Articles about Cloud Computing

How to remove devices from your Dropbox account

Dropbox

Dropbox is not especially consumer focused. However, it is still very popular in the cloud market for individuals. The good thing about this combination is that security insights needed for the business aspect of its model seep into the consumer product.

For example, it has much better security settings than Google Drive or OneDrive, the other two popular cloud services in the consumer space. Only Dropbox allows you to view, and remove connected devices.

Continue reading

Surface generated almost $1 billion revenue for Microsoft last quarter

Surface generated almost $1 billion revenue for Microsoft last quarter

Anyone who was under the impression that Surface was a failure for Microsoft need look no further than the latest earnings release for proof that they're wrong. In the quarter ending September 30, Microsoft pulled in $23.20 billion in revenue, and $908 million of this came from the Surface division.

All told, FY15 Q1 represents record first quarter revenue for Microsoft, and it can be at least partly attributed to the influence of Satya Nadella, as well as the restructuring surrounding Nokia Devices and Services. There was a strong performance in the Devices and Consumer divisions, with revenue increasing 47% to $10.96 billion, while commercial revenue rose 10% to $12.28 billion.

Continue reading

IBM and Microsoft team up to offer greater hybrid cloud choice

handshake hands shaking world cloud

One of the problems that enterprises often see in implementing cloud computing is that they risk getting tied into a single supplier for software and platform.

This is leading to more interest in 'hybrid cloud' solutions which allow the mixing and matching of features from different suppliers. Today industry giants IBM and Microsoft announce that they're working together to provide their respective enterprise software on Microsoft Azure and IBM Cloud.

Continue reading

Making direct interconnection of networks a Snap

network connect laptop pc wireless wifi

As businesses increasingly turn to the cloud to store their data the weak link in the chain remains the use of the public internet to transfer information.

To overcome these concerns enterprises are looking for secure and scalable ways to directly connect data centers across the globe. Now IIX (International Internet Exchange) has acquired a platform that fully automates the buying and provisioning of network connections in under five minutes, replacing a manual process that can take as long as 30 days.

Continue reading

Google takes Firebase under its wing in latest cloud acquisition

Google takes Firebase under its wing in last cloud acquisition

Firebase, a company helping developers to produce apps and services that store and sync data in realtime, is the latest Google acquisition. With a user base of 110,000 developers three-year-old Firebase announced that it is joining Google and plans to continue the work it already does, but pointing out it will be possible to "do much more, much faster" with Google's resources and backing.

With Firebase's focus on the cloud and mobile, it is little surprise that Google's own announcement about the acquisition came on the Google Cloud Platform Blog. The two companies appear to be a good match, with Firebase's aim to "continue to be platform agnostic and provide clients for iOS, Android, the web, and more" being very much in keeping with Google's own ethos.

Continue reading

5 essential tips for staying safe online

5 essential tips for staying safe online

The security of the internet is an on-going concern. Whether you're online for fun, or you're conducting business, there are all manner of pitfalls you may encounter. Issues such as viruses and malware are now widely known about, but these are far from being the only security issues to concern yourself with. Security has been thrown into the limelight once again by high-profile stories like the Fappening, problems with SnapChat, concerns about the Whisper app, and the POODLE SSL 3.0 vulnerability.

A large proportion of companies and individuals are aware of the importance of anti-virus and anti-malware tools, firewalls and the like. Security tools are all well and good, but there's also a lot to be said in favor of changing online behaviors; it's something that the online community and businesses are increasingly coming to understand. Much of what this entails -- taking care about the personal information you share and educating yourself about services before you use them -- is common sense, but it bears repeating.

Continue reading

The cloud is ubiquitous -- and so is its security

cloud

The tabloids are abuzz with tales of hackers stealing salacious celebrity selfies stored on the Cloud, and of course the furor dies with next week’s issue of People Magazine.

The thought of Cloud based business data being compromised is a different matter, and you’re right to be concerned about ubiquitous computing resulting in ubiquitous hacking attempts. Fortunately, efforts to secure the cloud are maintaining the pace of the unprecedented growth of the cloud itself.

Continue reading

Cloud-based security and why it's here to stay

cloud security

As the popularity of cloud services has grown, so have concerns over the security of the data that's stored on them. This has led security vendors to adapt and develop solutions for the new environment.

A new report by security company NSS Labs looks at the rise of cloud security solutions and at the business demands driving their adoption, as well as the limitations and potential hidden costs in their use and recommendations for enterprises.

Continue reading

Tracking and tackling Ebola using mobile phone surveillance

Tracking and tackling Ebola using mobile phone surveillance

Mention web or mobile surveillance, and you're sure to raise a few hackles. But the current Ebola outbreak is showing that the data collected from handsets can be extremely useful. The idea of tackling a disease with 'big data' gathered from mobile phones might seem a little odd, but it's actually an incredibly valuable source of information. Telecom firms such as Orange have been working with data scientists, using anonymized data gathered from phones to track population movement in regions affected by Ebola.

The BBC points out that even in relatively poor countries in Africa, mobile phone ownership is still high. Experts have been able to use this data to determine the best places to set up treatment centers, and it's an idea that has been pounced upon by the CDC.

Continue reading

Don't overlook the most important cloud storage feature: Security

cloud_security_header_contentfullwidth

The craze in the world of cloud storage today seems to be rolling out lists of additional features that match the features of every competitor out there, and presenting them as new and improved. Every company strives to be appear as the best possible cloud option on the market by continually adding "new" features right alongside competitors, and in all of the competition it can be a simple mistake to overlook what these features actually mean.

Before you let these lists of newly-added features dazzle you into choosing one specific cloud storage option over another, do a little research into what these features actually do. You might be surprised to find that many aren’t precisely new ideas, and they don’t increase the most important cloud storage aspect of all: secure file storage.

Continue reading

Public cloud security flaws: who’s viewing your files?

Cloud spy

Secure cloud storage is a challenge facing many professionals today, especially small and mid-sized businesses. It’s clear that the cloud is going to stick around for a long time, and so everyone is looking for a way to get on board with it while still protecting their professional data.

But, the unfortunate truth about public cloud storage is that you can’t control who handles your data or how it is protected. If you choose the wrong service, your company files are exposed to the dangers of hackers, data leaks, seizure, and nosy cloud employees. It’s difficult to know who is looking at your data, but if you know the risks and costs that come with different services and cloud functions, you can better protect your privacy.

Continue reading

Dropbox passwords held to ransom after third-party leak

Cloud box

Hackers claim to have stolen the login details of almost seven million Dropbox users. Having released a teaser file on Pastebin with details of around 400 accounts they’re offering to release more in exchange for a Bitcoin ransom.

Like the Snapchat photo leak it seems that this information has come from insecure third-party services rather than from Dropbox itself.

Continue reading

SAP and Birst team up to deliver cloud analytics for the enterprise

Enterprise data

Enterprise software specialist SAP has announced a partnership with business intelligence company Birst to deliver faster analytics on the SAP HANA cloud platform.

The tie up will allow organizations to use a single cloud platform which can deliver instant analytics giving managers the ability to more quickly turn insight into action. It brings together SAP's next-generation cloud platform and Birst's comprehensive two-tier data architecture to provide instant access to business data.

Continue reading

New public cloud backup cuts the cost of protecting data

cloud computing backup

Backups have traditionally involved removable media, whether tape or disk, to allow copies of essential information to be held off site for safety.

The cloud has changed all that but companies still have concerns about security and retention of data, as well as expense. A new product released today by Druva is aimed at delivering a long-term storage solution with less complexity and lower cost.

Continue reading

The internet is a massive waste of time

The internet is a massive waste of time

Over the last couple of decades the internet has revolutionized how we work, how we shop, how we communicate, and how we consume media. In most regards it has made life quicker and easier, but it has also brought challenges and side-effects. Technology may have made many tasks simpler, but it has also increased distractions and shepherded in more ways to procrastinate. You've probably noticed that while you can get many things done faster than ever, you spend a great deal of time doing nothing of worth.

In fact, rather than saving money, the widespread adoption of technology could be costing business dearly. Research shows that nearly two-thirds of employees spend work hours browsing sites unrelated to work -- a surprising 3 percent of them spending more than 10 hours a week actively avoiding work online. All of these wasted man hours add up, resulting in an average cost of almost $3,000 for employee each year.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.