Articles about Cloud Computing

Choose a cloud vendor that meets your needs

cloud_800_contentfullwidth

There is little doubt that cloud will play an increasingly important role as more and more organizations adopt cloud based strategies to underpin their IT infrastructures. Indeed, cloud hosting offers a wide variety of advantages to companies with the expertise to take advantage of it. Applications can be rolled out faster, resources can be rented rather than purchased and infrastructure can be right-sized to support monthly and seasonal peaks.

However, a global survey commissioned by iland in April 2014 and undertaken by analyst firm Enterprise Management Associates (EMA), highlighted that there are also plenty of challenges when moving to a new cloud based infrastructure. In fact, 91 percent of those surveyed experienced at least one unexpected challenge when moving to the cloud with pricing, performance, scalability and location all topping the list of issues.

Continue reading

Bring your own security approach protects Azure cloud apps

cloud security

Securing applications in the cloud can prove a difficult challenge for businesses. Any solution needs to balance protection against accessibility and not harm performance.

Java security specialist Waratek has used the Microsoft TechEd Europe conference in Barcelona to announce an innovative bring your own security (BYOS) approach to the problem called Waratek Locker.

Continue reading

Twitter: Your Twitpic photos and videos are safe... for the time being

Twitter: Your Twitpic photos and videos are safe... for the time being

After flip-flopping between closing, then not closing, and finally closing, Twitpic has now shut up shop. But that's not quite the end of the story. There had been rumors flying round that Twitter was going to buy the image and video hosting service, but that ultimately amounted to nothing. The latest twist in the story is that Twitpic and Twitter have come to an arrangement that means content that has already been uploaded is safe. For now, at least.

In a statement on the Twitpic blog, founder Noah Everett explains that a deal has been struck with Twitter. What this amounts to is Twitpic handing over the domain and content archive to Twitter. This will keep "the photos and links alive for the time being".

Continue reading

How to remove devices from your Dropbox account

Dropbox

Dropbox is not especially consumer focused. However, it is still very popular in the cloud market for individuals. The good thing about this combination is that security insights needed for the business aspect of its model seep into the consumer product.

For example, it has much better security settings than Google Drive or OneDrive, the other two popular cloud services in the consumer space. Only Dropbox allows you to view, and remove connected devices.

Continue reading

Surface generated almost $1 billion revenue for Microsoft last quarter

Surface generated almost $1 billion revenue for Microsoft last quarter

Anyone who was under the impression that Surface was a failure for Microsoft need look no further than the latest earnings release for proof that they're wrong. In the quarter ending September 30, Microsoft pulled in $23.20 billion in revenue, and $908 million of this came from the Surface division.

All told, FY15 Q1 represents record first quarter revenue for Microsoft, and it can be at least partly attributed to the influence of Satya Nadella, as well as the restructuring surrounding Nokia Devices and Services. There was a strong performance in the Devices and Consumer divisions, with revenue increasing 47% to $10.96 billion, while commercial revenue rose 10% to $12.28 billion.

Continue reading

IBM and Microsoft team up to offer greater hybrid cloud choice

handshake hands shaking world cloud

One of the problems that enterprises often see in implementing cloud computing is that they risk getting tied into a single supplier for software and platform.

This is leading to more interest in 'hybrid cloud' solutions which allow the mixing and matching of features from different suppliers. Today industry giants IBM and Microsoft announce that they're working together to provide their respective enterprise software on Microsoft Azure and IBM Cloud.

Continue reading

Making direct interconnection of networks a Snap

network connect laptop pc wireless wifi

As businesses increasingly turn to the cloud to store their data the weak link in the chain remains the use of the public internet to transfer information.

To overcome these concerns enterprises are looking for secure and scalable ways to directly connect data centers across the globe. Now IIX (International Internet Exchange) has acquired a platform that fully automates the buying and provisioning of network connections in under five minutes, replacing a manual process that can take as long as 30 days.

Continue reading

Google takes Firebase under its wing in latest cloud acquisition

Google takes Firebase under its wing in last cloud acquisition

Firebase, a company helping developers to produce apps and services that store and sync data in realtime, is the latest Google acquisition. With a user base of 110,000 developers three-year-old Firebase announced that it is joining Google and plans to continue the work it already does, but pointing out it will be possible to "do much more, much faster" with Google's resources and backing.

With Firebase's focus on the cloud and mobile, it is little surprise that Google's own announcement about the acquisition came on the Google Cloud Platform Blog. The two companies appear to be a good match, with Firebase's aim to "continue to be platform agnostic and provide clients for iOS, Android, the web, and more" being very much in keeping with Google's own ethos.

Continue reading

5 essential tips for staying safe online

5 essential tips for staying safe online

The security of the internet is an on-going concern. Whether you're online for fun, or you're conducting business, there are all manner of pitfalls you may encounter. Issues such as viruses and malware are now widely known about, but these are far from being the only security issues to concern yourself with. Security has been thrown into the limelight once again by high-profile stories like the Fappening, problems with SnapChat, concerns about the Whisper app, and the POODLE SSL 3.0 vulnerability.

A large proportion of companies and individuals are aware of the importance of anti-virus and anti-malware tools, firewalls and the like. Security tools are all well and good, but there's also a lot to be said in favor of changing online behaviors; it's something that the online community and businesses are increasingly coming to understand. Much of what this entails -- taking care about the personal information you share and educating yourself about services before you use them -- is common sense, but it bears repeating.

Continue reading

The cloud is ubiquitous -- and so is its security

cloud

The tabloids are abuzz with tales of hackers stealing salacious celebrity selfies stored on the Cloud, and of course the furor dies with next week’s issue of People Magazine.

The thought of Cloud based business data being compromised is a different matter, and you’re right to be concerned about ubiquitous computing resulting in ubiquitous hacking attempts. Fortunately, efforts to secure the cloud are maintaining the pace of the unprecedented growth of the cloud itself.

Continue reading

Cloud-based security and why it's here to stay

cloud security

As the popularity of cloud services has grown, so have concerns over the security of the data that's stored on them. This has led security vendors to adapt and develop solutions for the new environment.

A new report by security company NSS Labs looks at the rise of cloud security solutions and at the business demands driving their adoption, as well as the limitations and potential hidden costs in their use and recommendations for enterprises.

Continue reading

Tracking and tackling Ebola using mobile phone surveillance

Tracking and tackling Ebola using mobile phone surveillance

Mention web or mobile surveillance, and you're sure to raise a few hackles. But the current Ebola outbreak is showing that the data collected from handsets can be extremely useful. The idea of tackling a disease with 'big data' gathered from mobile phones might seem a little odd, but it's actually an incredibly valuable source of information. Telecom firms such as Orange have been working with data scientists, using anonymized data gathered from phones to track population movement in regions affected by Ebola.

The BBC points out that even in relatively poor countries in Africa, mobile phone ownership is still high. Experts have been able to use this data to determine the best places to set up treatment centers, and it's an idea that has been pounced upon by the CDC.

Continue reading

Don't overlook the most important cloud storage feature: Security

cloud_security_header_contentfullwidth

The craze in the world of cloud storage today seems to be rolling out lists of additional features that match the features of every competitor out there, and presenting them as new and improved. Every company strives to be appear as the best possible cloud option on the market by continually adding "new" features right alongside competitors, and in all of the competition it can be a simple mistake to overlook what these features actually mean.

Before you let these lists of newly-added features dazzle you into choosing one specific cloud storage option over another, do a little research into what these features actually do. You might be surprised to find that many aren’t precisely new ideas, and they don’t increase the most important cloud storage aspect of all: secure file storage.

Continue reading

Public cloud security flaws: who’s viewing your files?

Cloud spy

Secure cloud storage is a challenge facing many professionals today, especially small and mid-sized businesses. It’s clear that the cloud is going to stick around for a long time, and so everyone is looking for a way to get on board with it while still protecting their professional data.

But, the unfortunate truth about public cloud storage is that you can’t control who handles your data or how it is protected. If you choose the wrong service, your company files are exposed to the dangers of hackers, data leaks, seizure, and nosy cloud employees. It’s difficult to know who is looking at your data, but if you know the risks and costs that come with different services and cloud functions, you can better protect your privacy.

Continue reading

Dropbox passwords held to ransom after third-party leak

Cloud box

Hackers claim to have stolen the login details of almost seven million Dropbox users. Having released a teaser file on Pastebin with details of around 400 accounts they’re offering to release more in exchange for a Bitcoin ransom.

Like the Snapchat photo leak it seems that this information has come from insecure third-party services rather than from Dropbox itself.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.