Articles about Private Cloud Compute

The role of private clouds in enterprise data strategy [Q&A]

Cloud Computing Power Enhance Cloud Strategy for Business EIDE

As AI reshapes business operations, companies are facing new challenges around cost uncertainty, security, and data integrity. The rise of hybrid cloud strategies -- combining private clouds with public infrastructure -- is becoming a key approach to addressing these concerns.

While enterprises focus on cost control, safeguarding sensitive corporate data, and preventing AI-driven data leakage, they are also trying to leverage LLMs to exploit data in the public cloud while retaining sensitive data in private clouds that they control.

Continue reading

Apple defends Siri, saying the data it collects is never used for advertising, never sold, and never used for profiling

Apple security logo

Having agreed to pay out $95 million to settle a lawsuit alleging Siri recorded private conversations without consent, Apple has doubled down on its assertion that it has done nothing  wrong.

In a statement entitled “Our longstanding privacy commitment with Siri”, the company stresses it is committed to protecting user privacy. Referring specifically to Siri as “the most private digital assistant”, Apple insists that it “has never used Siri data to build marketing profiles, never made it available for advertising, and never sold it to anyone for any purpose”. 

Continue reading

Apple reinforces its privacy leadership

B3240465-1284-4870-87D2-FC263573B268

Apple today announced a number of new privacy features across its platforms, in particular highlighting its Private Cloud Compute technology. This addition enhances the security of iPhone users by extending robust privacy measures to cloud-based operations, enabling intelligent, personalized computing while, Apple insists, maintaining data privacy.

Craig Federighi, Apple’s Senior Vice President of Software Engineering said, “Private Cloud Compute enables our Apple Intelligence system to handle complex requests while maintaining an unprecedented level of privacy.” The new technology ensures that user data is processed but never stored, remaining inaccessible even to Apple, with security architectures that are open to independent verification.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.