Phishing is a popular scam to bait internet users into providing private information. It usually acquires information for the purpose of identity theft. A “phisher” usually sends emails to various individuals and claims to be a legitimate entity. People are duped into providing their personal information, mostly of financial nature, because they [...]Continue Reading →
At this time of financial uncertainty, investors want to search for a winner and it’s to be expected. They don’t want to part with their hard-earned money only to find themselves losing in the end. Most of them will troop to Amazon because it’s been touted as the number one bookseller, even [...]Continue Reading →
The survey commissioned by business software provider MYOB found that 79 percent of SMEs are not using cloud technology, only [...]Continue Reading →
TechSoup in partnership with TechSoup Global Network conducted its 2012 Global Cloud Computing Survey among 10,500 nonprofits, charities, and non-governmental organizations (NGOs) from 88 countries on the use of technology hosted in the cloud at nonprofit organizations.
The objective of the survey was to determine the current state of the technological [...]Continue Reading →
A few days ago, Cisco unveiled a set of security solutions designed to improve the robustness of data centers against the threats they constantly face while moving toward virtualized, more consolidated environments and allowing businesses to benefit from new cloud-based models.
The new set of security solutions released by Cisco extend the [...]Continue Reading →
Faced with declining sales for several large systems, IBM decided to advance the timing slightly to launch its new mainframes. The zEnterprise EC12 mainframe is designed for securing large volumes of transactions and data analysis ideal for cloud computing and big data.
The mainframe zEC12 promises 25% better performance per core [...]Continue Reading →
The Cloud Security Alliance (CSA) announced the creation of a Privacy Level Agreement (PLA) Working Group in the EU chaired by the Hong Kong Applied Science and Technology Research Institute (ASTRI), to seek solutions to improve the security, development of cloud systems that respond to the challenges of cloud development [...]Continue Reading →
Business organizations are increasingly moving towards the cloud. However, there are still some obstacles to its widespread acceptance and ongoing development. While many are happy about how things are evolving in the cloud, there are also some missing pieces that must be taken into consideration.
For one, service administration is still far [...]Continue Reading →
Just recently, Steve Wozniak, Apple co-founder, took center stage when he said that cloud computing is facing “horrendous” problems. Mat Honan from Wired magazine also made startling revelations that Amazon and Apple’s customer service departments have been hacked which resulted to [...]Continue Reading →
The Ponemon Institute published a study on the global use of encryption of sensitive data by users in the cloud. Beyond the results, the document also provides an interesting perspective on the perception of cloud and security by companies from different countries.
The study conducted by Ponemon Institute in association with computer [...]Continue Reading →
Cloud computing could be described as evolutionary outgrowth of previous computational approaches, based on both existing technologies and new technologies. Although the cloud presents new opportunities around the sharing of resources, the relative newness of the model does not clearly overcome some of the barriers, which will need to be addressed before [...]Continue Reading →
Recent research reviewing small- to medium-size website traffic revealed that 51% of web site traffic is non-human, and that 31% is potentially damaging – automated malicious traffic from hackers, spies, scrapers, and spammers.
Given these numbers, no one wants to leave a website’s “front door” open. Website owners work hard [...]Continue Reading →
Cloud computing and cloud services are growing exponentially in different countries and no longer consider as a trend but a necessity. Research firm Gartner recently published a report that said more than one third of all digital data will be stored in the cloud by 2016.
The U.S. is the fourth [...]Continue Reading →
The US Federal Financial Institutions Examination Council is focused in helping financial institutions by providing a resource document which it hopes to address and understand the risk of cloud computing. In its four-page document, Outsourced Cloud Computing, the council stressed that due diligence must be performed in assessing a cloud computing service [...]Continue Reading →
As of May 28, Google’s cloud security reached a new high when Google Apps for Business earned ISO 27001 security certification. Although the news of the certification caused a lot of hype in both the business and the technology worlds, not many people are aware of just how important this security certification [...]Continue Reading →
With the present attention the cloud is getting, it is but normal to be concerned about security. The cloud is popular because it is able to all music and personal emails which can be accessed through mobile devices or computers. Government agencies also use the cloud for its data storage so that [...]Continue Reading →
TagsAmazon Apple aws Big Data big data analytics big data solutions cloud Cloud computing cloud management Cloud Marketing cloud news cloud provider cloud providers Cloud Security CRM data center management Dev & Design Enterprise Enterprise Marketing ERP Gartner Google Government HP hybrid cloud IaaS ibm IDC Infrastructure-as-a-service microsoft mobile apps mobile cloud Openstack PaaS platform-as-a-service Private Cloud Public Cloud rackspace SaaS Salesforce.com Social Media software-as-a-service virtualization vmware weekly digest