Articles about Cloud Computing

IBM launches new cloud collaboration to power application development

IBM logo

Businesses are constantly seeking to improve the digital experience that they offer their customers, delivering something that's engaging and personalized. Add in demand for mobile access from every device, integrated social capabilities, and the need to analyze data from the internet-of-things to quickly make decisions and companies are looking for faster ways to create improved customer experiences.

Today IBM and Portico Consultancy are unveiling new cloud services to help businesses of any size quickly build, test and deploy applications to deliver on their requirements.

Continue reading

The end of Apple's 'i' era is nigh

Apple store logo

If Apple's streaming music service launches tomorrow at WWDC and is branded with the company's name/logo, look for broad naming changes ahead. My guess, and it's only that: the lower-case letter before products like iMac or iPhone will disappear; over time. Under CEO Tim Cook, the branding strategy differs from Steve Jobs. That's sensible considering where the company is today compared to 1998 when the cofounder introduced iMac.

Apple Watch foreshadows the new nomenclature. Contrary to months of iWatch rumors before launch, the device is identified by sound as Apple Watch, but what you see is the company's logo, which is one of the most recognizable brand icons ever created. If Apple Music turns out to be more than just streaming, but the replacement for or displacement of iTunes, consider that as sign of future naming conventions to come. If I am mistaken -- well, Apple should do what I predict.

Continue reading

F-Secure does a Symantec and shuts down its failed cloud storage service

Warning Sign Sky Cloud Cloudy

Storing your personal data in the cloud makes a lot of sense. It provides a handy backup, and you can access your content from anywhere. I write about a lot of cloud storage services, but I only really use established ones from the likes of Google and Microsoft.

I would consider, and use, storage services from other companies, but the problem is they can’t be trusted. So many of the sites I sign up to -- usually purely to write about -- shut down within a year or so. These aren’t storage services from firms you’ve never heard of either. Today’s discontinued service is Younited by F-Secure.

Continue reading

Tim Cook is an opportunist

Apple CEO Tim Cook

Nine years ago, a NPR interviewer asked me about Google and other U.S. companies censoring search results in China. The question was one of morality -- to which I gave answer she didn't expect. That response, or my recollection of it, is appropriate for rather ridiculous and self-serving statements that Apple CEO Tim Cook reportedly made two days ago.

"We believe that people have a fundamental right to privacy", Cook said, Matthew Panzarino reports for TechCrunch. "The American people demand it, the constitution demands it, morality demands it". Oh? What is moral? The answer I gave NPR in 2006 applies: There is no moral high ground in business. The high ground is quagmire, because all public companies -- Apple surely among them -- share a single, moral objective: Make profits for stockholders. Plain, pure, and simple.

Continue reading

Cloud storage survey highlights governance and security concerns

Secure cloud

New research by cloud storage specialist CTERA Networks highlights the challenges that enterprises face in providing cloud storage and file sharing services, while reducing IT costs and maintaining security and data control.

It shows that security of data remains a major issue with 35 percent of organizations experiencing corporate data leakage in 2014 as a result of employees sharing files via often-unsanctioned file sync and share (FSS) services, a four percent increase over 2013.

Continue reading

Organizations take too long to fix security vulnerabilities

Security time bomb

A new study from threat prediction and remediation specialist NopSec reveals key security vulnerability issues and highlights the length of time it takes for enterprises to fix problems.

NopSec analyzed more than 65,000 vulnerabilities contained in the National Vulnerability Database over a 20-year period, as well as a subset of more than 21,000 of those vulnerabilities identified across customers in all industries.

Continue reading

Tidal seeks fix for Android app bug

Tidal Rolling Stones Nexus 6

My third month as a Tidal subscriber started today, but nearly not at all. Last week I prepared to cancel the pricey, streaming service after encountering a disastrous functional flaw listening on either Nexus 6 or 9. Songs skip to the next track part way through playing, which is unacceptable behavior—made more so because of expectations that higher audio fidelity and loftier monthly subscription fee set.

I would have stopped subscribing yesterday, at the billing cycle's end, if not for Tidal offering a free month of service. Whether or not our paying relationship continues depends much on the music streamer resolving an app problem. "There is a bug with Nexus and Sony phones with Android 5 unfortunately", according to a tech support specialist, "We are working on fixing this. Mostly after 26 megabytes have been streamed, it skips. So for now we do not have a solution yet",

Continue reading

IT heads want scalable, secure mobile app platforms

Phone gears

Developing mobile and web-based continues to present a major challenge for enterprises, especially with regard to the costs associated with infrastructure and DevOps.

A new survey of 200 technology decision makers by mobile backend-as-a-service (MBaaS) company moBack shows that 80 percent of respondents, including both large and small businesses, consider mobile app development very important and essential for their business.

Continue reading

The truth about Google Photos

Secret Tell Surprise Shock

Google Photos is more than an exciting -- and hugely transforming -- new product. The app/cloud service is a metaphor for an escalating mobile business model that, with perhaps the exception of Facebook, no competitor has the capacity to match.

Users gain tremendous time-saving utility, such as the ability to meaningfully search using innocuous terms like "dog" or "Washington", all without the need to manually add metadata tags by way of applications like Photoshop. Meanwhile, Google gets access to quantifiable information, in the image and accompanying metadata, around which to sell advertising and related contextual content or services.

Continue reading

How a growing cyber attack industry is good news for investors

cyber security

Whilst cyber attacks continue to make the news, a new report published by Capital News Desk suggests that around 70 percent of organizations choose to keep their security incidents quiet.

It also reveals that around 73 percent of large organizations have been infiltrated by attacks. It's newer technologies like BYOD and the cloud that are seen as the biggest threats along with cyber crime.

Continue reading

Meeting the challenge of unstructured data

Data search

Businesses around the world are relying more on big data than ever before. But it’s crucial that they know the right way to store and protect their data as well as knowing how to use it effectively.

Communications and managed infrastructure specialist XO Communications has produced an infographic looking at how intelligent networking can be used to manage the rise in unstructured data use.

Continue reading

Cortana to play well with popular cloud storage lockers on Lenovo's Windows 10 PCs

cortana__contentfullwidth

Microsoft and Lenovo have teamed up to expand Cortana's usefulness on the Chinese maker's Windows 10 PCs, giving users the ability to call up the personal assistant to search files stored on popular cloud storage lockers.

Considering that each of the major cloud storage services has its fair share of supporters, it is a smart play to give customers the option to use their favorite locker with Cortana. It enhances the user experience and, at the same time, sets Microsoft up to gain more Cortana supporters.

Continue reading

Forensic investigations: Retrieving data from the cloud

Microsoft's VC3 security is encryption for the cloud

Cloud data represents a virtual goldmine of potential evidence for forensic investigators. Together with mobile device data, cloud data sources often present critical connections investigators need to solve crimes.

However, there are a number of challenges that investigators face when it comes to data retrieval from the cloud.

Continue reading

1&1 Cloud Server offers scalable computing for smaller companies

1&1 Cloud Server control panel

One of the problems for smaller businesses when specifying servers is that it's easy to be caught out by a sudden surge in traffic or need for extra capacity.

It can take time to ramp up capacity to cope during which you could be losing business. Hosting company 1&1 Internet has launched its new Cloud Server solution aimed at smaller businesses which offers flexibility and control along with a transparent pricing model.

Continue reading

ProtectWise streamlines data breach analysis

security magnifying glass

It often takes time for data breaches to be uncovered and that can present problems when it comes to analysing them and tracing their cause.

Denver-based startup ProtectWise has an answer in the form of its new technology that can record all network activity and store it in the cloud for analysis and playback at a later date.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.