MEMORY PALACE

Friday, 1 May 2009

Biggest Cloud Challenge: Security | Cloud Security

  • Biggest Cloud Challenge: Security | Cloud Security

    tags: cloud computing

    • Hardly a shock but validates the need for a meaningful security conversation between Cloud providers and potential Cloud customers…

      As part of our ongoing research into Cloud Computing, IDC recently conducted a survey of 244 IT executives/CIOs and their line-of-business (LOB) colleagues about their companies’ use of, and views about, IT Cloud Services. Successful suppliers will need to address both the biggest challenges of cloud services, and the biggest traditional IT user issues.In part 1, we looked at current and future adoption of IT cloud services. In part 2, we looked at users’ views about the key benefits and challenges of IT cloud services.

      Chart showing biggest Cloud challenges

      What is your Cloud Provider doing to address your security concerns?


Posted by Joseph at Friday, May 01, 2009

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

AddThis

Bookmark and Share

Twitter Updates

Twitter Updates

    follow me on Twitter

    My Blog List

    • CircleID
      Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism - As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and allianc...
    • IPKat - news and fun for everyone!
      Saturday Sundries - Happy New Year, readers – can you believe it's 2026!?Ring in the new year with the latest IP events, news and opportunities. And don't forget to stay tuned...
    • Ars Technica
      No, Grok can’t really “apologize” for posting non-consensual sexual images - Letting the unreliable Grok be its own "spokesperson" lets xAI off the hook.
    • Freedom to Tinker
      AI Chip Lifespans: A Note on the Secondary Market - Two months ago, I wrote about the competition concerns with the GenAI infrastructure boom. One of my provocative claims was that the lifespan of the chip...
    • The Open Rights Group
      ORG End of Year Review 2025 - Digital rights in 2025 From age verification and digital ID to crime-predicting tech and attacks on migrants’ digital rights, this year we had to fight har...
    • Canadian Privacy Law Blog
      When student data is hacked & stolen: Regulators’ lessons from the PowerSchool data breach - You may recall hearing about a significant cybersecurity breach affecting school boards from the end of last year and the beginning of this year: the Po...
    • The Laboratorium
      Do Not Confuse - I was a few years ago old when I learned that these were all distinct:
    • TechnoLlama
      We need to talk about the EU TDM exception and AI training - Following the recent decision in GEMA v OpenAI, and last year’s Kneschke v LAION, we now have two German courts grappling with the applicability of the tex...
    • Binary Law
      The law? It’s what you believe it to be - “People … prefer stories that affirm their views of themselves, and of others, and of the world around them. The challenge for those who want to place the ...
    • Legal Scholarship Blog
      Call for Proposals: Fall 2024 Symposium - Iowa Law Review is now accepting proposals for the Fall 2024 Symposium. Proposal Requirements: Proposals should be submitted via email to ilr@uiowa.edu. Pr...
    • Cato Unbound
      Of Groups, Intersections, and the People Who Inhabit Them - Jacob T. Levy The powerful norms and rules that structured life in the American South during slavery and Jim Crow not only prohibited sex between black me...
    • BCS Security Articles
      People, not just data - Sometimes, we can overlook the true impact of cybercrime on individuals. Mike Sheward, Director of Information Security at Accolade, explains how learning ...
    • Info/Law
      Prof. Michael Risch on “Paths or Fences” - Professor Michael Risch, of Villanova (congrats Wildcats, BTW!), has a review of “Paths or Fences: Patents, Copyrights, and the Constitution” up at Written...
    • CYB3RCRIM3
      Child Sex Trafficking and Bypassing Security on a Tablet Computer - This post examines a recent opinion from the U.S. Court of Appeals for the 11th Circuit: *U.S. v. Blake*, 868 F.3d 960 (2017). The court begins the opin...
    • stevenberlinjohnson.com
      Wonderland, the book (and podcast!) - I’m very excited to announce my next book — Wonderland: How Play Made The Modern World, to be published in November by my long-time publisher Riverhead Boo...
    • Blogzilla
      Consultation response to "Keeping Children Safe in Education: proposed changes" - *Profs. Ian Brown and Douwe Korff, February 2016* *Introduction* 1. We have only just learned of the consultation, for which we apologise. The...
    • panGloss
      Three myths that need nailed about the right to be forgotten (and one question) - *1 **Everyone thinks it’s a bad idea, so why hasn’t it gone yet, already.* No they don’t, actually. Just the people who get to write in mass medi...
    • Clay Shirky
      Pulling Punches While Covering Print: A Reply to Ryan Chittum - Background: Yesterday, I wrote something about how nostalgia blunted skeptical coverage of Aaron Kushner’s dumb — and now failing — plans to build a newspa...
    • CMLP International Blog
      Will E.U. Court's Privacy Ruling Break the Internet? - In 2012, a bevy of internet companies and web sites waged a successful campaign against bills in Congress -- the PROTECT IP Act and Stop Online Piracy Ac...
    • DP thinker
      Recommend blog posts - For researchers working on privacy developments, here are a few suggested links to keep abreast of the latest: 1) Hunton and Williams Privacy Law Blog - 2)...
    • Moral Panics and the Copyright Wars
      MusicNet, Pressplay and Lost Opportunities - On pages 8-9 of Moral Panics and the Copyright Wars I discuss the aftermath of the shutdown of Napster in 2001. This period is interesting because it prese...
    • EDRI - Digital Civil Rights in Europe
      -
    • The Volokh Conspiracy
      -
    • Center for Democracy and Technology
      -
    • The Technology Liberation Front
      -
    • Technology, Thoughts, and Trinkets
      -

    About Me

    Joseph
    View my complete profile

    Blog Archive

    Picture Window theme. Powered by Blogger.