background preloader

Cloud

Facebook Twitter

Standards

Azure. Should Your Email Live in the Cloud. Cloud computing is a trap, warns GNU founder | Technology. The concept of using web-based programs like Google's Gmail is "worse than stupidity", according to a leading advocate of free software. Cloud computing – where IT power is delivered over the internet as you need it, rather than drawn from a desktop computer – has gained currency in recent years.

Large internet and technology companies including Google, Microsoft and Amazon are pushing forward their plans to deliver information and software over the net. But Richard Stallman, founder of the Free Software Foundation and creator of the computer operating system GNU, said that cloud computing was simply a trap aimed at forcing more people to buy into locked, proprietary systems that would cost them more and more over time. "It's stupidity. "Somebody is saying this is inevitable – and whenever you hear somebody saying that, it's very likely to be a set of businesses campaigning to make it true.

" Hitler and Cloud Computing Security. Gartner: Seven cloud-computing security risks | Security Central. Cloud computing is fraught with security risks, according to analyst firm Gartner. Smart customers will ask tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor, Gartner says in a June report titled "Assessing the Security Risks of Cloud Computing. " Cloud computing has "unique attributes that require risk assessment in areas such as data integrity, recovery, and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance, and auditing," Gartner says. (Compare security products.) Amazon's EC2 service and Google's Google App Engine are examples of cloud computing, which Gartner defines as a type of computing in which "massively scalable IT-enabled capabilities are delivered 'as a service' to external customers using Internet technologies.

" [ Learn more about what cloud computing really means and the new breed of utility computing and platform-as-a-service offerings. ] 1. 2. 3. Surge Computing/Hybrid Computing. In an earlier blog post [March 2, 2009], we discussed why private clouds enjoy only a small subset of the benefits of public clouds. If common API's allowed the same application to transition between a private cloud and a public cloud, we believe application operators could enjoy the full benefits of cloud computing. We referred to this capability as "surge computing" in our Above the Clouds white paper. Surge computing would allow developers to push just enough (possibly sanitized) data into the cloud to perform a computation and obtain an acceptable result, or seamlessly pull in resources from a public cloud when local capacity is temporarily exceeded.

They could even use either the private cloud or the public cloud as a "spare" in the event that one cloud environment becomes unavailable or fails. One early surge-computing tool available to SaaS developers is Eucalyptus, an open source reimplementation of the Amazon Web Services EC2 APIs. Above the Clouds. Cloud Computing—What is its Potential Value for Your Company? Cloud Computing— Latest Buzzword or a Glimpse of the Future? BitNami: Open Source. Simplified. Cloud computing on Ubuntu. Top five IT channel lessons for the quarter - Channel Marker. Oct 21 2009 4:15PM GMT Posted by: badarrow Tags: Thanks!

We'll email youwhen relevant content isadded and updated. Following Follow Barbara Darrow Google Microsoft Oracle public cloud Sun VARs remain extremely cautious on public cloud computing and are obsessed with which vendor giants will remain standing after more expected M&A activity. 1: Fear the cloud: Okay, that verbiage may be overkill, but the VARs said they spend a lot of time educating customers about when and if public cloud computing will really meet their needs. The rule of thumb seems to be: Unless you, the customer, control the data–encrypted across the wire and in storage–and you control physical access to the servers and storage, you will not be in compliance.

Well-publicized outages including the recent Microsoft-T-mobile Sidekick personal data loss should be a reality check for customers, said George Brown, president of Database Solutions. It’s difficult to tell how serious Google is in its myriad projects. John Willis Cc Use Cases. Security issues in cloud computing. Editor's note: Security in the cloud has evolved greatly since this article was first published. Read updated information... By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy. about security issues in cloud computing, and how to resolve them. What do cloud-focused IT administrators and enterprise security teams fear more than anything? This primer on cloud security hitches offers up all our recent cloud security news, technical tips and detailed tutorials. Cloud security news Cloud security advances not yet on IT radar While security in the cloud has taken a few steps forward, IT admins still aren't enticed to make the move to cloud; many seem more concerned with securing existing enterprise platforms.

The real cost of cloud computing services. Cloud computing services let CIOs reallocate up-front costs for hardware and software, but spreading such expenditures out over months and years will eventually catch up to your bottom line. And along the way, you may encounter many of the same challenges with data protection and content management that you would in your own data center. Cloud computing costs creeping up over time to match and possibly surpass one-shot up-front costs is a reality that Dave Banks, chief technology officer of PropertyRoom.com Inc., says he's willing to live with. Banks calculates that the Mission Viejo, Calif. -based Web business, which auctions off, stores and ships seized and abandoned properties for 1,800 police departments and municipalities, saved about a half million dollars up front by putting its new auction engine in cloud computing services provider Savvis Inc.' Savvis' monthly fee also covers PropertyRoom.com's backup and storage needs.

Dave Banks, chief technology officer, PropertyRoom.com Inc. AWS_Security_Whitepaper_2008_09.pdf (application/pdf Object) Cloud Security Alliance (CSA) - security best practices for cloud computing. Offering cloud computing security services to customers. The late comedian George Carlin had a famous routine about "stuff," and how many of us have so much important stuff that we need to rent rooms in storage facilities to protect the stuff. Storage facilities offer security protections that an average home might not have; strong alarm systems, climate controlled environments, and advanced fire suppression. For your customers, moving data and services "stuff," including personally identifiable information (PII) and protected health information (PHI), to a cloud computing model is a bit like putting our important things in a high-end storage facility.

Cloud computing brings considerable business benefit. Costs can be reduced when ongoing administrative tasks and management of software and hardware are transferred off-site. To augment the cost savings and attract customers, VARs can offer cloud computing security services by providing additional security protection, customization overlays and risk mitigation to the cloud offering. Twenty Rules for Amazon Cloud Security - O'Reilly Broadcast. Is the Amazon Cloud secure? Anyone not asking that question is not doing their due diligence. But how do you separate the real issues you need to worry about from the fear that pundits are using to grab eyeballs for their articles and blogs? The short answer is: Yes! The Amazon Cloud is secure and you can securely deploy web applications into the cloud.

There are definitely concerns unique to the cloud when you examine an EC2 deployment against other options. Encrypt all network traffic. Use only encrypted file systems for block devices and non-root local devices. Encrypt everything you put in S3 using strong encryption. Never allow decryption keys to enter the cloud—unless and only for the duration of an actual decryption activity. Include NO authentication credentials in your AMIs except a key for decrypting the file system key. Pass in your file system key encrypted at instance start-up. Do not allow password-based authentication for shell access. Do not require passwords for sudo access. Cloud Computing Security: Where is Your Computer Today?