TechSoup in partnership with TechSoup Global Network conducted its 2012 Global Cloud Computing Survey among 10,500 nonprofits, charities, and non-governmental organizations (NGOs) from 88 countries on the use of technology hosted in the cloud at nonprofit organizations. The objective of the survey was to determine the current state of the technological equipment of these organizations…

A few days ago, Cisco unveiled a set of security solutions designed to improve the robustness of data centers against the threats they constantly face while moving toward virtualized, more consolidated environments and allowing businesses to benefit from new cloud-based models. The new set of security solutions released by Cisco extend the power of security…

Faced with declining sales for several large systems, IBM decided to advance the timing slightly to launch its new mainframes. The zEnterprise EC12 mainframe is designed for securing large volumes of transactions and data analysis ideal for cloud computing and big data. The mainframe zEC12 promises 25% better performance per core and 50% more capacity…

The Cloud Security Alliance (CSA) announced the creation of a Privacy Level Agreement (PLA) Working Group in the EU chaired by the Hong Kong Applied Science and Technology Research Institute (ASTRI), to seek solutions to improve the security, development of cloud systems that respond to the challenges of cloud development in Hong Kong. The possibilities…

Business organizations are increasingly moving towards the cloud. However, there are still some obstacles to its widespread acceptance and ongoing development. While many are happy about how things are evolving in the cloud, there are also some missing pieces that must be taken into consideration. For one, service administration is still far from being perfect….

Just recently, Steve Wozniak, Apple co-founder, took center stage when he said that cloud computing is facing “horrendous” problems. Mat Honan from Wired magazine also made startling revelations that Amazon and Apple’s customer service departments have been hacked which resulted to compromising his social media accounts. His professional and personal information was lost and there…

The Ponemon Institute published a study on the global use of encryption of sensitive data by users in the cloud. Beyond the results, the document also provides an interesting perspective on the perception of cloud and security by companies from different countries. The study conducted by Ponemon Institute in association with computer security specialist Thales…

Cloud computing could be described as evolutionary outgrowth of previous computational approaches, based on both existing technologies and new technologies. Although the cloud presents new opportunities around the sharing of resources, the relative newness of the model does not clearly overcome some of the barriers, which will need to be addressed before it becomes pervasive….

Recent research reviewing small- to medium-size website traffic revealed that 51% of web site traffic is non-human, and that 31% is potentially damaging – automated malicious traffic from hackers, spies, scrapers, and spammers. Given these numbers, no one wants to leave a website’s “front door” open. Website owners work hard to attract quality human traffic,…