MEMORY PALACE

Friday, 1 May 2009

Biggest Cloud Challenge: Security | Cloud Security

  • Biggest Cloud Challenge: Security | Cloud Security

    tags: cloud computing

    • Hardly a shock but validates the need for a meaningful security conversation between Cloud providers and potential Cloud customers…

      As part of our ongoing research into Cloud Computing, IDC recently conducted a survey of 244 IT executives/CIOs and their line-of-business (LOB) colleagues about their companies’ use of, and views about, IT Cloud Services. Successful suppliers will need to address both the biggest challenges of cloud services, and the biggest traditional IT user issues.In part 1, we looked at current and future adoption of IT cloud services. In part 2, we looked at users’ views about the key benefits and challenges of IT cloud services.

      Chart showing biggest Cloud challenges

      What is your Cloud Provider doing to address your security concerns?


Posted by Joseph at Friday, May 01, 2009

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

AddThis

Bookmark and Share

Twitter Updates

Twitter Updates

    follow me on Twitter

    My Blog List

    • Ars Technica
      Artemis II is going so well that we're left to talk about frozen urine - "I think the fixation on the toilet is kind of human nature."
    • IPKat - news and fun for everyone!
      Friday Fantasies - Enjoy the Easter break with the latest news from the IP world. Events 20 - 24 April 2026: IP Transactions: Law and Practice UCL’s Faculty of Laws in Londo...
    • The Laboratorium
      Mission Statement - I’ve changed my mission statement. The old one read:
    • CircleID
      Securing Digital Brand Borders in a Fragmented World - GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost effic...
    • The Open Rights Group
      After the LA Court verdict, the UK must disrupt surveillance capitalism business models - Open Rights Group has responded to the verdict of an LA court that Meta and YouTube are liable for deliberately engineering addictive products and for fail...
    • TechnoLlama
      Why are people adopting AI to write? - The last few weeks I have witnessed a number of interesting discussions breaking out on social media. A couple of weeks ago a US-based academic admitted us...
    • Canadian Privacy Law Blog
      Lawful Access is back: Part 1 is much improved but Part 2 is deeply problematic - The latest attempt at so-called “lawful access” has just dropped in the Parliament of Canada. I have a few things to say about it. It’s better than the ...
    • Freedom to Tinker
      Introducing the New CITP Non-Resident Technology Fellows 2026 Cohort - The Princeton Center for Information Technology Policy (CITP) Non-Resident Technology Fellows program is a new initiative that connects experienced techn...
    • Binary Law
      The law? It’s what you believe it to be - “People … prefer stories that affirm their views of themselves, and of others, and of the world around them. The challenge for those who want to place the ...
    • Technology, Thoughts, and Trinkets
      In Memory of Dr. Omid Payrow Shabani - Prof. Abdollah (Omid) Payrow Shabani is responsible for much of my career and the unfolding of my life. We met in 2004 when he taught me my first political...
    • Legal Scholarship Blog
      Call for Proposals: Fall 2024 Symposium - Iowa Law Review is now accepting proposals for the Fall 2024 Symposium. Proposal Requirements: Proposals should be submitted via email to ilr@uiowa.edu. Pr...
    • Cato Unbound
      Of Groups, Intersections, and the People Who Inhabit Them - Jacob T. Levy The powerful norms and rules that structured life in the American South during slavery and Jim Crow not only prohibited sex between black me...
    • BCS Security Articles
      People, not just data - Sometimes, we can overlook the true impact of cybercrime on individuals. Mike Sheward, Director of Information Security at Accolade, explains how learning ...
    • Info/Law
      Prof. Michael Risch on “Paths or Fences” - Professor Michael Risch, of Villanova (congrats Wildcats, BTW!), has a review of “Paths or Fences: Patents, Copyrights, and the Constitution” up at Written...
    • CYB3RCRIM3
      Child Sex Trafficking and Bypassing Security on a Tablet Computer - This post examines a recent opinion from the U.S. Court of Appeals for the 11th Circuit: *U.S. v. Blake*, 868 F.3d 960 (2017). The court begins the opin...
    • stevenberlinjohnson.com
      Wonderland, the book (and podcast!) - I’m very excited to announce my next book — Wonderland: How Play Made The Modern World, to be published in November by my long-time publisher Riverhead Boo...
    • Blogzilla
      Consultation response to "Keeping Children Safe in Education: proposed changes" - *Profs. Ian Brown and Douwe Korff, February 2016* *Introduction* 1. We have only just learned of the consultation, for which we apologise. The...
    • panGloss
      Three myths that need nailed about the right to be forgotten (and one question) - *1 **Everyone thinks it’s a bad idea, so why hasn’t it gone yet, already.* No they don’t, actually. Just the people who get to write in mass medi...
    • Clay Shirky
      Pulling Punches While Covering Print: A Reply to Ryan Chittum - Background: Yesterday, I wrote something about how nostalgia blunted skeptical coverage of Aaron Kushner’s dumb — and now failing — plans to build a newspa...
    • CMLP International Blog
      Will E.U. Court's Privacy Ruling Break the Internet? - In 2012, a bevy of internet companies and web sites waged a successful campaign against bills in Congress -- the PROTECT IP Act and Stop Online Piracy Ac...
    • DP thinker
      Recommend blog posts - For researchers working on privacy developments, here are a few suggested links to keep abreast of the latest: 1) Hunton and Williams Privacy Law Blog - 2)...
    • Moral Panics and the Copyright Wars
      MusicNet, Pressplay and Lost Opportunities - On pages 8-9 of Moral Panics and the Copyright Wars I discuss the aftermath of the shutdown of Napster in 2001. This period is interesting because it prese...
    • EDRI - Digital Civil Rights in Europe
      -
    • The Volokh Conspiracy
      -
    • Center for Democracy and Technology
      -
    • The Technology Liberation Front
      -

    About Me

    Joseph
    View my complete profile

    Blog Archive

    Picture Window theme. Powered by Blogger.