Learn from the Past, Excel in the Present and Change the Future – Exploring technology and business innovation and the implications for enterprise software implementation by understanding the rapidly changing software, business and technology landscape through summary, comparison, analysis and practical experience.
Keeping our online identity private and secure is an ongoing high interest matter as we want the ability to control how much information we disclose to others.
Although protection of our privacy and security rules increased in the last years, we know that sharing information, updates, images etc. doesn’t always give us the privacy that we may desire.
All our information gets stored in the cloud where is may stay available, forever. With the right applied tools is retrievable by whoever has interest gaining the data – even out of context.
There are many cloud solutions out there: private clouds, public clouds, hybrid clouds, storage clouds, community clouds etc. Yet, no cloud is perfect.
Recently, there were significant problems regarding public cloud outages.
For risk mitigation, several business customers are now looking to distribute their workloads amongst multiple different clouds sometimes even away from the super-scale computing that is currently offered from public cloud providers like Amazon, Google, my company and Rackspace.
Despite the market dominance of the super-cloud providers there is high demand for multiple other cloud services in the growing market of the multi-cloud and hybrid-cloud world.
It is projected that cloud customers will not only use the traditional one-cloud solution but will start using a combination of public clouds including:
Local and low-cost clouds
Customized and specialized clouds that are technology and application-specific
High-performance and high-reliability clouds adapted for their special work load
Most of us are part of an online community, social network or have our data online with service providers. Many of today’s Internet companies including Facebook, Google, Apple and Microsoft have a huge amounts of data stored about us.
We continuously share photos, videos, status updates and links about what fascinates us, what we like or dislike, what shocked us and what entertains us etc.
Spyware is of increasing overall concern about internet privacy.
Spyware is defined as malicious software (malware) and data collection programs sometimes called “Spybots” or “Tracking Software”, which secretly collect information about the user. Spyware may be designed for advertising – also known as adware – that consistently contains components for tracking and reporting user information. Finally, spyware may be set-up for changing the configuration of a computer.
In general, the gathering of information about a person or organization occurs without their knowledge. Continue reading “Spyware – Who is watching you?” »
The cloud can be a very unsafe place when data and data transfer isn’t sufficiently protected. Online commerce transactions, web registrations, search engine submissions, Web polls, e-mail service registration and other automated services may be ‘attacked’ by malicious software programs or bots that mimic humans behavior having the intent of identity theft, spam, data manipulation and harm to businesses etc.
Passwords and personal identification numbers (PINs) are required everywhere where computers and mobile devices are used and data needs to be secured.
Passwords and PINs are the first line of defense against cyber-crime protecting personal information including financial information, health data and private files and alike. In business passwords are essential to secure trade secrets, financial data, intellectual property, customer lists, employer information etc. Continue reading “Passwords and PINs – The Entrance to Data Security” »
Security of digital data is critical.
Data needs to be managed correctly and must be flexibly stored, moved and provisioned while it needs to be easily accessible and securely protected from data theft and malware etc.
Besides local storage, the most common and favorable from of data storage is in a data center also known as Infrastructure as a Service (IaaS) since for most companies, it is not rational to invest into hardware that may be out-dated within 6 months. Continue reading “Data Center Design” »