Share


Share

Share it !



share/bookmark
Showing posts with label Computing. Show all posts
Showing posts with label Computing. Show all posts

Cloud Computing And How It Can Impact Your Business


Successful business is done by groups, not individuals. It takes an entire team of people to efficiently create, test, and distribute products and services. So why are so many business programs on the computer designed to be only used by one person? Wouldn't it make sense to provide all the workers on a team with an option for real-time collaboration and the ability to access to the same set of resources and tools related to the project they're working on? Cloud computing allows the storage of information on a server that can be accessed by multiple users. There's many benefits to this system of computing. Some of these benefits include improved worker productivity, decreased expenses for users, and the ability to work from any device with Internet access.

Workers can save time using cloud computing therefore increase their productivity. Instead of working on documents and spreadsheets individually and then e-mailing them to coworkers asking for comments and criticisms, members on the cloud can receive real-time input and assistance from their peers who are working in tandem with them on the same file.

Hard drive space is both essential and expensive, and cloud computing can save its users a significant amount of money by freeing up room on users' computers. Large, important documents that once needed to be kept in a folder on a user's personal computer can now be stored on a server, leaving more room for other files that the user may need. There are no downloads required for cloud computing. Simply log into the network and store the desired files.

Since work is stored on a server and not on an individual's computer, project team members can access files on the cloud and work from any computer, phone, or tablet that has Internet access. This allows files to be edited regardless of their location, so if a user remembers they need to make a change to a document but they've already left their computer, it's possible to use another computer or a smartphone to open and edit that document.

Cloud computing can make life easier for business owners and employees. Although there have been skeptics of cloud computing who claim there's a number of security risks associated with the practice, these risks must be very minor or non-existent if companies as big as Amazon, Yahoo, Google, and Microsoft are cloud advocates. Proper safety measures can be taken by strictly limiting who has access to sensitive information, and this will all but eliminate any chance for security issues and allow users to improve work quality.




For more information about cloud computing development, visit Magenic Technologies who have been providing innovative custom software development to meet unique business challenges for some of the most recognized companies and organizations in the nation.




Cloud Computing - The Legal Issues Are Somewhat Cloudy in the Cloud


"Cloud computing" has become a very hot topic. For the uninitiated, "cloud computing" generally refers to providing access to computer software through an Internet browser, with the software and data stored at a remote location at a "data center" or "server farm," instead of on the computer's hard drive or on a server located on the user's premises. This is also referred to "software as a service."

Proponents of this approach claim many benefits, including lower costs, less need for on-site support and "scalability." "Scalability" means that the number of licenses and available resources can easily be adjusted as the need increases. Access can typically be provided to any computer with a browser and an Internet connection, but can be controlled through password protection and other measures. Proponents also argue that the cloud makes it easier to manage and push down software upgrades. Software as a service is usually provided on a fee for service approach that may result in cost savings compared to the traditional local area network. Think of it as somewhat like renting as opposed to owning.

Cloud computing is not a technology of the future, but is here today. Google, for example, uses this approach to provide its suite of business applications intended to compete with Microsoft Office. Google applications are provided free or at very little cost. Salesforce.com is one of the best known providers, providing customer relationship management ("CRM") software to a growing list of companies. IBM and Microsoft are also entering the playing field.

There appears to be little doubt that cloud computing is here to stay, and that it may indeed represent the future of information technology. There are many advantages and potential advantages to the cloud computing model.

That said, from a legal perspective, cloud computing raises a host of issues. Having spoken recently to several cloud computing vendors, there are some rather obvious questions. Perhaps the most obvious question is, "What happens if you lose my data?" The answers I was provided focused on technical and not legal issues, such as the back-up procedures provided.

Technical issues are important, and there are certainly technical issues that a potential customer may want to consider, such as maintaining a back-up on site, or a back-up through a separate vendor. These approaches might provide some real practical protection in the event of a catastrophic failure or bankruptcy at the primary provider. Other technical issues might focus on what happens when the relationship ends, whether happily or not. Is there another vendor that can provide the software and host the data? Will data have to be converted to a different format? If the customer decides to switch back to a local area network, will the terminals that have been used for cloud computing (which, I am told, can be very basic "low powered" machines) be of any use, or will a completely new network need to be installed?

Although technical solutions are a good thing, over twenty-five years of litigation experience have taught me that disasters do happen, even with fail-safe plans in place, and even with parties acting in complete good faith. And, I suppose, it is natural for a lawyer to focus on legal rights and remedies rather than technical solutions.

From a legal standpoint, cloud computing appears to raise a host of essentially contractual issues to be addressed by the parties' contract or licensing arrangements. There are also potential regulatory issues (ranging from privacy to export control issues), potential e-discovery issues, and certainly other issues that have not yet crossed my mind.

As businesses and their lawyers become more experienced with cloud computing issues, it is likely that a consensus will emerge as to how cloud computing issues will be addressed. Hopefully, purveyors of cloud computing services will be flexible and reasonable in addressing legitimate business concerns. However, given the prevalence of "standard" licensing in the software field (often on a shrinkwrap or clickwrap basis) and efforts to limit liability under any circumstances, there is some cause for pessimism.

All that said, here is a list of issues that one might wish to consider asking a vendor or otherwise considering in entering into a possible cloud computing arrangement:


What contractual obligation will you assume to protect my data? This could include reference to particular steps and procedures, including back-up obligations. The contract or license may specify a standard of care that the provider must meet.
What contractual obligation will you assume regarding uptime, if any? Will you provide any type of uptime warranty? Even if such a warranty is subject to a limited remedy, it probably would provide considerable incentive for the provider to limit downtime.
Most providers seem savvy enough to disclaim any interest in your data and will freely say -- in a sales setting anyway -- that "your data is your data." Well, that's good, but how do I physically get my data back at the end of the contract or if you go bankrupt?
What remedy limitations, if any, are in your terms? Are consequential damages excluded? Are total damages capped (such as to a return of fees paid)? Even if contractual obligations are assumed, if remedies are severely limited, the provider may be shielded from liability.
Where is my data going to be stored? Are you willing to agree that all my data will be kept in this location under specified conditions and at agreed security levels? This could be important for regulatory reasons, but also for reasons associated with meeting general customer confidentiality obligations or complying with privacy policies.
Have you inserted a forum selection clause into the terms? Many providers want to insist on litigating on their home turf (which often, it seems, is California), but that is rarely a happy instance for a customer.
How do I get out of this arrangement if you do not perform and what is my exit strategy? What rights do I have upon termination? What obligations do you have to assist in transitioning to a new vendor or back to a self-managed platform?

If you are considering going to the cloud, you should consider involving your business and technology lawyer early in the process. As stated, there are probably many other legal issues that have not even occurred to me. It is clear, however, that lawyers need to begin considering these issues, because cloud computing is clearly not going away.




John L. Watkins is a Shareholder of Chorey, Taylor & Feil, a Professional Corporation, a business litigation and business law firm in Atlanta. John has been a commercial litigator for over 25 years, and has handled a wide variety of cases. Currently, John's litigation practices concentrates on trade secret (including computer data misappropration), insurance coverage, corporate, shareholder, and commercial contract matters. Joh also negotiates and drafts sales contracts, non-disclosure agreements, and other business documents. John represents domestic and international companies or their U.S. subsidiaries. He has spoken frequently at public and private domestic and international seminars on various legal topics.

John graduated first in his class at the University of Georgia law school in 1982. He was named to the list of Georgia Super Lawyers in Business Litigation by Atlanta Magazine and the Journal of Law and Politicis. John is rated AV by the Martindale-Hubbell Law Directory, its highest rating, and 10.0 by the AVVO website, its highest rating. More information can be found at the firm's website, http://ctflegal.com, or its podcast page, http://ctflegal.blip.tv




Mobile Computing Security: Authorized Use Guidelines


As corporations find new uses for mobile computing platforms, it is important to remember lessons learned years ago when personal computers were first being issued as productivity aides. Providing guidance on what to do and not to do with the loaned equipment was a necessary step, do not turn off the anti-virus software, do use a strong password, be careful what you put into an email and who you send it to, and so forth.

The analog to authorized use is unauthorized use, corporate council can provide information on any liability associated with employee inappropriate use of a system owned by a firm and used primarily for business purposes. Review of the entire guideline by corporate counsel is a good idea.

Firms should give serious thought to any sensitive information to be involved in authorized use, the security of apps is an open issue and the risks to sensitive data should be carefully considered. The whole issue of configuration management of mobile devices is wide open, as apps are inexpensive and easily available, employees provided with a device for one purpose may consider the device to be personal property and use it as such.

Abuse of capabilities is also wide open, as use is in such an early stage of evolution, monitoring use is an important issue to gain understanding of typical user behavior and changes in that behavior. For example, social networks present challenges and opportunities that are not necessarily well understood and should be expected to change with unpredictable consequences. It wasn't that long ago that Instant Messenger raised concerns for the security Team, Twitter is a whole new world of ulcer generating concerns.

Financial apps that enable mobile banking and brokerage services present capabilities that have to generate real concerns, the lack of authentication and the resulting anonymous user creates a world without accountability, surely not a good thing.

Another early lesson worth remembering was that issuing a tome and expecting employees to heed it is a very naive expectation, the guideline should be brief and easy to understand, anything more needs other approaches to training and awareness.

As mobile computing creates an exciting new world with fantastic potential, there is a temptation to reject "the old ways of doing things", as great as that temptation may be avoiding it is essential. Lessons learned through previous hard knocks should be revisited and applied to this new paradigm.







A Beginners Guide to the World of Cloud Computing


Cloud computing has taken off and is now accepted in the business world as an viable and safe alternative to the traditional network server and hardware based IT Infrastructure. For some though the terminology can still be overwhelming to the beginner. In simple terms, Cloud Computing means your IT (information technology), your files and applications are stored in the 'cloud', another term for the internet, instead of being on your own network server hardware.

It can be a cheaper option for some businesses as you now no longer need to purchase applications, hard drives or back up disks or software every again. All of your data and files are stored on the 'Cloud' and rented through a cloud hosting provider.

IT as a Service on the Cloud

Moving IT infrastructure to cloud computing sees delivery of IT resources as services incorporating infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) over the internet. The advantages, beside the cost benefits of not need to constantly upgrade hardware, are that business operations tend to be faster, more flexible and highly efficient.

To access the 'Cloud' and all your data and applications, all you need is a cloud computer called a Notebook or Netbook and an internet connection with a cloud hosting service provider. You do not need expert technology knowledge or cumbersome computer hardware. If you can operate a lap top and a browser you can easily become a user of cloud computing.

A Cloud computing service provider allows for common business applications online, as mentioned above, accessed from a web browser. Business software and data are stored on the servers of your cloud host.

The Benefits of Moving to the Cloud

* Reduction in capital expenditure over the long haul (no need to constantly invest in new infrastructure)

* Increases business operations efficiency

While security and monitoring have been issues in the past with moving to the cloud, much of this is sorted out now with the military and Governments moving off hardware. This move has seen a dramatic maturation of cloud security. Security is becoming less of a problem as more larger companies move their entire IT infrastructure to cloud computing. It is still always a good idea to check with your cloud host or provider, what their back up and security protocols are and be satisfied you data and files will be in safe hands.




For more information visit the Cloud Computing Guide.




The Debate Over Public Vs Private Cloud Computing


Whenever discussing cloud computing systems, you will often hear mentions made to private and public clouds, along with debates over the comparative advantages of each. To the cloud technology novice, this entire private cloud vs. public cloud dispute can sometimes sound like it is being debated in a foreign language. The following article identifies the differences between public and private cloud computing, and explains their important differences in common terminology.

Defining Private Cloud Technology

To put it simply, private cloud technology is a type of architecture that is set up for a lone client (generally a large business). With this kind of arrangement, the provider controls the framework but enables the client to control data storage, as well as the manner in which it's transferred. It's this higher degree of customer control that makes private cloud technology popular with clients who happen to be particularly concerned about security.

Benefits of Private Cloud Solutions

By providing the customer additional control, the private cloud is able to eliminate many prospective security concerns. By shifting its existing IT system to the cloud, the client will be able to enjoy the conveniences of scalability, flexibility and better productivity, but has the ability to do so without having to sacrifice the accountability for data security that may be related to public cloud computing systems.

The Disadvantages to Private Cloud Technology

Possibly the biggest problem with private cloud services is that often the end user must purchase computer hardware, configure it, and be able to continue to maintain it. While the public cloud consumer can essentially buy a cheap, ready-from-the-box system that can be employed immediately, the private user has to commit substantial capital up front to get a system that will be hosted internally, and then continue to deal with its management going forward. So as to benefit from the increased security that comes with a private solution, this is the required trade-off.

Understanding Public Cloud Computing

Instead of the closed design in the private cloud, public cloud computing solutions are almost always available to the public. Consequently all users using the service manage their files, and utilize software and platforms from a shared network server. The cloud computing vendor handles all online security and control over data files and software.

Advantages of Public Cloud Solutions

In terms of flexibility, scalability, hassle-free operation, and cost-effectiveness, public cloud technology surpasses private cloud alternatives each day of the week. The ability to make use of all services, especially infrastructure, on a pay-per-use framework, and become rid of the problems connected to their routine management delivers what many business users point to as the greatest advantage of cloud technology.

The Drawbacks to Public Cloud Systems

As alluded to in the previous paragraph, weaker security is the main relative disadvantage in public cloud technology. That isn't to suggest that public services do not possess security - quite a few have fantastic procedures in place - however, for clients who deal in large amounts of very-delicate personal data (e.g. financial businesses), the very idea of entrusting this information to a third party can often be intolerable.

You Choose Which is Better! Public Cloud or Private Cloud Computing?

The answer to this specific question clearly will depend on the client's kind of business. While public cloud services would seem to have public options beat on most fronts, the point that they put the responsibility for guarding client's confidentiality in the hands of another party is not just unnerving, but can even cause legal problems in some areas.

To lay this particular round of the debate to sleep, if your business does not require an elevated amount of data security, then the public cloud option will be better to fill your needs. Should your company deal in privileged customer data, though, private cloud computing options will still supply you with much improved scalability, flexibility and ease of use, however you will wind up paying more to have greater security.




If you would like to find out more about how cloud technology can benefit you personally and professionally, visit Roy Valance's review of the top cloud computing companies!




What Is Private Cloud Computing (Dedicated Cloud Computing)?


One of the hottest phrases in technology today is private cloud computing and you might be scratching your head wondering what this is all about. This type of computing (also known as dedicated cloud computing), is not your standard type of Internet hosting. This type of hosting is so much more.

Private cloud computing is a type of Internet hosting in which a client leases an entire server that is not shared with anyone else. This type of service offers the client more flexibility because organizations now have full control over their servers. This level of control means the company has their choice of operating system, hardware and more. Private clouds are made up of a proprietary computing architecture that provides hosted services to a limited number of people behind a firewall.

With this private type of computing, corporate network and data center administrators become service providers that meet the needs of the individual or company. A company generally chooses dedicated computing because it allows them to operate their IT applications in a cloud, but they still have full control over data and resources.

Private cloud computing also offers a number of other benefits.

If there is an increase in demand on IT systems, private cloud can scale to meet these demands, which offers companies a level of elasticity that they would otherwise not have.
Organizations control their data, which ensures that all the information within the cloud is secure.
Computing capacity is reduced by giving higher-priority tasks more power during peak hours.
Companies enjoy reduced overhead because in a virtual data center, x86 servers and other related resources can be managed as a unit rather than separately.
Most IT professionals today realize that this type of computing is the future. By investing in this technology, they're helping their company prepare for the future.

No matter what you call it, private or dedicated cloud computing services are the future. Investing in this type of Internet hosting today can save your company money while ensuring that computing resources are used efficiently and that all information is secure.




Bryan Smith is the VP of Sales & Marketing at Expedient, a company specializing in cloud computing services. With Smith's years of experience in cloud computing, he has ensured that each dedicated cloud with Expedient operates at maximum efficiency. Smith's expertise has ensured that each client's data is secure at all times.




Top 7 Business Computing Mistakes


There is practically no one who manages their business manually anymore and I'd venture to contend that those who do simply won't stay in business. Computers are vital to business today but often they are taken for granted and thought of as glorified typewriters.

Computers store critical data that could devastate a business should it be lost. Below is a list of the things I see out there all the time that could spell disaster for any small or medium sized business. If any of it sounds familiar, it might be worth looking at your overall Information Technology strategy.

Not watching the fort (or not having it watched)

It happens - more often than you might think. Someone dutifully replaces the backup tape everyday only to find out (sometimes too late) that the backup never ran or that it failed. In the same vein, knowing about other problems that may be going on behind the scenes can help prevent data loss and downtime.

It is vital to keep an eye on logs or automate the system so that failures generate a service call for your service provider. The more you know about what's going on with your systems, the better chance you have of avoiding costly problems.

Failing to test restore

Without a doubt, a properly working backup can save your bacon in the event of hardware failure (hard drives always fail, it's only a question of when), virus infection, fire, and so on.

With that said, your backup logs may indicate that everything is hunky dory until you actually try to restore data. Only then do you find out that the data is unreadable or otherwise useless to you.

Not having a computer tech you can trust

There is a big difference in what computer techs can do for you. The typical CompTIA A+ Certified service technician can easily fix your home computer and will be an invaluable asset to you for other home computing needs.

In your business however, you want to have someone who understands networks, domains, business applications, web technologies, and all the pieces that fit together to make a business hum in the technological sense. They should also understand your business. This point shouldn't be taken lightly and shouldn't be based on hourly rates. A solid, and certified, business technician will save you money and downtime - without exception.

Not trusting your computer tech

Once you have the right computer tech, trust his or her advice. Your tech will have the experience and the know how to competently recommend the right strategy to solve a given problem. It may be more expensive than another solution or it may be less expensive. Either way, trust your tech to help you make the right decision.

Buying the wrong equipment

Trust me on this - there is rarely a place in a business for Windows Vista or XP Home versions. If there is only one computer and there will never be more, maybe. Otherwise there is no place and you'll regret the purchase eventually.

The same goes for many other hardware and software products that might be just fine in the home but don't belong in an office. Often it makes business sense and money sense to think about what you actually need before walking into the local business supply store and buying an off the shelf computer or network equipment. Trust your tech to help with this.

Using obsolete equipment

Computers and everything else on the network have finite lifetimes. While it makes sense to squeeze every day of lifetime out of a piece of equipment, there comes a time when it slows to a crawl and wastes precious time or support is no longer available for it and it becomes a security risk or downtime waiting to happen.

Ignoring free and low cost alternatives

So often a business will see a need for custom software and rush off and hire a firm to build that software from the ground up. The price tag for such ventures is often tens of thousands of dollars, if not more. As you might hear Kevin O'Leary say on CBC's Dragon's Den, "STOP THE MADNESS!"

So often there are open source or off the shelf software that will do much of what a small business needs and if it's open source, it can be modified to do the rest. Unlike the real world, in the computer world there is indeed such thing as a free lunch, and often it will be the best lunch on the menu!




Glen Bowes is a Microsoft Small Business Specialist, MCSE, and an A+ and Network+ Certified service technician. Glen is the owner of Bowes IT Solutions and he can be reached at (905) 378-1215 at http://www.bowesit.com




Home Computing in "The Cloud"


The trends lead me to believe the computing we do at home will soon predominately reside "in The Cloud." This means the applications we use and rely on everyday are not on our computer at home but in an application out on the Internet and accessed by your browser.

Move Yourself To "The Cloud"

Many folks have already made the move. Here are some of the typical things others have done and what you can do to make the switch yourself:



Use Google Docs as your basic productivity tools. Not only are they very effective and free tools, but they are on-line and available wherever you go (docs.google.com). You don't need to buy Microsoft Office or even download the free Open Office at OpenOffice.org. I find that on my six year old PC, Google Docs will launch an application (e.g., Documents, Spreadsheet, GMail, etc.) in The Cloud faster than I can launch a Microsoft Office product (e.g., Word, Excel, Outlook, etc.) on my PC. Also, there is freedom in not being tied to that one PC sitting someplace where you can't always get to it. A notebook works pretty well in this regard, but what happens when that notebook breaks or it goes missing? It kind of feels the same as when you lose your wallet or your keys. It does not feel good at all. With home computing in The Cloud, it is a problem to lose your equipment, but little of what you had been working on is lost.

Use Mint.com, Quickenonline.com or other online financial tracking programs. First, they are currently free. That is one big advantage. They are not as good, in my opinion, as an installed program such as Quicken, at least not yet. However, if you are doing nothing other than wanting to track your current balances to ensure your cash flow is positive (i.e., not overspending), then these look like great tools.

Use Facebook, LinkedIn or other social networking sites. These sites provide a powerful place to manage your social and professional life. This includes keeping in touch with family and friends and showing your photos, to staying networked with business associates and looking for that next big opportunity.

Get your news from CNN.com, USAToday.com or get more focused news of interest from more specialized sites. For example, I pour through consumerist.com and pcmag.com for practical information I can use every day.

Access "The Cloud" From Anywhere

Because I've moved much of my mainstream computing to The Cloud, I find I can access it from just about any PC and from my mobile phone. Having my Cloud in my phone, which can browse the Internet, is a phenomenal tool. If the Palm Pre or the iPhone were to work with my wireless service provider, I would upgrade and give up my trusty Motorola A1200.

Use "The Cloud" But Backup Your Critical Data

Do keep backups of your data, especially data you need to access your sites on the web.

For passwords I use Password Safe which is free from sourceforge.net. This way I have all my passwords in one place. Consequently, I also have all those key sites I access in this same place. (This, I discovered, was very handy when I changed my e-mail account recently.) I backup the password file everyday to The Cloud using IDrive.com. I also do a monthly backup of the password file to a USB drive which I keep stored in a fire safe.

Be Secure In "The Cloud"

The scariest part of moving to the Cloud deals with the protection of your privacy and with security of your information. I admit this still worries me a bit. Can I really trust Google? Or how about trusting QuickenOnline.com with my financial data? We hear about data breaches every day. Some hacker broke in and stole personal information from thousands of customers. I have been notified more than once that this has happened at a company with which I do business. I have free credit monitoring right now due to a recent incident at an investment company.

I have also been called by my bank asking about charges made to my credit card. They turned out to be fraudulent and the bank removed the charges from my account. What was interesting is that I had just downloaded my most recent bank transactions into Quicken. I did not see these fraudulent charges. I immediately did another download of my bank transactions. There they were, along with transactions reversing the charges. My bank had detected and responded very quickly to these illegitimate activities.

My confidence in reasonable security in The Cloud is based upon my doing business over the Internet since the early 1990s when the Internet opened to commercial sites. The examples with my bank and with my investment company have helped reassure me that they are proactively trying to minimize the risk of loss. There is no guarantee of security. However, it is not obvious that your risk of loss is any greater in The Cloud than it is anywhere else.

"The Cloud" Is Here And Advertising Will Pay For It

I do believe that what we know as personal computing is moving into The Cloud. In the near future we will have much less reliance on a single piece of equipment loaded down with lots of pricey software, much of which we will never use.

Of course, like the broadcast media for decades, this Cloud is driven by advertising. So just as we once watched TV for free, before cable, and still listen to radio for free, it looks like we are going to a personal computing Cloud paid for by advertising. The personal computer will be needed to access The Cloud, but your software applications and information will be in The Cloud and not on your personal computer.





Bruce Benson is a Software Development and Information Technology Consultant. He writes about: You Are Your Most Important Project Management Tool! at Project Management Tools That Work!

(c) Copyright - Bruce W. Benson. All Rights Reserved Worldwide.




The Pros & Cons of Cloud Computing, and is it Secure?


Remember, our simplified definition of cloud computing consists of shared computing resources that are virtualized and accessed as a service through an APL.

The Pros

1- Costs/capital expenditures

If cloud computing is right for your company, then major cost savings can be seen in buying and maintaining the needed infrastructure, support equipment, and communication costs. The vendors and/or service provider, who charge the users a utility or user type fee, own these costs.

2- Scalability

One of IT's biggest problem is the constant need to add more equipment to keep up with the growing demand of accessing, storing and analyzing information by both internal and external users. One example is in the data center where adding servers is a major cost issue (actually power for the data center is the number one issue, but it is related to the growing need for items like servers). Since cloud computing is virtual, one can expand or contract equipment/infrastructure as demands change.

3- Start - up

Since the cloud (theoretically) contains the infrastructure and applications, all one just needs to do is "dial" in to the cloud. One can start using applications immediately versus a customary installation, testing and then providing access to the appropriate user community. (Training is assumed to a constant.)

4- Business Applications

Again, the cloud (actually the vendors and/or service providers) through contracts (Service Level Agreements -SLAs) provides numerous business applications for any user who is their client. Again like scale, enterprises only need to know which applications they need to run their business and understand what is actually provided to have access to various business applications. (Training is assumed to be a constant.)

5- Flexibility

Since cloud computing is a virtual offering, a user has the flexibility to choose, on a regular basis, the applications, amount of bandwidth or the number of users by basically modifying his user contract and increasing or decreasing costs at a known rate or factor.

The Cons

1-SLA Agreements

This is the tricky and most important one. SLAs can be very involved and it really leaves the onus on the user to understand and define all requirements in specific detail, and more importantly understand what one is getting in the terms of support, performance, security, etc. A good example is quality of service; one should understand what is offered and what the recourses are if the specified quality is not maintained.

2-Performance

Performance guarantees are usually part of the SLA document, but I have singled this one out because it is critical to maintain the performance (uptime) one needs both for internal AND external users. Understand if the performance guarantee is defined as an average or just during peak times versus a "uniform" performance. If performance is compromised, it can impact many things including revenue and your company's goodwill.

3-Vendors

Not all vendors are created equally! Many vendors are claiming to provide cloud computing, but in reality, they are just providing a specific service, or a specific application or worst they are a middleman and provide no value-add at all. As I sated in my previous posting, one needs to understand the difference between cloud computing and hosted services or managed services or seemingly some form of virtualization. My best advice is to definitely get with reference customers and see if they model what you would like from the cloud.

4-Security

We all know that the internet has some security issues and since the cloud utilizes the internet coupled with applications infrastructure and support, users should be aware of the potential for new threats and increased risk exposure. It is important to include your firm's risk tolerance in any decision to move to cloud computing, as not all the security issues are understood, and new ones will arise.

5-IT Staffing

If one does utilize the cloud, then make sure one understands the vendor staffing that is available to support your needs and hundreds of others using their cloud. A number of vendors out-source staffing and some of the personnel may not be as good as your own internal organization. Ask the potential service provider if they have trained personnel to support the applications you request.

As I have always stated, know your strategy for your IT organization and your lines of business and weigh whether the "pros" out weigh the "cons" for going with cloud computing. Note that there are a number of advantages and disadvantages; do not be swayed by looking at cloud computing from only a cost-saving point of view.

In all probability the answer will be some thing in the "middle", i.e. some hybrid form of cloud computing.

As for security and cloud computing

In Forrester's article titled " A Close Look At Cloud Computing Security" by Chenxi Wang, Ph.D. Wang states "While cloud computing is able to deliver many benefits, organizations should not jump on the "cloud" wagon without a compelling business driver and a clear understanding of the security, privacy, compliance, and legal consequences. An effective assessment strategy covering these items will help you reach the ultimate goal: Make the cloud service work like your own IT security department and find ways to secure and optimize your investments in the cloud."

Forrester includes data protection, disaster recovery, and identity management as some of the areas under security and suggest that an audit of the potential cloud provider to see what level of security is actually provided.

As for compliance, the user should analyze how the cloud may or may not impact one's compliance requirements.

For legal and contractual issues, Forrester advises that one understands who owns/is responsible for what, between the user and the provider (the data, the infrastructure, etc.)

Another article by Network World's Jon Brodkin titled "Gartner: Seven Cloud - Computing Security Risks" he talks about seven security risk areas.

1. Privileged user access, sensitive data processed outside the enterprise.

2. Regulatory compliance, how does the cloud provider match your guidelines?

3. Data location, where exactly is your data housed?

4. Data segregation, understand that your data is "sitting" next to other's data

5. Disaster Recovery, what happens when there is an outage?

6. Investigating inappropriate or illegal activity may be impossible in cloud computing,

7. Long-term viability, what happens if your provider "goes away"?

Another article in Network World that reported on the RSA conference, and stated that the former technical director of NSA, Brian Snow is very concerned about vendors offering cloud computing from a security point of view. He is concerned about vendors not addressing current security issues and about new issues that cloud computing will create. Ironically another panelist was concerned about "Big Brother" listening in on cloud computing and how this might impact enterprises' privacy and compliance issues.

So to wrap up, the internet has security issues, and since cloud computing is in the internet, cloud computing will have those security issues, ones listed above, and ones yet to be discovered. It comes down to the risk profile for your corporation; what level of risk is right for your company relative to investing in cloud computing? Obviously part of the risk assessment depends on your type of company. If you are a financial advisor or in stock management where your intellectual property is basically the company then cloud computing as we currently know it is not right for you at any cost savings. If you resell ping -pong balls (no offense to ping- pong ball resellers) than the risk is relatively low and the savings from cloud computing outweigh the security and other considerations.

Have you conducted an adequate risk assessment before deciding to move to cloud computing?




Dick Lush http://www.firealarmmarketing.com or dick.lush@firealarmmarketing.com or phone 508-643-0411

Fire Alarm Marketing is a marketing and business development consulting team that focuses on product introductions, revenue generations, building partnerships and creating new opportunities and markets. We are a New England based company with more then 40 years of collective experience.




Pervasive Computing Technology - A Glimpse of the Next Generation Computer


What is pervasive computing? It all started in 1991 when Mark Weiser envisioned the next generation computer that weaves themselves into their environment. The next generation computers make themselves invisible and intuitive to use. Computers disappear into the background. If you're a Star Trek fan, think of the computers in this science fiction series, and you'll get the idea.

The term coined by Weiser, ubiquitous computing, is now synonymous to pervasive computing.

Computers as they exist today do not integrate themselves into our environment. You're aware of the fact that you're using a computer. The PC sits on top of your desk. You carry a laptop or pocket PC around. You need to acquire certain skills in order to use them, e.g. if you want to use a spreadsheet, you have to learn to use it.

Weiser envisioned an environment where computers are integrated into the environment in such a way that users are not even aware of the computers, or that they're using one. The computers disappear and become unobtrusive.

To illustrate the point, Weiser and his colleagues invented 3 types of devices: a tab, a pad and a board. The devices have no individualized association in they way that you associate a PC or laptop to a particular user, e.g. you can grab a tab and use it without having to figure out how you're going to configure or personalize it to your needs. A tab is a handheld device and can be easily carried around. You can use it to access your email, chat, or to pop up a reminder for you to ask a colleague to confirm next week's seminar if you run into him in the hallway. You'd have dozens of this in your environment.

A pad is kind of a digital version of a paper. You can spread it on your desk in the same way you spread papers on your desk.

The digital board replaces today's whiteboard. When a group of people gather in a room, the system detects that they belong to a project group and automatically downloads the previous discussion points on the board. You can write on the board using a digital pen while sitting a few meters away from it - just point and write.

Pervasive computing integrates computers and a smart environment, and blends them into the background. This technology is changing the way we work, live, and interact with each other.

Let's look at a few more examples of applications of this technology.

Cowboys on horsebacks herding cattle might one day become a feature of a bygone era as the introduction of virtual fences allows farmers to herd their cattle from the comfort of their homes. The virtual fence is downloaded to the cows by transmitting GPS coordinates to head-collars worn by the cows. The dynamic virtual fences are moved along desired trajectories. The collars are equipped with a Wi-Fi networking card, a Zaurus PDA, an eTrex GPS unit and a loudspeaker that transmits occurring sounds (for example, roaring tigers, barking dogs) when a cow strays from the intended path. This multi-disciplinary project, the brain child of a biologist, is made possible in collaboration with computer scientists.

Sensor technology can potentially play an important role in search and rescue operations by first responders, i.e. emergency personnel, such as firemen, paramedic, and police, who arrive at the scene immediately after an event (e.g. a fire, an earthquake, a building collapse) occurs.

Firemen wear tags to allow easy tracking of their movement in order to coordinate search and rescue operations more effectively. The firemen can be informed if a particular section of a building is found to be unstable and is about to collapse, and is directed to evacuate it immediately. A wireless vital sign monitor is attached to victims found trapped so that their condition can be monitored in order to ensure that they receive the appropriate medical attention as soon as they are rescued.

This non-invasive sensor monitors vital signs such as heart rate, oxygen saturation and serum chemistry measurements. The vital sign monitor helps the paramedic team determine which victims are in more critical conditions so that they can prioritize medical attention to more severely injured victims. The application and architecture required to support this emergency response application is being developed under the CodeBlue project at Harvard University, USA.

Wireless technology is also used in healthcare. The Arrhythmia Monitoring System (AMS) is a medical telemetry (telemedicine) system that makes use of wireless technology to monitor patients suffering from arrhythmia. Among the complications that arise from arrhythmia are the loss of regular heartbeat and subsequent loss of function, and rapid heartbeats.

AMS provides a means for healthcare professionals to continuously monitor a patient's electrical cardiac rhythms remotely even though the patient is not at the hospital. This technology allows patients to be in the comfort of their homes without jeopardizing their health. It is also useful for monitoring the heart functions of astronauts who are more susceptible to cardiac dysrhythmias when in space.

The examples illustrate the use of the technology in very different areas. There is no limit to the type of applications made possible by this technology. In the not too distant future, we will see this technology providing increased security, convenience, and ease of information access in our home and workplace.




Mazliza Othman is the author of "Principles of Mobile Computing & Communications". More information is available at http://PervasiveComputing.MazlizaOthman.com.




Security Challenges for Cloud Computing - How Prepared Are You?


Cloud computing is here, and has been embraced by many an organization. Cloud computing as defined by the US National Institute of Standards and Technology (NIST) is "a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." [1]. Cloud computing is basically about outsourcing IT resources just like you would outsource utilities like Electricity or water off a shared public grid. The cloud services options include:

Software as a Service (SaaS): Whereby the consumer uses the cloud provider's applications running on a cloud infrastructure and the applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email).

Platform as a Service (PaaS):Here the consumer deploys their own applications on the provider's infrastructure. This option allows the customer to build business applications and bring them online quickly they include services like, Email Campaign management, Sales Force Automation, Employee management, Vendor management etc...

Infrastructure as a Service (IaaS): The consumer has access to processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems; storage, deployed applications, and possibly limited control of selected networking components (e.g., host firewalls).

Cloud computing has become popular because, Enterprises are constantly looking to cut costs by outsourcing storage, software (as a service) from third parties, allowing them to concentrate on their core business activities. With cloud computing, enterprises save on setting up their own IT infrastructure which would otherwise be costly in terms of initial investment on hardware and software, as well as continued maintenance and human resource costs.

According to the Gartner report on cloud security [2], Enterprises require new skill set and to handle the challenges of cloud security. Enterprises need to see to it that their cloud service provider has most of "the boxes ticked" and that they have their security concerns addressed. Cloud computing being a somewhat a new field of IT with no specific standards for security or data privacy, cloud security continues to present managers with several challenges. There is need for your provider to be able to address some of the issues that come up including the following:

Access control / user authentication: How is the access control managed by your cloud service provider? To be more specific, Do you have options for role based access to resources in the cloud,? How is the process of password management handled? How does that compare to your organization's Information security policy on access control?

Regulatory compliance: How do you reconcile the regulatory compliance issues regarding data in a totally different country or location? How about data logs, events and monitoring options for your data; does the provider allow for audit trails which could be a regulatory requirement for your organization?

Legal issues: Who is liable in case of a data breach? How is the legal framework in the country where your cloud provider is based, visa vi your own country? What contracts have you signed and what issues have you covered/discussed with the provider in case of legal disputes. How about local laws and jurisdiction where data is held? Do you know exactly where you data is stored? Are you aware of the conflicting regulations on data and privacy? Have you asked your provider all the right questions?

Data safety: Is your data safe in the cloud? How about the problems of Man-in-the-middle attacks and Trojans, for data moving to and from the cloud. What are the encryption options offered by the provider? Another important question to ask is; who is responsible for the encryption /decryption keys? [3]. Also you will find that cloud providers work with several other third parties, who might have access to your data. Have you had all these concerns addressed by your provider?

Data separation / segregation: Your provider could be hosting your data along with several other clients' (multi-tenancy).. Have you been given verifiable assurance that this data is segregated and separated from the data of the provider's other clients? According to the Gartner report, its a good practice to find out "what is done to segregate data at rest," [2]

Business continuity: What is the acceptable cloud service down time that you have agreed with your provider? Do these down times compare well with your organization acceptable down time policy? Are there are any penalties/ compensations for downtime, which could lead to business loss? What measures are in place by your provider to ensure business continuity and availability of your data / services that are hosted on their cloud infrastructure in case of disaster? Does your provider have options for data replication across multiple sites? How easy is restoring data in case a need arises?

Cloud services providers have increased their efforts in addressing some of the most pressing issues with cloud security. In response to cloud security challenges, an umbrella non-profit organization called the Cloud Security Alliance was formed, some of its members include: Microsoft, Google, Verizon, Intel, McAfee, Amazon, Dell, HP, among others, its mission is "To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing" [4]

As more and more organizations move to the cloud for web-based applications, storage, and communications services for mission-critical processes, there is need to ensure that cloud security issues are addressed.

References

1. National Institute of Standards and Technology, N., Cloud Computing definition, I.T. Laboratory, Editor. 2009.

2. Gartner (2008) Assessing the Security Risks of Cloud Computing

3. Rittinghouse, J.W. and J.F. Ransome, Cloud Computing: Implementation, Management, and Security. 2009., New York: Auerbach Publications.

4. Alliance, C.S. Cloud Security Alliance. 2011; Available from: https://cloudsecurityalliance.org/.




About the Author

Mr. Thomas Bbosa, CISSP, is an Information Systems security Consultant and Managing Partner with BitWork Consult Ltd - ( http://www.bitworkconsult.com ) a leading East African IT security consulting firm, based in Kampala, Uganda. He is a certified Information Systems Security Professional (CISSP), with over 12 years Experience in the IT industry. He has been involved in various roles of IT infrastructure management and support, Information systems Security management & solutions deployment.




Get Your Head Into the Cloud: What Is Cloud Computing?


Everyone from the government, to large corporations, to small businesses and university programs are talking about Cloud Computing (the Cloud) these days, but just what is cloud computing anyway?

The National Institute of Standards and Technology, Information Technology Laboratory, an agency of the U.S. Department of Commerce, founded in 1901 as the nation's first federal physical science research laboratory, also known as NIST, is the government's authority on all matters pertaining to securing our nations information systems. According to NIST, cloud computing "is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This computing model promotes availability and is composed of five essential characteristics, three service models, and four deployment models."

Basically, cloud computing is a developing word that defines the expansion of many current technologies and computing methodologies into something new and different. The cloud divides application and information resources from the basic infrastructure, and the tools used to distribute them.

For organizations adopting this methodology, using the cloud improves cooperation, agility, scaling, and availability, and by improved and efficient computing practices, provide the possibility of cost reduction for the organization.

More precisely, cloud computing defines the use of a collection of services, applications, information, and infrastructure containing pools of compute, network, information, and storage resources. These mechanisms can be swiftly arranged, provisioned, implemented and decommissioned, and scaled up or down. This in turn provides for an on-demand utility-like model of allocation and consumption that is very beneficial to organizations.

From an information architecture viewpoint; there is much misunderstanding about how cloud computing is both like and different from existing models of computing; and how these likenesses and differences impact the organizational, operational, and technological methods to network and information security practices.

The solution to appreciating how this computing architecture influences security architecture are a common and concise lexicon, joined with a static arrangement of selections that can analyze cloud services and architecture, plotting them to a model of compensating security and operational controls, risk assessment and management frameworks, and ultimately to compliance standards that can be adopted by organizations choosing to utilize all the cloud has to offer.




Derek A. Smith is IT Security Manager, Consultant and Associate at a large Fortune 500 company. He is an expert at Information, Cyber, and Physical security with 30 years' experience in the security and law enforcement industry. To learn more visit Derek's website at http://www.Cybersecuritysamurai.com




Security and Cloud Computing


Cloud computing and its potential to offer powerful computing and data storage options to even bootstrapped small businesses at highly competitive prices have generated plenty of excitement in the industry. So much so, however, that critical questions regarding the security of the data stored "in the cloud" are often overlooked by its most enthusiastic adopters. It's understandable, given the heavyweight names behind some of the biggest cloud computing projects in the world. (Google Apps, anyone?) If companies like Cisco and Oracle are betting their futures and fortunes on cloud computing, surely that must mean that all the kinks have been worked out already, right? Or at the very least, security must be a top priority for them as well, given their zealous approach to network security in general, and we can all enjoy the trickle-down effect of their tireless efforts to firewall our data from any and all security breaches.

Right?

Well, yes and no. Cisco CEO John Chambers admitted as much in a speech he delivered in 2009 that, while cloud computing presents innumerable opportunities, it's also a "security nightmare." And with good reason. Some of the security issues that cloud computing providers must address in order to allay customer fears include:


Multi-tenancy issues. Cloud computing, by definition, involves shared data storage among a number of users spread across multiple companies and locations. Providers must be able to reassure corporate clients that users from another company will not be able to gain access to - accidentally or otherwise - their account and information.
Data loss and recovery. What happens in the event of a catastrophe that results in data loss? Does the provider have a rigorously and regularly tested backup solution to ensure data recovery? If a problem occurs in one client's account that results in data loss, does the provider have fail-safe systems in place to ensure that a devastating cascading effect doesn't occur that will lead to data loss among their other clients? What if the cloud computing provider goes out of business, is bought or taken over by another company, or declares bankruptcy? How will its clients be assured that their sensitive corporate data won't be lost in the transition or closure?
Storage and hosting information. Where is the data itself physically stored? Are the servers somewhere in Silicon Valley, Chicago, or Bangalore, India? Who provides the actual hosting services? If the host provider is a third-party, has the cloud computing provider properly vetted its credentials to ensure that they adhere to industry standards for data security?
Security tests and updates. How often is the software or platform updated? How often is it tested? During and after testing, does the provider have systems in place to ensure that any updates or tweaks not result in security breaches? You'll want to make sure that unauthorized users - from your company, your provider or a third-party - don't inadvertently gain access to your information.
Compatibility of different security policies. If your company has an established security policy regarding sensitive client and corporate information, does it differ from the policy offered by the provider? Is the provider willing to meet your internal standards of security? What about third-party companies with whom the provider does business and who may be involved in some way with the service? Will they adhere to your corporate standards as well?
Collaboration issues. One of the most appealing benefits of cloud computing is its ability to promote collaboration among its users, either with internal staff or external parties. Does the software or platform provider have systems in place to ensure that collaboration doesn't compromise security?
Human resource issues. Who within the provider will have access to your company information? Who is in charge of data security? Are they made available to you to discuss any concerns you may have? Can they adequately address your questions to your full satisfaction? What is their experience and background in corporate data and network security?
Downtime reports and frequency. How often does the company's servers experience downtime? Will they make their downtime reports available to you so that you can investigate the reliability of their network? Do they have systems in place to ensure that your data is secure and that no unauthorized users will have access to your account both during and after the downtime periods?
Cyberattack defense. It's inevitable that cloud computing is the next great frontier for cyberattackers salivating over the vast amounts of sensitive information concentrated in a relative handful of services, all available on the web. How does the provider plan to address potential cyberattacks, because it's only a matter of when, not if, they'll experience a hacking attempt on their network?

This list is just the beginning. The best cloud computing providers spend the majority of their waking hours - and I'd be willing to bet some of their dreaming hours, too - thinking about security issues and how they can be proactive in the face of increasing threats that can potentially compromise their clients' business and destroy the trust and faith that they've built with their audience. It's an ongoing conversation that we at Mothernode are excited to be a part of, and one that will be consuming our industry for the foreseeable future.




Ken Pearson
President
Mothernode, LLC
(800) 928-6055 x300
ken.pearson@mothernode.com
http://www.mothernode.com

Mothernode is a Software-as-a-Service (SaaS) business system that offers Small and Medium Business (SMB) a suite of powerful on-demand applications, components and expansion packs designed to streamline all aspects of operations. The software suite includes Salesforce Automation, Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), Order Fulfillment, Quoting and Proposals, Inventory Control Systems (ICS), Vendor Access, Invoicing, Performance Indicators and so much more.




Cyber Security Professionals - Necessities In The 21st-Century Computing Environment


The vast network of cyber-space presents - or, can harbor -- major threats to the security of personal computers; LAN and WAN networks; and wireless Internet networks. Trained computer networking specialists who are experts in cyber-security are needed to secure networks and computer systems for effective data storage and retrieval. Just as importantly, they are needed to secure the privacy and integrity of personal and corporate identities. These professionals can find work in private firms, in consulting, or at the state and federal government levels. Most individuals complete at least a bachelor's degree before working in the cyber-security field.

Hackers pose special threats to computer network security. These technology and networking experts use their insider information to grant themselves access to computer networks, without permission. Our modern computing environment is an open one, and individuals with systems and software knowledge - or, even, persons with the gumption to steal data or computing devices - can easily get their hands on very sensitive information.

Much information should be kept private, and serious damage can ensue if this information falls into the hands of hackers. One of the greatest risks to business computer and personal computer users who are working on unsecured networks is identity theft. A cyber-thief can use a personal or company address; financial and credit card information; or even a personal social security number to steal money from individual or corporate accounts. This is a serious crime - one with far-reaching consequences, including ruined credit records -- and increasingly easy to commit in today's open-computing, technology-heavy environment. Cyber-security professionals who are adept at designing secure, hack-proof information systems and networks are needed to win the fight against identity theft.

Spyware and viruses pose another threat to the integrity and security of computer data. Spyware is installed on a computer without the user knowing, and can collect personal data or interfere with computer applications or run-time. Viruses are computer programs that replicate themselves to infect the machines, often damaging files or even hard drives in the process. There now exist several types of anti-virus and anti-spyware software that can be installed on a personal computer or on networked office computers for low or no cost. Security professionals on IT repair teams might be trained in the use of this software. Some professionals might provide security consulting services to businesses and individuals, as well.

Skilled cyber-security professionals also know how to install and maintain firewalls. These pieces of software or computer appliances are security devices that monitor activity between networks - usually, networks with different levels of security and access. Firewalls might restrict permissions to various Internet activities or Web sites. The level of security firewalls provide on large business networks can be changed or altered by security administrators. There exist many types of firewalls, including network layers and proxy servers. Understanding what each type of firewall does, and when it should be applied are main responsibilities of a cyber-security student; typically, he or she will take several classes about firewalls to complete a network security degree.

Design and evaluation of secure computer network systems are special skills, in which cyber-security information systems professionals must be proficient. Secure network architecture is imperative in preventing hacking and threats to information integrity. Some cyber security professionals will be employed as business consultants, routinely evaluating system security software, and creating and testing secure network systems.

Finally, some cyber-security professionals might be employed to work on major projects and contracts where information privacy and integrity is vital. The U.S. Department of Defense or the Office of Management and Budget (OMB) in Washington, D.C., for example, need cyber-security specialists to create networks that will protect highly sensitive or classified data. Similarly, cyber-security specialists are needed in biology and scientific research centers, such as those found in universities and hospitals, to make sure data and findings remain secure. Specific federal regulations outline how these findings should be secured, so specialists can help these research centers stay compliant.

The field of cyber-security is a constantly evolving and important area of information systems science. Individuals pursuing an education in this challenging and lucrative field will be sure to find fascinating work and a lifetime of learning throughout their careers.




Potomac College, an adult learning school [http://www.potomac.edu/articles/adult-learner-college.php] with campuses in Washington, DC and Northern Virginia, offers a bachelors degree program in information systems, with a concentration in cyber-security. For more information, visit the school's Web site, www.potomac.edu.




Data at Risk: Mobile Computing, Apps and User Data


Mobile computing is a paradigm shift away from personal computers and their infrastructure toward very large flexible networks of loosely connected platforms. It has new platforms, operating systems, applications (apps) and exciting new approaches to old problems. As the paradigm shift gains momentum, the application of the technology expands to include areas never considered when the technology was designed. Risk mitigation requirements tend to be glossed over as the devices' ease of use, affordability, and accessibility compels use. Users are often naive regarding the risks to their information, enjoying the benefits of use without giving a lot of thought to potential dangers.

Mobile devices that do not require users to be identified and authenticated are said to have anonymous users. Anonymity is an issue because it is impossible to impose accountability for user actions or mediate access to resources based on prior granted access. In effect all of the mobile devices' assets are available to any anonymous user solely based on physical access to the device. Availability is important as the applications supported by mobile devices expand to include electronic commerce transactions and manage privacy-related data. The transparency of apps is an issue, apps that store sensitive information have been found that store the information in intermediary files that are shared with third parties without the knowledge or consent of the user originating the information.

Computing technology paradigm shifts have tended to ignore issues that would complicate or slow their acceptance, information security is a case in point. The shift to client server and wireless networking both had periods when protection requirements remained unaddressed and serious problems arose, Mobile computing is following a similar path, ignoring old lessons does not make them any less important, it simply means they have to be relearned. At this point protection measures are well understood, so the path to a secure solution does not have to be as painful as earlier experiences would indicate.

Ignoring previous generation protection measures has tangible benefits for the platforms. Administration is greatly simplified and significant processing and other overhead is eliminated, performance benefits. Measures associated with user aggravation are eliminated, improving the user experience and satisfaction, facilitating acceptance.

Mobile devices rely on the Internet for much of their communications, eavesdropping or hijacking Internet sessions are well understood and common attacks executed to steal data, encryption will defeat this attack, when the measure is used. The reliability of communications is an important issue as time-sensitive apps rely on it to complete revenue-generating transactions and to provide a satisfactory user experience for a variety of activities. We are quickly moving beyond the issue of dropped calls.

The lack of common protection measures is a non-trivial issue, raising risks thought to have been minimized long ago. Device theft to allow the thief to use the device for its intended purpose is giving way to theft for the purpose of access to specific data, often for packaging with other stolen data for sale to a customer with ulterior motives. Stealing address books for sale to spammers is a nuisance compared to data theft with the intention of large scale fraud or identity theft.

Corporate entities are making apps available to current and potential customers who have little to no insight into the apps, trusting the provider to address data security requirements that are outside the provider's requirements sets or concerns. As provider expectations evolve to business critical levels, satisfying customer expectations will increase in importance to providers, complicating requirements and demanding increasingly sophisticated apps.

Corporations are also making mobile devices available to employees as productivity tools, without giving serious thought to the corporate data that will ultimately be processed, stored or transmitted by the devices. Configuration management of mobile computing platforms is, at best, informal. The easy access to apps introduces risks each time a new app is introduced. Allowing, if not encouraging sensitive information to be used with the platform places that information with exposure to a largely undefined and poorly understood set of risks for compromise, loss of integrity, and non-availability.

E-commerce apps that manage payment transactions and information are of interest to the Payment Card Industry's Data Security Standard (PCI DSS). Where the host mobile device does not provide basic protection measures, compliance with the DSS is unlikely, raising a variety of serious questions. The value of information associated with the next generation of transaction processing apps is increasing, incentivizing execution of sophisticated attacks to steal the highest value assets.

We remain in the early days of malicious activities targeting mobile devices. At least one large scale attack of mobile targets has recently occurred, more sophisticated attacks are likely as the technology's use grows and attack strategies are perfected. Attacks using malware remain to appear, although there seems to be no serious technical impediment to their occurrence other than the lack of recognized algorithmic vulnerabilities available for exploitation.

The integration of mobile computing into architectures supporting business critical applications remains an unexploited opportunity. How long this is true is in serious doubt, replacing the desktop PC has compelling economic drivers -- it has to happen. Tying mobile apps into servers is already occurring on an experimental basis. This will raise the stakes significantly for tablets and the other evolving mobile devices. Corporate requirements for robust solutions will put pressure on technology providers to enable the safe expansion of the application of the platforms beyond messaging and e-commerce, which goes full circle back to resolution of conventional protection needs.

Whether mobile computing technology is "ready for prime time" in large scale applications remains to be seen. Clearly a large number of lessons need to be learned by app developers and architects regarding compliance with statutory privacy requirements as well as less formal user confidentiality expectations. Early adopter tolerance for problems that can be interpreted as technical glitches is unlikely to exist in production environments with large user populations and big company revenues.

Mobile computing is in its early days, the lack of meaningful protection measure for the information processes, stored, and transmitted by the platforms is a serious concern. Use of the technology for new applications without consideration of the risks by users and technology providers raises the likelihood and scope of potential damage to be inflicted by well thought out and executed attacks. The bell has rung, class is in sessions.







Smart Computing and E-Book Tips for College Students


Heading back to college has a new twist for students now, as they shift to e-readers instead of textbooks. E-books make sense when you consider that the typical student spends $300 and $400 per semester on textbooks while their electronic counterparts can cost 50 percent less.

But sometimes saving money through e-books can come at a cost.

According to online security company PC Tools, cyber criminals can steal someone's identity or financial information by downloading text books from unreliable websites. Other problems may occur as students share e-book files, laden with malware, that can infect your laptop or home computer when the reader is connected.

Students need online protection and security to safeguard their personal information and important assignments. Here are some tips to ensure everyday computing tasks are worry-free.

1. Hit the Books, Don't get hit in the Wallet. Cyber criminals can snatch your banking information over Wi-Fi or unreliable online networks while you're buying a book online. Don't log onto your finance accounts or enter monetary information online over unsecured networks and questionable e-book retail sites. Always buy from a reputable online retailer. Use secure University or approved wireless and LAN networks for any transactions involving credit card or other bank information.

2. Protect Yourself From Viruses & Infections. Sharing e-book files and other documents from thumb drives and other portable devices could spread viruses. You need protection on your computer when downloading e-book content. If you get infected, it can lead to loss of data, crashed systems and unreliable software programs. Getting your laptop fixed costs money, takes time and decreases your studying productivity and potentially could result in a loss of books and papers.

3. BYOP - Bring Your Online Protection. You spent hours on that important research assignment and now it's time to send it off. If you're using a public computer to submit class work, check to make sure it has antivirus software protection that is active. Even secure websites (https:) can result in simple keylogger theft of your password. Don't let all that hard work go to waste! And always back-up your homework, notes, assignments, and any purchased e-books that you may have on your hardware devices. Keep your backed up files away from your computer just in case something was to happen to your computer and you had to access the uncorrupted files.

4. Don't Crash the Party. More college students are relying heavily on their handheld devices. It is important to remember that, just like your computer, these devices need to be safeguarded against the risk of infection. Syncing up smartphones and PDA's through the internet could transfer malware that ends up crashing your devices. Always check your devices regularly to make sure they are up to date on all the software used to effectively run the programs.

5. Be a Safe Social Butterfly. Most social networking sites, like Twitter or Facebook, should require only your basic contact details (name, address and contact number) to register for their services. Always be cautious if a site requests too much information - you may end up with someone or something spying on your machine.

6. Avoid the Freshman 15. Don't pack on viruses and malware when you download music and movies. Downloading your favorite tunes and flicks from free file share sites can leave you vulnerable. PC Tools has products with behavioral protection to stop known and unknown (new) threats.

Following these tips will make you smarter online and improve your protection, safeguarding your personal information and important assignments.




Curtis Sparrer works for PC Tools as a media contact and reports on antivirus and antivirus protection issues around the globe. With several years of experience in the computer profession, he is one of the foremost voices on this subject in the United States.




Internet Security - Important For Safe And Secure Computing


The number of Internet users has increased significantly in these days. More and more people are now getting the benefits of the internet. But for the kids or for those who have just started using the internet the World Wide Web could be a scary place. There are various malicious objects that could infect your computer and can offer you many sleepless night if proper precaution is not taken. Cyber criminals, known as hackers employ new techniques to break into the computer of the users and steal their personal and sensitive information. To block them, you can consult an online computer repair company for remote tech support. In this article we are going to talk about internet safety tips so that you can enjoy safe and secure computing.

Social networking is now widely popular. This has brought a revolution in the way people communicate with friends and family. While using these sites, the user should be extra cautious. It is recommended not to add strangers to your list without knowing. You should also not give any personal information to anyone you meet online. These include your first or last names, phone numbers, passwords, birth dates or years. In addition, it is strongly recommended not to reveal your credit card information online.

For all your accounts, you should use strong passwords. Don't know what exactly strong passwords are? Well, strong passwords mean it should be at least greater than 15 characters and it should be a combination of CAPITAL as well as small letters and also special symbols.

There are viruses, spyware and other malicious objects flying on the web. Developed by the cyber criminals these tools are intended to harm your computer. While your computer gets connected to the Internet these malicious objects keep on trying to invade your computer. To block them, you should install an antivirus on your computer. There are tons of antivirus software programs available on the internet. Many of these are free while for some you need pay. You can pick powerful antivirus software and install and update it regularly. Remember, if the software is not updated on a regular basis, it will not be much effective.

Spyware is another common malicious object that sneaks into your computer and steal your personal information including your internet surfing habits. Remember, Viruses and Spywares are not same. So, there should be Anti-Spyware software on your computer. There are some of the antivirus software programs available in the market that have anti spyware built-in.

For the best protection, you need to install a firewall. This is very essential for a net user. A firewall blocks malicious objects and protect the systems on the network. Some of the popular firewalls are ZoneAlarm, SonicWALL, etc.




Computer repair New Zealand is a renowned remote tech support provider. It offers round the clock tech support to the computer users for fixing any and all types of PC issues.




Will Cloud Computing Crush Viruses from Catastrophic Calamity on Your Computer?


Will Americans be any safer from the coming cyber storm as Internet Technology evaporates into the clouds? Will users be safe from hackers with cloud computing? Will their data, identity, money, etc, be safe in the clouds? I wonder, I am very skeptical, but let's talk.

There was an interesting article recently in Homeland Security news which discussed the inherent safety of cloud computing running devices with no executable files, or ways for computer viruses to get in and load themselves onto the computer. The article was titled "Is Google's Chromebook impervious to viruses?" which was published 16 May 2011. Have you heard about the new laptops Google is planning, they will run on completely on the cloud, and without the need for Anti-Virus software - what about the computer anti-virus software industry the article asks? Good point indeed.

Now then, I have a question about all this; what about an internal challenge at the data center, or elimination of the data center due to a terrorist attack? What if a disgruntled employee puts a virus into that data center? The article also states I am not alone in my worries, "but, not all analysts are convinced that Google's Chromebook is as secure as they claim; this move to a cloud based computer could signal a broader shift that could hamper the antivirus industry's future prospects."

They Promise to Save Us from Cyber Pearl Harbor Attacks - But Can We Trust Them?

The US Government is also working on Cyber Security too. Yes there was a very interesting article in Physorg [dot] com recently titled; "White House unveils global cyberspace strategy" by Chris Lefkow posted on May 16, 2011, which states in the first sentence that they administration "unveiled a set of policy proposals Monday for international cooperation in ensuring an open and secure Internet," and in the article it stated that; "To date, the international community has lacked the collective willingness to engage in a meaningful conversation on the need for a global approach," he said. "US leadership is critical to reaching a consensus solution."

Can we really trust this Administration to protect the American People from Cyber Attack? No, absolutely not, say I, but let me explain my points of contention why. First, if the government attempts to move to all devices being on the cloud, and it can control everything (for reasons of security) then in essence they will create another "Great Wall of China" type scenario, basically eliminating any and all privacy - forever. As an American, well, you can understand I have a problem with all of this.




Lance Winslow is the Founder of the Online Think Tank, a diverse group of achievers, experts, innovators, entrepreneurs, thinkers, futurists, academics, dreamers, leaders, and general all around brilliant minds. Lance Winslow hopes you've enjoyed today's discussion and topic. http://www.WorldThinkTank.net - Have an important subject to discuss, contact Lance Winslow.




Will Cloud Computing Crush Viruses from Catastrophic Calamity on Your Computer?


Will Americans be any safer from the coming cyber storm as Internet Technology evaporates into the clouds? Will users be safe from hackers with cloud computing? Will their data, identity, money, etc, be safe in the clouds? I wonder, I am very skeptical, but let's talk.

There was an interesting article recently in Homeland Security news which discussed the inherent safety of cloud computing running devices with no executable files, or ways for computer viruses to get in and load themselves onto the computer. The article was titled "Is Google's Chromebook impervious to viruses?" which was published 16 May 2011. Have you heard about the new laptops Google is planning, they will run on completely on the cloud, and without the need for Anti-Virus software - what about the computer anti-virus software industry the article asks? Good point indeed.

Now then, I have a question about all this; what about an internal challenge at the data center, or elimination of the data center due to a terrorist attack? What if a disgruntled employee puts a virus into that data center? The article also states I am not alone in my worries, "but, not all analysts are convinced that Google's Chromebook is as secure as they claim; this move to a cloud based computer could signal a broader shift that could hamper the antivirus industry's future prospects."

They Promise to Save Us from Cyber Pearl Harbor Attacks - But Can We Trust Them?

The US Government is also working on Cyber Security too. Yes there was a very interesting article in Physorg [dot] com recently titled; "White House unveils global cyberspace strategy" by Chris Lefkow posted on May 16, 2011, which states in the first sentence that they administration "unveiled a set of policy proposals Monday for international cooperation in ensuring an open and secure Internet," and in the article it stated that; "To date, the international community has lacked the collective willingness to engage in a meaningful conversation on the need for a global approach," he said. "US leadership is critical to reaching a consensus solution."

Can we really trust this Administration to protect the American People from Cyber Attack? No, absolutely not, say I, but let me explain my points of contention why. First, if the government attempts to move to all devices being on the cloud, and it can control everything (for reasons of security) then in essence they will create another "Great Wall of China" type scenario, basically eliminating any and all privacy - forever. As an American, well, you can understand I have a problem with all of this.




Lance Winslow is the Founder of the Online Think Tank, a diverse group of achievers, experts, innovators, entrepreneurs, thinkers, futurists, academics, dreamers, leaders, and general all around brilliant minds. Lance Winslow hopes you've enjoyed today's discussion and topic. http://www.WorldThinkTank.net - Have an important subject to discuss, contact Lance Winslow.




Is Your Online Computing Safe?


The Internet has given us many wonderful resources and opportunities. We are now able to buy anything and everything because of the Internet and we are able to find out information on any subject imaginable. You can do your banking on the Internet, you can work all over the world thanks to the Internet, and you can book a holiday and lots of other amazing things.

With the greatness of the internet comes problems as well. There are many people on the Internet who would love all the information you put into your computer. Information such as your passwords, your bank account information and other personal information.

There are many ways to be safe when using the internet and if you follow the information below carefully.

o Never give out your personal information to anyone and protect your information

o Always be careful when dealing with people over the Internet

o Keep you firewall ion and updated and always use software that protects your computer from spyware and viruses

o Use different passwords and protect them all

o Keep backups of all your important files

o If something happens while online, make sure you know who to contact for help

There is a special publication available to download from the FTC called Stop, Think, Click. This publication tells you all about keeping your computer safe when online. If you want one please visit OnGuardOnline. You can also keep up to date with safety alerts on the Internet ctively protect your information, your computer and keep you safe from Internet fraudsters.

There are lots of information portals ion the Internet to keep you safe while using your computer.

o GETNETWISE is a great service that is actively sponsored by large Internet companies and public interest organizations to help you stay safe online and teach you new practices and give support.

o Internet Keep Safe Coalition is a great resource for all people using the Internet to help them stay safe and protected.

o National Cyber Security Alliance is another non-profit resource to help all Internet users stay safe while surfing the Internet.

o Stay Safe is a great educational resource for Internet users that has tools, information and lots of great tips for looking after your computer and staying safe while using the Internet.

o Wired Safety is a group dedicated to provide lots of resources on Internet safety. They teach people and make them aware of cyber-crimes and possible abuse, keeping safe and promoting general safety when using the Internet.

If you are using social networking sites such as MySpace and Xanga are great ways to keep in touch with friends. Many teenagers and children love using these sites, but beware of sexual predators that pose as other people the same age. Keep your children safe while online by visiting onguardonline.gov and show them what to look for and what to report.




Writer and author, Cheryline Lawson in conjunction with Fernando Reyes, who is an Internet Marketing guru and expert in a variety of fields including finance invite you to find out more by visiting the website at http://crowleybiz.com/computer