cloud computing Cloud Computing Helps Lift Small Business Valuations By www.small-business-software.net Published On :: Fri, 15 Jul 2016 09:00:00 -0400 It takes more than a solid business plan and gumption to succeed in business nowadays. Growing your company in a competitive businesses landscape—and attracting interested investors—requires a solid footing in technology. complete article Full Article
cloud computing Cloud Computing By www.jucs.org Published On :: 2011-07-20T10:35:14+02:00 Full Article
cloud computing Research on low voltage current transformer power measurement technology in the context of cloud computing By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 As IOT develops drastically these years, the application of cloud computing in many fields has become possible. In this paper, we take low-voltage current transformers in power systems as the research object and propose a TCN-BI-GRU power measurement method that incorporates the signal characteristics based on the transformer input and output. Firstly, the basic signal enhancement extraction of input and output is completed by using EMD and correlation coefficients. Secondly, multi-dimensional feature extraction is completed to improve the data performance according to the established TCN network. Finally, the power prediction is completed by using BI-GRU, and the results show that the RMSE of this framework is 5.69 significantly lower than other methods. In the laboratory test, the device after being subjected to strong disturbance, its correlation coefficient feature has a large impact, leading to a large deviation in the prediction, which provides a new idea for future intelligent prediction. Full Article
cloud computing Cloud Computing: Short Term Impacts of 1:1 Computing in the Sixth Grade By Published On :: 2015-01-08 Full Article
cloud computing Would Cloud Computing Revolutionize Teaching Business Intelligence Courses? By Published On :: Full Article
cloud computing Cloud Computing as an Enabler of Agile Global Software Development By Published On :: 2016-05-16 Agile global software development (AGSD) is an increasingly prevalent software development strategy, as organizations hope to realize the benefits of accessing a larger resource pool of skilled labor, at a potentially reduced cost, while at the same time delivering value incrementally and iteratively. However, the distributed nature of AGSD creates geographic, temporal, socio-cultural distances that challenge collaboration between project stakeholders. The Cloud Computing (CC) service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) are similar to the aspirant qualities of AGSD as they provide services that are globally accessible, efficient, and stable, with lower predictable operating costs that scale to meet the computational demand. This study focused on the 12 agile principles upon which all agile methodologies are based, therein potentially increasing the potential for the findings to be generalized. Domestication Theory was used to assist in understanding how cloud technologies were appropriated in support of AGSD. The research strategy took the form of case study research. The findings suggest that some of the challenges in applying the agile principles in AGSD may be overcome by using CC. Full Article
cloud computing Software as a Service (SaaS) Cloud Computing: An Empirical Investigation on University Students’ Perception By Published On :: 2021-05-07 Aim/Purpose: This study aims to propose and empirically validate a model and investigates the factors influencing acceptance and use of Software as a Services cloud computing services (SaaS) from individuals’ perspectives utilizing an integrative model of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) with modifications to suit the objective of the study. Background: Even though SaaS cloud computing services has gained the acceptance in its educational and technical aspects, it is still expanding constantly with emerging cloud technologies. Moreover, the individual as an end-user of this technology has not been given the ample attention pertaining to SaaS acceptance and adoption (AUSaaS). Additionally, the higher education sector needs to be probed regarding AUSaaS perception, not only from a managerial stance, but also the individual. Hence, further investigation in all aspects, including the human factor, deserves deeper inspection. Methodology: A quantitative approach with probability multi-stage sampling procedure conducted utilizing survey instrument distributed among students from three public Malaysian universities. The valid collected responses were 289 Bachelor’s degree students. The survey included the demographic part as well as the items to measure the constructs relationships hypothesized. Contribution: The empirical results disclosed the appropriateness of the integrated model in explaining the individual’s attitude (R2 = 57%), the behavior intention (R2 = 64%), and AUSaaS at the university settings (R2 = 50%). Also, the study offers valuable findings and examines new relationships that considered a theoretical contribution with proven empirical results. That is, the subjective norms effect on attitude and AUSaaS is adding empirical evidence of the model hypothesized. Knowing the significance of social effect is important in utilizing it to promote university products and SaaS applications – developed inside the university – through social media networks. Also, the direct effect of perceived usefulness on AUSaaS is another important theoretical contribution the SaaS service providers/higher education institutes should consider in promoting the usefulness of their products/services developed or offered to students/end-users. Additionally, the research contributes to the knowledge of the literature and is considered one of the leading studies on accepting SaaS services and applications as proliferation of studies focus on the general and broad concept of cloud computing. Furthermore, by integrating two theories (i.e., TPB and TAM), the study employed different factors in studying the perceptions towards the acceptance of SaaS services and applications: social factors (i.e., subjective norms), personal capabilities and capacities (i.e., perceived behavioral control), technological factors (i.e., perceived usefulness and perceived ease of use), and attitudinal factors. These factors are the strength of both theories and utilizing them is articulated to unveil the salient factors affecting the acceptance of SaaS services and applications. Findings: A statistically positive significant influence of the main TPB constructs with AUSaaS was revealed. Furthermore, subjective norms (SN) and perceived usefulness (PU) demonstrated prediction ability on AUSaaS. Also, SN proved a statically significant effect on attitude (ATT). Specifically, the main contributors of intention are PU, perceived ease of use, ATT, and perceived behavioral control. Also, the proposed framework is validated empirically and statistically. Recommendation for Researchers: The proposed model is highly recommended to be tested in different settings and cultures. Also, recruiting different respondents with different roles, occupations, and cultures would likely draw more insights of the results obtained in the current research and its generalizability Future Research: Participants from private universities or other educational institutes suggested in future work as the sample here focused only on public sector universities. The model included limited number of variables suggesting that it can be extended in future works with other constructs such as trialability, compatibility, security, risk, privacy, and self-efficacy. Comparison of different ethnic groups, ages, genders, or fields of study in future research would be invaluable to enhance the findings or reveal new insights. Replication of the study in different settings is encouraged. Full Article
cloud computing iuvo is proud recipient of a 2024 Visionary Spotlight Award for Cloud Computing: Business Technology By www.24-7pressrelease.com Published On :: Tue, 28 May 2024 08:00:00 GMT Innovative Microsoft Solution, iuvo Guardian, Recognized for Excellence in Cloud Computing and Business Technology Full Article
cloud computing Dr. Frank Munz on Cloud Computing - Part 1 of 2 By traffic.libsyn.com Published On :: Wed, 23 Mar 2011 21:00:00 +0000 ArchBeat interviews Dr. Frank Munz, the author of "Middleware and Cloud Computing: Oracle Fusion Middleware on Amazon Web Services and Rackspace Cloud." Full Article
cloud computing DR. Frank Munz on Cloud Computing - Part 2 of 2 By traffic.libsyn.com Published On :: Wed, 30 Mar 2011 21:00:00 +0000 ArchBeat interviews Dr. Frank Munz, the author of "Middleware and Cloud Computing: Oracle Fusion Middleware on Amazon Web Services and Rackspace Cloud." Full Article
cloud computing Cloud Computing: Start Smart - Part 1 of 3 By traffic.libsyn.com Published On :: Wed, 25 Jan 2012 21:00:00 +0000 Bob Hensle and Scott Mattoon, the authors of two new Oracle white papers on Cloud Computing, discuss resources and strategies for making smart early cloud decisions. Full Article
cloud computing Cloud Computing: Start Smart - Part 3 of 3 By traffic.libsyn.com Published On :: Wed, 08 Feb 2012 11:16:00 +0000 In the final segment in this series, Bob Hensle and Scott Mattoon discuss why successful cloud migration may lead some organizations to become cloud providers. Full Article
cloud computing Janakiram MSV on Emerging Trends in Cloud Computing By traffic.libsyn.com Published On :: Fri, 10 Dec 2021 07:08:02 +0000 Jim Grisanzio from Oracle Developer Relations talks with Janakiram MSV about some upcoming trends to look out for in 2022 in cloud computing. Janakiram is an industry analyst and architect based in Hyderabad, India, and he gave the keynote at Oracle Developer Day India in the fall of 2021. Video on YouTube. Full Article
cloud computing [ Y.3527 (09/21) ] - Cloud computing - End-to-end fault and performance management framework of network services in inter-cloud By www.itu.int Published On :: Fri, 29 Oct 2021 09:28:00 GMT Cloud computing - End-to-end fault and performance management framework of network services in inter-cloud Full Article
cloud computing [ Y.3526 (11/21) ] - Cloud computing - Functional requirements of edge cloud management By www.itu.int Published On :: Fri, 19 Nov 2021 11:15:00 GMT Cloud computing - Functional requirements of edge cloud management Full Article
cloud computing Cloud computing By www.itu.int Published On :: Mon, 20 Apr 2020 15:56:44 GMT Cloud computing Full Article
cloud computing [ X.1603 (03/18) ] - Data security requirements for the monitoring service of cloud computing By www.itu.int Published On :: Thu, 19 Jul 2018 11:37:00 GMT Data security requirements for the monitoring service of cloud computing Full Article
cloud computing Federal Executive Forum Defense and Homeland Cloud Computing in Government Progress and Best Practices 2024 By federalnewsnetwork.com Published On :: Fri, 08 Nov 2024 20:37:32 +0000 How are DoD and DHS profiling a successful cloud computing strategy and what is the vision for the future? The post Federal Executive Forum Defense and Homeland Cloud Computing in Government Progress and Best Practices 2024 first appeared on Federal News Network. Full Article Federal Executive Forum Federal Insights Radio Interviews
cloud computing Federal Executive Forum Defense and Homeland Cloud Computing in Government By federalnewsnetwork.com Published On :: Tue, 15 Nov 2022 12:18:04 +0000 Defense and Homeland Security agencies are focused on the mission of protecting the United States. But how do cloud computing programs fit into the next level of this mission? During this webinar, you will gain the unique perspective of top government security experts from the Air Force, USCIS, DHS, Navy and industry leaders. The post Federal Executive Forum Defense and Homeland Cloud Computing in Government first appeared on Federal News Network. Full Article Cloud Computing Defense Federal Executive Forum Federal Insights Roundtables Technology Mark Lucas Paul Puckett Shane Barney Trezza Media Group
cloud computing Mobile cloud computing : architectures, algorithms and applications By search.lib.uiowa.edu Published On :: Location: Engineering Library- QA76.585.D425 2016 Full Article
cloud computing PNNL-Microsoft Collaborate on Cloud Computing for Chemistry, More to Come By www.hpcwire.com Published On :: Fri, 25 Oct 2024 13:00:55 +0000 RICHLAND, Wash.—Some computing challenges are so big that it’s necessary to go all in. That’s the approach a diverse team of scientists and computing experts led by the Department of Energy’s […] The post PNNL-Microsoft Collaborate on Cloud Computing for Chemistry, More to Come appeared first on HPCwire. Full Article Features Pacific Northwest National Laboratory
cloud computing AI and Cloud Computing: Driving Intelligent Innovations By www.ibtimes.co.in Published On :: Fri, 08 Nov 2024 16:37:15 +0530 Karthikeyan Anbalagan's insights emphasize that AI-powered cloud computing is poised to become an essential tool for businesses, driving digital transformation and opening up new possibilities in the ever-evolving technological landscape. Full Article
cloud computing Sustainability & Cloud Computing | WIRED Brand Lab and Accenture By www.wired.com Published On :: Mon, 28 Jun 2021 12:00:00 +0000 Produced by WIRED Brand Lab for Accenture | Join Accenture's Senior Marketing Director, Cloud First Global Service Lead Kishore Durg, as he discusses sustainability & how innovation can create a more sustainable life for all. Durg presents his findings to a child, a college student, and an expert. By showcasing three different levels of thought, our goal at Accenture is to provide a clear, direct, and effective message to all audiences. Implementing sustainable business practices is no small feat, and our mission at Accenture is to help the next generation of intelligent young minds live. Full Article
cloud computing Ep 5: The Power of Innovation & Cloud Computing | WIRED Brand Lab and Accenture By www.wired.com Published On :: Thu, 07 Oct 2021 12:00:00 +0000 Produced by WIRED Brand Lab for Accenture | Teresa Tung, Accenture’s Cloud First Chief Technologist, discusses the power of cloud technology and the potential for innovation. Businesses occasionally have problems that require innovative solutions, and cloud computing has opened up nearly endless possibilities for adaption, across all different areas of business. The everyday life of consumers has changed forever as more technology is introduced into mainstream markets, and your business deserves to be at the forefront of the new customer experience dimension. Watch as Teresa Tung discusses this vital topic with a child, college student, and finally an expert in the cloud computing field. Learn more about Cloud at: https://www.accenture.com/us-en/insights/cloud-computing-index Full Article
cloud computing IEEE International Conference on Joint Cloud Computing (JCC) [electronic journal]. By encore.st-andrews.ac.uk Published On :: Full Article
cloud computing 2020 IEEE International Conference on Joint Cloud Computing [electronic journal]. By encore.st-andrews.ac.uk Published On :: Full Article
cloud computing 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) [electronic journal]. By encore.st-andrews.ac.uk Published On :: IEEE Computer Society Full Article
cloud computing Survey - Cloud Computing Risks Outweigh Reward By packetstormsecurity.com Published On :: Wed, 07 Apr 2010 03:30:45 GMT Full Article survey russia
cloud computing Cloud Computing: The Concept, Impacts and the Role of Government Policy By dx.doi.org Published On :: Tue, 19 Aug 2014 17:04:00 GMT Cloud computing has become a platform for innovation. This paper looks at how the cloud changes the way computing is carried out, and evaluates the benefits, challenges and economic and environmental impacts. It discusses the policy issues raised and the role of governments and other stakeholders in addressing them. Full Article
cloud computing New cloud computing network could cut GHG emissions from ICT By ec.europa.eu Published On :: Thu, 21 Mar 2013 11:37:15 GMT The growing use of Information and Communication Technology (ICT) services is producing an increasing amount of greenhouse gas (GHG) emissions. New research has proposed a network model spanning Europe, USA and Canada that uses ‘cloud computing’ to supply renewable energy to IT data centres. Full Article
cloud computing New cloud computing network could cut GHG emissions from ICT By ec.europa.eu Published On :: Thu, 21 Mar 2013 11:55:44 GMT The growing use of Information and Communication Technology (ICT) services is producing an increasing amount of greenhouse gas (GHG) emissions. New research has proposed a network model spanning Europe, USA and Canada that uses ‘cloud computing’ to supply renewable energy to IT data centres. Full Article
cloud computing Is cloud computing secure? By www.mnn.com Published On :: Wed, 12 Dec 2012 21:55:51 +0000 A growing number of businesses are moving to the cloud for everything from applications to data storage, but how secure is our data in the cloud? Full Article Sustainable Business Practices
cloud computing The Three Most Prevalent Cloud Computing Myths Debunked By rssnewsfeed.net Published On :: Mon, 27 Oct 2014 08:31:11 +0000 Citation Twitter For more about this, go here. Find out more at this site. Keywords: Washington dc server hosting, Cloud solutions, It managed services, Dedicated managed hosting, Boston business phone system, Seattle server hosting. Graphics: Share This Image The post The Three Most Prevalent Cloud Computing Myths Debunked appeared first on RSS News Feed. Full Article Computers and Technology
cloud computing Virtual machine provisioning based on tagged physical resources in a cloud computing environment By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A cloud system may create physical resource tags to store relationships between cloud computing offerings, such as computing service offerings, storage offerings, and network offerings, and the specific physical resources in the cloud computing environment. Cloud computing offerings may be presented to cloud customers, the offerings corresponding to various combinations of computing services, storage, networking, and other hardware or software resources. After a customer selects one or more cloud computing offerings, a cloud resource manager or other component within the cloud infrastructure may retrieve a set of tags and determine a set of physical hardware resources associated with the selected offerings. The physical hardware resources associated with the selected offerings may be subsequently used to provision and create the new virtual machine and its operating environment. Full Article
cloud computing Methods and devices for managing a cloud computing environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and systems for management of a cloud computing environment for use by a software application. The cloud computing environment may be an N-tier environment. Multiple cloud providers may be used to provide the cloud computing environment. Full Article
cloud computing IBM Unveils zEnterprise EC12, a Highly Secure System for Cloud Computing and Enterprise Data By www.ibm.com Published On :: Wed, 29 Aug 2012 10:57:31 GMT IBM today announced the zEnterprise® EC12 mainframe server, the most powerful and technologically advanced version of an IBM system that has been the linchpin of enterprise computing for 48 years. The new enterprise system features technologies that demonstrate IBM’s ongoing commitment to meet the growing need to secure and manage critical information with the System z mainframe. Full Article Global Financing
cloud computing IBM présente le zEnterprise EC12, le système le plus sécurisé pour le cloud computing et pour le traitement des données critiques de l'entreprise By www.ibm.com Published On :: mar., 28 août 2012 10:41:07 GMT Des avancées technologiques qui permettent d'accroître encore le leadership du mainframe et en font le système incontournable pour traiter les données critiques des entreprises Full Article Global Business Solutions
cloud computing The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra By webfeeds.brookings.edu Published On :: Wed, 07 Apr 2010 09:00:00 -0400 Event Information April 7, 20109:00 AM - 11:00 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventCloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential. After the program, panelists took audience questions. Video Cloud Computing a Fiscally Smart MoveCloud Computing Saves Money, Makes Government More OpenCloud Computing Will Fundamentally Change Government OperationsGovernment on Cloud Will Yield Cost-Effective System Audio The Economic Gains of Cloud Computing Transcript Uncorrected Transcript (.pdf) Event Materials 20100407_cloud_computing0407_cloud_computing_kundra_remarks0407_cloud_computing_kundra_presentation Full Article
cloud computing Innovating through Cloud Computing By webfeeds.brookings.edu Published On :: Fri, 07 May 2010 00:00:00 -0400 Technology offers the greatest source for innovation in the public sector and one of the best examples falls within the area of cloud computing. As I noted in a recent paper, the U.S. federal government spends nearly $76 billion each year on information technology, and $20 billion of that is devoted to hardware, software, and file servers. Traditionally, computing services have been delivered through desktops or laptops operated by proprietary software. But new advances in cloud computing have made it possible for public sector agencies alike to access software, services, and data storage through remote file servers.I looked at possible cost savings a federal agency might expect from migrating to the cloud. After undertaking case studies of government agencies that made the move, I found that the agencies generally saw between 25 and 50 percent savings in moving to the cloud. Public officials can save money by reducing the number of file servers they need to purchase, cutting software costs, relying on fewer information technology specialists, and improving the efficiency of their data storage utilization. In 2008, Washington, D.C. city government shifted many of its 38,000 employee email services across 86 agencies to the cloud, and the migration saved 48 percent on email expenditures. In 2009, the city of Los Angeles moved email service for its 30,000 employees to the cloud. An analysis undertaken by City Administrative Officer Miguel Santana for the City Council found that the five-year costs of running the new Google system would be $17,556,484, which was 23.6 percent less than the $22,996,242 for operating GroupWise during that same period. And in terms of personnel savings, the city needed nine fewer people in its information technology department. The U.S. Air Force 45th Space Wing is responsible for launching and tracking unmanned space vehicles from Cape Canaveral Air Force Station and employs more than 10,000 workers. The Wing had 60 distinct file servers, but found that it utilized only 10 percent of central processing unit capacity. Commanders modernized their system and saved $180,000 per year in annual computing costs. In addition, the unit saved money by not buying new hardware or deploying new software. These are just some of the ways the government is using technology to save money and increase efficiency of its operations. Authors Darrell M. West Image Source: © HANNIBAL HANSCHKE / Reuters Full Article
cloud computing Steps to Improve Cloud Computing in the Public Sector By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 09:58:00 -0400 Executive SummaryGovernment information technology is subject to a variety of rules, regulations, and procurement policies. Computing is treated differently depending on whether the platform is based on desktops, laptops, mobile devices, or remote file servers known as cloud computing. There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications. Some people perceive higher security on desktop or laptop computers and lower security with the cloud because the latter’s information is stored remotely through third-party commercial providers. In reality, though, there are serious security threats to all electronic information regardless of platform, and cloud server providers often take security more seriously than mass consumers or government officials employing weak passwords on their local computers. In this paper, I review current federal IT policy and discuss rules, practices, and procedures that limit innovation. There are a variety of obstacles that make it difficult for policymakers to take full advantage of the technological revolution that has unfolded in recent years. After outlining these issues, I make recommendations on policy changes required to improve the efficiency and effectiveness of federal computing. My specific recommendations include: Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms. The use of video, collaboration, and social networking should be authorized for congressional offices. This would make legislative branch policy consistent with that of the executive branch. Judicial branch computing should be modernized, with greater emphasis on cloud computing. There should be a more uniform certification process for federal agencies. Right now, each agency is responsible for certifying its own applications. It makes sense to have a “joint authorization board” with the power to review management services and certify particular products for use across the government. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information. Instead of using a prosecutor’s subpoena, legislation should require a “probable cause” search warrant that is approved by a judge. This would provide greater safeguards in terms of online content, pictures, geolocation data, and e-mails. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing. It makes little sense to have weaker standards on one platform than another. Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems. The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber-crimes. Apps.gov represents a big step forward and government use should be expanded because it makes procurement easier and speeds public sector innovation. It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training, There should be mechanisms for data exchange that encourage portability across platforms. We should avoid vendor lock-in that precludes data exchange. Data on uptime, downtime, recover time, archiving, and maintenance schedules would help build public trust by providing information on computing performance. Downloads Download the Full Paper Authors Darrell M. West Image Source: Martin Barraud Full Article
cloud computing Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 10:00:00 -0400 Event Information July 21, 201010:00 AM - 12:00 PM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventThe U.S. government spends billions of dollars each year on computer hardware, software and file servers that may no longer be necessary. Currently, the public sector makes relatively little use of cloud computing, even though studies suggest substantial government savings from a migration to more Internet-based computing with shared resources.On July 21, the Center for Technology Innovation at Brookings hosted a policy forum on steps to enhance public sector adoption of cloud computing innovations. Brookings Vice President Darrell West moderated a panel of experts, including David McClure of the General Services Administration, Dawn Leaf of the National Institute for Standards and Technology, and Katie Ratte of the Federal Trade Commission. West released a paper detailing the policy changes required to improve the efficiency and effectiveness of federal computing. Audio Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing Transcript Uncorrected Transcript (.pdf)Download Dawn Leaf's PowerPoint Presentation (.pdf)Download David McClure's PowerPoint Presentation (.pdf) Event Materials 20100721_cloud_computing0721_cloud_computing_leaf0721_cloud_computing_mcclure Full Article
cloud computing Privacy and Security in the Cloud Computing Age By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 10:00:00 -0400 Event Information October 26, 201010:00 AM - 11:30 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventAlthough research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.” After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20101026_cloud_computing Full Article
cloud computing Privacy and Security in Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 11:50:00 -0400 Executive Summary Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks. What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b). This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009). Downloads Download the Full Paper Authors Allan A. FriedmanDarrell M. West Image Source: Jupiterimages Full Article
cloud computing The Terms They Are A-Changin'...: Watching Cloud Computing Contracts Take Shape By webfeeds.brookings.edu Published On :: Tue, 01 Mar 2011 13:45:00 -0500 EXECUTIVE SUMMARYMany web services are examples of cloud computing, from storage and backup sites such as Flickr and Dropbox to online business productivity services such as Google Docs and Salesforce.com. Cloud computing offers a potentially attractive solution to customers keen to acquire computing infrastructure without large up-front investment, particularly in cases where their demand may be variable and unpredictable, as a means of achieving financial savings, productivity improvements and the wider flexibility that accompanies Internet-hosting of data and applications. The greater flexibility of a cloud computing service as compared with a traditional outsourcing contract may be offset by reduced certainty for the customer in terms of the location of data placed into the cloud and the legal foundations of any contract with the provider. There may be unforeseen costs and risks hidden in the terms and conditions of such services. This document reports on a detailed survey and analysis of the terms and conditions offered by cloud computing providers. The survey formed part of the Cloud Legal Project at the Centre for Commercial Law Studies (CCLS), within the School of Law at Queen Mary, University of London, UK. Funded by a donation from Microsoft, but academically independent, the project is examining a wide range of legal and regulatory issues arising from cloud computing. The project's survey of 31 cloud computing contracts from 27 different providers, based on their standard terms of service as offered to customers in the E.U. and U.K., found that many include clauses that could have a significant impact, often negative, on the rights and interests of customers. The ease and convenience with which cloud computing arrangements can be set up may lull customers into overlooking the significant issues that can arise when key data and processes are entrusted to cloud service providers. The main lesson to be drawn from the Cloud Legal Project’s survey is that customers should review the terms and conditions of a cloud service carefully before signing up to it. The survey found that some contracts, for instance, have clauses disclaiming responsibility for keeping the user’s data secure or intact. Others reserve the right to terminate accounts for apparent lack of use (potentially important if they are used for occasional backup or disaster recovery purposes), for violation of the provider’s Acceptable Use Policy, or indeed for any or no reason at all. Furthermore, whilst some providers promise only to hand over customer data if served with a court order, others state that they will do so on much wider grounds, including it simply being in their own business interests to disclose the data. Cloud providers also often exclude liability for loss of data, or strictly limit the damages that can be claimed against them – damages that might otherwise be substantial if a failure brought down an e-commerce web site. Although in some U.S. states, in E.U. countries and in various other jurisdictions the validity of such terms may be challenged under consumer protection laws, users of cloud services may face practical obstacles to bringing a claim for data loss or privacy breach against a provider that seems local online but is, in fact, based in another continent. Indeed, service providers usually claim that their contracts are subject to the laws of the place where they have their main place of business. In many cases this is a US state, with a stipulation that any dispute must be heard in the provider’s local courts, regardless of the customer’s location. Perhaps the most disconcerting discovery of the Cloud Legal Project’s survey was that many providers claimed to be able to amend their contracts unilaterally, simply by posting an updated version on the web. In effect, customers are put on notice to download lengthy and complex contracts, on a regular basis, and to compare them against their own copies of earlier versions to look for changes. The cloud computing market is still developing rapidly, and potential cloud customers should be aware that there may be a mismatch between their expectations and the reality of cloud providers' service terms, and be alive to the possibility of unexpected changes to the terms. Downloads Download the Full Paper Authors Simon BradshawChristopher MillardIan Walden Image Source: Natalie Racioppa Full Article
cloud computing Evaluating the Cloud Computing Act of 2011 By webfeeds.brookings.edu Published On :: Thu, 16 Jun 2011 12:00:00 -0400 Event Information June 16, 201112:00 PM - 1:30 PM EDTRoom SVC-209U.S. Capitol Visitor's CenterU.S. CapitolWashington, DC While research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter governments and private-sector firms from migrating to the cloud. Senator Amy Klobuchar (D-Minn.) has advanced discussion of the “Cloud Computing Act of 2011,” draft legislation that would address these challenges by encouraging the U.S. government to negotiate with other countries to establish consistent laws related to online security and cloud computing. The bill also creates new enforcement tools for investigating and prosecuting those who violate online privacy and security laws.On June 16, the Brookings Institution hosted a forum on the policy proposals in the Cloud Computing Act of 2011. Discussion included an overview of the international policy implications as governments and firms adjust to a coherent legal framework, changes and innovations in public procurement, and challenges for private industry as it balances consumer needs and compliance with these proposed cloud computing safeguards. After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20110616_cloud_computing Full Article
cloud computing Addressing Export Control in the Age of Cloud Computing By webfeeds.brookings.edu Published On :: Mon, 25 Jul 2011 10:58:00 -0400 Executive SummaryThe move to the cloud is one of the defining information technology trends of the early 21st century. By providing businesses, universities, government agencies, and other entities with access to shared and often physically dispersed computing resources, cloud computing can simultaneously offer increased flexibility, reduced cost, and access to a wider array of services. Cloud computing has also created a set of new challenges. For example, the issues of privacy and security in the cloud are well recognized and have been extensively discussed in the business and popular press. However, one critical issue that has received very little attention with respect to cloud computing is export control. In the broadest sense, export control relates to regulations that the United States and many other countries have put in place to restrict the export of various sensitive items, information, and software. There is an inherent tension between cloud computing and export control. While the concept of the cloud is centered on the premise of removing the need to track the details of data movement among various destinations, export control regulations are built largely around restrictions tied to those very movements. If cloud computing is to reach its full potential, it is critical for providers and users of cloud services to address its implications with respect to export control. It is equally important to adapt the export control regulations to reflect the increasing prevalence of cloud computing in a manner that preserves the ability of American companies to benefit from the efficiencies of the cloud while also ensuring that American national security and foreign policy interests are adequately protected. Downloads Download the Paper Authors John Villasenor Image Source: © Valentin Flauraud / Reuters Full Article
cloud computing Threats to the Future of Cloud Computing: Surveillance and Transatlantic Trade By webfeeds.brookings.edu Published On :: Thu, 17 Jul 2014 07:30:00 -0400 The first instance of “cloud” computing came in 2006, when Amazon released its Elastic Compute Cloud, a service for consumers to lease space on virtual machines to run software. Now, the cloud enables the transfer and storage of data around the world, in an almost seamless fashion. Using cloud services are a seamless experience from the consumer perspective. This ease of use obscures significant regulation from governments on both sides of the Atlantic. The Safe Harbor Principles is a framework that ensures that personal consumer data being transferred from the EU to the US is still subject to a level of security in compliance with the EU’s stricter regulation on data protection. US companies must be certified within this framework, in order to transfer consumer data outside the EU. A comprehensive data privacy arrangement that satisfies both sides of the Atlantic is necessary to preserve the free flow of data, and the resulting commerce, between the two regions. Speaking at the 2014 Cloud Computing Policy Conference, Cameron F. Kerry suggested that neither side of the Atlantic can afford to partition the Internet. Currently trade negotiators are assessing the viability including an update to Safe Harbor Principles as a part of the Transatlantic Trade and Investment Partnership (TTIP). TTIP and the Future of Trade The NSA revelations last year have only increased support for further regulation over the transfer of personal data in the cloud, especially in the European Union (EU). The revelations have also brought to light significant differences in the European and US conceptions of privacy. The ruling by the European Court of Justice on the “right to be forgotten” is a recent example of this transatlantic divide. In EU countries, citizens can now request Google to take down links from search results that lead users to potentially damaging information. There are several disputes that negotiators must first resolve. Europeans would prefer that American regulators take a more active role in cases where US firms are violating the Safe Harbor principles. EU officials have also indicated they would like to include a mechanism to send an alert if data were improperly shared with US law enforcement officials. The expansion of the codes of conduct within the cloud would serve as a major step towards finalizing TTIP. A European Commission Analysis finds that TTIP would inject about $130 billion into the US economy. Ultimately both the EU and the US have so much to gain that both nations must find a way to resolve these thorny issues. Kevin Risser contributed to this post. Authors Joshua BleibergDarrell M. West Image Source: © Fabrizio Bensch / Reuters Full Article
cloud computing Getting IT Right? How State Governments are Approaching Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 20 Jan 2015 07:30:00 -0500 Cloud computing is becoming omnipresent in the private sector as companies latch on to this innovation as a way to manage scalability, improve flexibility, and reduce cost. Analysts at IDC predict that, over the next six years, nearly 90 percent of new spending on Internet and communications technology will be on cloud-based platforms. Apple, Google, Amazon, Microsoft, and hundreds of smaller companies are positioning themselves to dominate the estimated $5 trillion worldwide market. While few companies will provide numbers, it is estimated that Amazon and Google may run as many as 10 million servers while Microsoft runs close to one million. In short, it is an innovation that makes a mockery out of Moore’s law. But, like all innovations, cloud computing has potential pitfalls. Public sector organizations in particular have had difficulty taking advantage of new technologies. The Heritage Foundation keeps a list over 50 examples of government ineptitude including $34 billion in fraudulent Homeland Security contracts, National Institutes of Health renting a lab that it neither needs nor can use for $1.3 million per month, and the Department of Agriculture wasting $2.5 billion in stimulus money on broadband internet. Technological ineptitude received special attention with the failed launch of the Healthcare.gov, the release of classified data from Edward Snowden, and the costly FBI virtual case file debacle. Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing. The Approach We have gathered and started to do a content analysis of the IT strategic plans for each state. For each plan, we performed a content analysis, which is looking for certain phrases or text within the IT strategic plan in order to have a structured way to understand the data. Details for our approach can be seen in our previous blog post. How States Are Implementing the Cloud We were not surprised to see a number of states preparing to study or embark on cloud computing. While some states don’t mention it (e.g. Alabama), most states are eagerly exploring it. For example, North Dakota’s plan talks about cloud computing as an integral part of the future and seven of its thirteen major IT initiatives are centered on preparation for transitioning to the cloud “where and when it makes sense”. Vermont puts itself squarely in the studying period. The plan describes that, “While the risks of enterprise-wide and cloud-based IT must be carefully managed, trends continue to just larger-scale operations.” Wisconsin also clearly lays out its view on cloud computing, writing that, “Flexibility and responsiveness (also) guide Wisconsin’s approach toward adoption of cloud services” and suggests that its version of a private cloud “…offers advanced security and service availability tailored for business needs.” West Virginia provides an equally balanced approach by requiring that only services with an acceptably low risk and cost-effective footprint will be moved to the cloud. In short, all of the states that are considering cloud computing are taking a thoughtful and balanced approach. The Good One of the most critical aspects of cloud computing is security and, without question, states understand the importance of good security. A good example of this is Colorado who designates security as one of its four “wildly important goals” and sets the target of “10 percent reduction in information security risk for Colorado agencies by close of FY15”. South Carolina echoed the same theme by asserting that security and confidentiality are “overriding priorities at every stage of development and deployment.” Connecticut’s plans explain the need to “continuously improve the security and safeguards over agency data and information technology assets”. The Bad Despite the interest in cloud computing, we were only able to find a single state (Georgia) that explicitly links governance to security and, to us, by extension to cloud computing. In Georgia’s plan, they start with the idea that “strong security programs start with strong governance” and then explicitly describe necessary changes in governance to improve security. We were, however, impressed with the seriousness that New York, North Carolina and Massachusetts took governance but it was difficult to find many other states that did. The Ugly Unfortunately the results on sourcing were dismal. While a few states (e.g. Kansas, Ohio, and Massachusetts) specifically discuss partnerships, most states seemed to ignore the sourcing aspect of cloud computing. The most ominous note comes from Alabama where they make a statement that innovation in the state is being stifled by a lack of strong personnel. While we have great enthusiasm for government to address cloud computing, some of the non-technical issues are lagging in the discussion. Good government requires that these items be addressed in order to realize the promise of cloud computing. Authors Kevin C. DesouzaGregory Dawson Image Source: © Fabrizio Bensch / Reuters Full Article
cloud computing How Cloud Computing Could Improve Your Quality Of Life | WIRED Brand Lab By www.wired.com Published On :: Wed, 23 Oct 2019 12:00:00 +0000 BRANDED CONTENT | Produced by WIRED Brand Lab with Comcast Business | While balance looks different for everyone, the common thread is more flexible time on employees’ own terms. Cloud computing may be the modern work/life balance solution and could significantly improve your quality of life. Full Article
cloud computing DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation / by Michelle Malcher By library.mit.edu Published On :: Sun, 11 Aug 2019 08:44:18 EDT Online Resource Full Article