Cloud Computing

Cloud Computing / Most Viewed

Big Data Stress? Go Zen With These 5 Technologies

The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more

Native Web Applications (NWA) vs. Rich Internet Applications (RIA)

A rewrite of the Rich Internet Application (RIA) article is my latest contribution to Wikipedia following last year's full rewrite of the Cloud Computing article (which is now finally fairly stable and one of the main authoritative sources on the topic; according to the article statistics I've just done my 500th edit, or one every eight hours on average so it's about as up-to-date as you'll find). Needless to say I agree wholeheartedly with Mozilla's Mark Finkle in saying RIA is Dead! Long Live Web Applications... more

CircleID’s Top 10 Posts of 2008

Here is a list of the most viewed news and blog postings that were featured on CircleID in 2008... Best wishes for 2009 and Happy New Year from all of us here at CircleID. more

Transformation - the Real Business Case for NFV and SDN

2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges? more

US Congress Considering Legislation to Authorize Faster Access to International Electronic Data

A legislation called, Clarifying Lawful Overseas Use of Data Act, or Cloud Act, was introduced on Monday by Congress aimed at creating a clearer framework for law enforcement to access data stored in cloud computing systems. more

Email Snooping Can Be Intrusion Upon Seclusion

Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more

The Coming Cybersecurity Regulatory Revolution

Cybersecurity regulation will take its place alongside environmental regulation, health and safety regulation and financial regulation as a major federal activity. What is not yet clear is what form the regulations will take. FISMA controls, performance standards, consensus standards and industry-specific consortia standards are all possible regulatory approaches. What is not likely is an extended continuation of the current situation in which federal authorities have only limited, informal oversight of private sector cyberdefenses (or lack thereof). more

Report on Today’s State of DNS Services

The Domain Name System, or DNS, has come a long way since its early days and the constant expansion of consumer activity and security concerns has raised further awareness about the critical role of the DNS. However, as the Yankee Group Research points out in a recent report, "there are more changes coming that are also raising the profile of DNS -- notably the move to cloud computing and the migration to IPv6." Suffice to say this is "Not Your Father's DNS". The report titled, "DNS: Risk, Reward and Managed Services" takes a fresh look at today's state of the DNS and the pros and cons of in-house, ISP and managed service provider DNS management options. more

Emerging Markets Tech Watch 2012

2011 has been a significant year for the technology sector globally. Information technology is touching more people in more ways than ever before. Developed markets will be considering a 2012 in which business innovation, competitiveness, and service differentiation are built on ubiquitous broadband, cloud computing, smarter mobile computing, and an increasing plethora of Internet-connected devices. By contrast, securing the technology future for developing markets demands that attention be placed on more fundamental issues. more

UK Communications Watchdog Calls for Investigation into Microsoft and Amazon’s Cloud Market Dominance

The UK's communications watchdog, Ofcom, has proposed referring Microsoft and Amazon to the Competition and Markets Authority (CMA) for further investigation into their dominance of the cloud computing market. more

Huawei’s Q1 2021 Phone Sales Down by Over 30%

"2021 will be another challenging year for us, but it's also the year that our future development strategy will begin to take shape," said Eric Xu, Huawei's Rotating Chairman. Huawei generated CNY152.2 billion in revenue, a 16.5% decrease year-on-year. The Network Business continued to grow. It wasn't officially announced1, but consumer products other than phones probably increased sales. The fitness tracker, earbuds, and watches are winning strong reviews. more

Why Farmers Are Using Wifi to Grow Your Grapes

Recently, California farmer Craig Thompson got a pretty nifty upgrade for his irrigation: a broadband-connected Hydrawise control system that would automatically manage and monitor the irrigation of his olive and grape fields and collect data to alert him if there was a problem. He woke up the next morning to fields he could have assumed were appropriately hydrated, but the Hydrawise system quickly proved its worth when he looked at the data coming out of it. more

Apple Setting Up First Data Center in China to Comply with Tougher Cybersecurity Laws

Apple today reported it is constructing its first data center in China, in partnership with a local internet services company, in order to comply with the tougher cybersecurity laws enacted last month. more

Google Launches Storage Service, “Drive”

Google today launched a long-rumored "Drive" service to allow users store photos, videos, and other digital files in its massive data centers. Available immediately, first five gigabytes of storage per account of Google Drive is free and additional storage will be sold for prices starting at $2.49 per month for 25 gigabytes. more

Industry Updates

Four Steps to Mitigate Subdomain Hijacking

3 Key Recommendations to Trust the Cloud More by Trusting It Less

As Global Internet Demands Skyrocket, Expert Share Advice on How to Optimize IT Infrastructure to Meet Modern-Day Challenges

Smart City Market Boom: New eco Study Forecasts Over 17 Percent Annual Growth

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

New Study by eco Alliance: Best Practices Show Future Potential for Green IT 2030

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

i2Coalition and DNA Merger Creates North America’s Largest Internet Infrastructure Advocacy Group

i2Coalition Launches Survey on the Impact of COVID-19 Pandemic on Internet Infrastructure Providers

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Moving from the Castle-and-Moat to the Zero-Trust Model

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

Your Business In Europe: Understanding GDPR & Privacy Shield