In the years to come, cloud computing will take a substantial piece of the market from traditional deployment models. This implies growing demand for applications that can operate in a cloud environment, and for software engineers skilled in cloud computing technologies.
US intelligence agencies look to cloud computing to promote better cross-agency communication without compromising security.
Blind quantum computing protocol preserves the privacy of user data in the cloud.
Risk-averse industries are still considering clouds but security and availability concerns persist for mission-critical applications.
When the cloud is used for nefarious purposes as in the case of the Amazon/Sony issue, who’s to blame?
Scott Clark argues that the more similar that we can make cloud infrastructures to the
enterprise infrastructures we have today, the more comfortable customers
will be with using cloud from a security perspective.
Oracle honed its focus on key markets to convince users that cost, security and compliance, are best handled in a specialized cloud environment.
This week we gathered the opinions of five technical leaders from cloud service companies to gauge their views on customer reception of the idea of placing mission-critical applications on public resources. Just as important as the initial question about the viability of public clouds for core apps is a secondary query—for those that did decide to send mission-critical apps to the public cloud, what was the driving factor?
During a recent “Cloud Computing in Telecom” SCOPE workshop, presenters and attendees expressed considerable interest in cloud security. Presenter Rao Vasireddy of Alcatel-Lucent, who advocated using “secure by design” principles to secure the cloud, talked to Leslie Gurth from SCOPE about his presentation.
Currently in the testbed stage, HP Labs is presenting the G-Cloud as a Minority Report-esque demo to public sector IT pros to show how services can be constructed from hosted components with a management layer on top—and of course, with one security feature piled atop another.