Friday, August 17, 2012

WOLF Weekly Cloud Sum-up, August 17, 2012

Cloud computing has been in the news a lot in recent weeks - starting from the launch of Apple's OS X Mountain Lion, which heavily integrates with iCloud, to the alleged hacking of a technology journalist's online accounts. Think of the cloud as a disk drive that is owned by a company like Google or Apple, which stores all of your files in a remote location - typically at a server farm. The cloud makes it possible to access photos, videos or documents from any computer with an Internet connection. Recently, Wired senior writer Mat Honan reported that because of what was initially fraudulent phone calls, several of his online accounts were breached, including his iCloud account. Honan's iPhone, iPad and MacBook were remotely wiped because the hack had access to his iCloud account.

Read More

Cloud computing's most over-hyped terms

Cloud computing is a hyped-up term, a recent report from Gartner found. But behind the hype there are significant benefits to some technologies in the cloud industry and some of the terms being floated around in the cloud are bigger buzzwords than others. The overall cloud computing industry is past its peak of inflated expectations, Gartner says, but other aspects of the cloud computing industry are at various points of the lifecycle. XaaS, Big Data, PaaS are some of the hyped ones…

Cloud Computing Standards and Interoperability Being Established

The advent of cloud computing exploding to most any type of application being available, has caused severe confusion for end-users. It only makes sense for industry standards and interoperability to be established and provide some guidance for customers. This is an update of a post we did in 2009 when the standards were announced. It has been updated for today’s evolution of the cloud and SaaS marketplace.

Cloud computing raising a storm

There’s nothing up in the air about “cloud computing”, a technological innovation taking the business world by storm – and which experts in information and communications technology (ICT) believe offers many potential benefits. The system allows devices such as computers, tablets and smartphones access to virtual services and next-generation technology, with minimal costs. For the technophobic, an easy explanation of how cloud computing works likens it to the way in which South Africans currently enjoy utilities such as water and electricity from a shared central base, with costs shared among users.

The Biggest Cloud Computing Security Risk Is Impossible to Eliminate

The past couple of years have been tough for those defending the security of cloud computing and those trying to establish secure cloud infrastructures for themselves. For the most part, there have been DDOS attacks or defacements designed to embarrass or punish site owners. However, even considering only websites or services from which hackers actually took over accounts, stole data or money, or planted malware to help steal data or money from others, the list of security failures is long and distinguished: Google, LinkedIn, Twitter, Hotmail, Global Payments (credit-card clearinghouse for Visa, MasterCard and others), Federal Express, Zappos, a host of local bank and police agencies, and the China Software Developer Network (which, all by itself, lost personal information on 6 million users to a single hacker named Zeng).

We hope these short sum-ups on Cloud Computing are helping you to take a knowledgeable approach towards moving to the cloud. Stay tuned for more sum-ups on in the forthcoming week.

Don’t forget to add your comments and suggestions. I will have more around the cloud a week later.

Santanu Das
Marketing Evangelist, WOLF Frameworks

NOTE: The views expressed above are purely personal and for informational purposes only. WOLF FRAMEWORKS INDIA PVT. LTD. MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

No comments: