original user has no clue”, again putting the emphasis on poor app design.

For their part, Apple said on Tuesday that hackers obtained the nude celebrity photos by stealing images from individual accounts rather than through a wide-ranging attack on the company’s iCloud and Find my iPhone services, adding that it had only released these results after conducting 40 hours of investigation. The company has said they will cooperate fully with a newly-launched FBI investigation into the leak, though urged all users to adopt stronger passwords and enable a two-step authentication feature to prevent data thefts.

The fact they have switched the onus back onto users is telling. They clearly believe that their servers are as secure as they could realistically expect to be and they cannot be held responsible for users mismanaging the technology they are provided with, failing to understand how or when their devices share data, or leaving their accounts vulnerable by having weak passwords or using unsecured networks to access accounts.

They undoubtedly have a point – users who are complaining that the cloud is wholly and solely responsible are missing the point. Data saved on a local hard drive is just as unsafe when saved on a local machine or USB drive if its owner is irresponsible. Viruses and malware can monitor your keystrokes, steal your personal data, obtain your passwords and pose as legitimate websites, while USB drives can be lost, stolen or corrupted without the owner realising until it is far too late. Ultimately any computer, phone or tablet that accesses the internet is at risk – and the large online storage providers do a much better job of encrypting and securing data than an average home user.

What’s your opinion? User error or company failures? Is the cloud blameless or architect of its own downfall? Let us know below.

Tomorrow we will publish Part Two, focussing on whether the cloud has any case to answer, what alternatives – if any – are available that could give you the same freedom as the cloud can, and what the future holds for online storage services.

By Daniel Price

Big Data Audio Streaming: How Spotify And Pandora Use Data To Better Serve Customers

Big Data Audio Streaming: How Spotify And Pandora Use Data To Better Serve Customers

Big Data Audio Streaming

Companies such as Pandora and Spotify are examples of audio streaming services that employ Big Data extensively. It’s nothing new in the entertainment world, as Big Data is shaping the future of the movie industry as well. Similarly to the world of cinema, music streaming services stand to gain with improved customer service and targeted advertising, all thanks to Big Data.

However, whereas the movie industry might cater the actual production to the viewers’ tastes, audio streaming services approach the matter much more humbly, merely trying to provide listeners with better, more accurate listening suggestions. It is evident that the music industry is becoming increasingly more informed about which artist will come out on top, but that’s a different story altogether.

Pandora

Some 70 million users use Pandora each month, and the service has over 200 million registered users overall. The way Pandora process and use data may very well be contributing to the growing popularity of the service. Pandora provide personalized radio stations (as opposed to on-demand music) to its listeners.

They are very open about their use of Big Data and, among other things, use the Music Genome Project’s music taxonomy based on 450 characteristics of the millions of songs professional musicologists have mapped. Pandora employ the data to create more accurate suggestions for their users.

On top of that, Pandora’s marketing efforts are based on the data the users provide upon registration, including the ZIP code, the gender and the email of the listener. Last but not least, all the listening data, including when, where and on what devices listeners use Pandora, is combined to provide an accurate representation of each and every customer’s tastes and listening habits.

Spotify

Where Pandora has the Music Genome Project, the data of which is human-generated, Spotify’s recent acquisition, The Echo Nest, maps the characteristics of songs and artists automatically via acoustic and textual analysis. The Echo Nest pairs “listening to the song” with gathering information from over 10 million music pages a day, matching artists with noun phrases and descriptions to analyze and catalog music from all over the world. A wonderful blog post by CTO Brian Whitman explains the science and the thinking behind The Echo Nest.

Whatever the technology used, the result is that Spotify can process more songs, like those of the 2,000-views-on-YouTube band your hipster cousin likes, whereas Pandora has to rely on available data or purchase more to expand. This might turn ugly for Pandora in the long run. Given that Spotify is constantly on the lookout for upcoming artists, whereas Pandora map what’s already there, Spotify seems to have an edge in discovering great, but not necessarily popular talent.

On other fronts, the two streaming services seem to be more similar. They gather geographical trends, listening habits & other data and use it to encourage subscriptions. Spotify openly share the challenges they’ve overcome with the help of software and Big Data–such determining how much cluster space Spotify needs in order not to burst.

It’s clear that Big Data is indispensable for music streaming services like the ones described. And why not? If data can be used to present listeners with more accurate results, it only makes sense that streaming services try to turn every last bit of information to their advantage.

By Lauris Veips

Mobile – Wireless Communications

Mobile – Wireless Communications

Enterprise Mobility for Dummies Accelerate and transform the enterprise with mobility…

Considerations for Embracing Wireless Management Employee behavior is once again driving major changes for IT departments – this time it’s..

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy Enterprise mobility is about more than just Bring Your Own Device (BYOD)…

Read the source article at cloudtweaks.tradepub.com

Mobile – Wireless Communications

Mobile – Wireless Communications

Enterprise Mobility for Dummies Accelerate and transform the enterprise with mobility…

Considerations for Embracing Wireless Management Employee behavior is once again driving major changes for IT departments – this time it’s..

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy Enterprise mobility is about more than just Bring Your Own Device (BYOD)…

Read the source article at cloudtweaks.tradepub.com

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

A recent study has been released by the Cyber Forensics Research and Education Group (cFREG) at the University of New Haven, which found that there are serious security and privacy problems in the Android platform. 968 million Android users may be at risk due to the flaws in various social media and communication apps. These flaws could allow an attacker to access users’ passwords, as well as private data stored on company servers. According to Ibrahim Baggili, director of the cFREG and assistant professor of computer science at UNH’s Tagliatela College of Engineering, an attacker could access all sorts of data: “Depending on the app, user locations, passwords, chat logs, images, video, audio and sketches can be viewed by people invading the user’s privacy.”

Ibrahim-Baggili

The problem is exacerbated by a lack of responsiveness on the part of app developers, which have not responded to Baggili’s warnings and have made no move to acknowledge or address the flaws revealed by the study. “Most companies did not even respond,” said Baggili. “This exacerbates the problem – and it shows that mobile developers are still not taking security seriously.”

Anyone who has used or continues to use the tested applications are at risk of confidential breeches involving a variety of data, including their passwords in some instances” says Baggili.

Baggili’s team is now creating videos that explain the problems, identify which apps may put users at risk, and provide steps for securing personal data. One video will be posted daily to YouTube from Monday, September 8 through Friday, September 12. The cFREG’s YouTube channel is http://www.youtube.com/unhcfreg

Although all of the data transmitted through these apps is supposed to go securely from just one person to another, we have found that private communications can be viewed by others because the data is not being encrypted and the original user has no clue.” Baggili said this is especially true when there is a “man-in-the-middle attack.”

Baggili said many people feel they have nothing to hide. Yet, strangers can easily tap into a variety of “private” data without informing the app user.

UNHcFREG was established in fall, 2013 as part of UNH’s Department of Electrical and Computer Engineering and Computer Science, to research digital forensics, security and privacy awareness and help reduce cybercrime. Last spring, UNHcFREG discovered vulnerabilities in WhatsApp, which has 500 million users and Viber, which has 300 million users.

By Gustav Steinhardt

CloudTweaks Comics
The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…