The Risk of Cloud Computing, Trust



There’s a lot of buzz these days about “cloud computing”. You may be asking yourself just what IS cloud computing? The concept is that you are not as reliant on your personal computer, but your applications and data are kept somewhere in the internet “cloud”. So for instance, I use google calendars and gmail for several things. All my calendar data is stored with Google. There are several backup services that work on the concept of online backups. This is a variation in a sense, for all of them you are relying on a server somewhere online to be where your applications or data are stored. Of course, I can hear it now, “I don’t know if I like that idea”. Yes, there are a lot of risks. Recently Charter Communications has been in the news for losing the contents of 14,000 email accounts. That should…


read deleted 14,000 email accounts. It’s not as if someone woke up one morning and didn’t know where they put them. Charter essentially removes the contents of inactive accounts from time to time and inadvertently dumped a bunch of accounts that were still active. How is this related to cloud computing? How many people do you know that rely exclusively on webmail? What if google announced that they had inadvertently deleted 14,000 gmail accounts (or calendar accounts, or google docs accounts?) That would put a lot of doubt over the idea of letting them manage our data in that great computing cloud online.

Yes, there are a lot of advantages to cloud computing, fewer resources are needed on the local pc side. (In other words you can use an ancient machine and as long as it’s able to access current web pages you can continue with your work.) If things work well you don’t have to worry about backups.

Go back and re-read that last sentence. “IF things work WELL… you don’t have to worry about backups.” I’m a little concerned that a company the size of Charter could have let something of this scale happen once, but it does remind me of this. When dealing with someone else’s data isn’t it best to be extremely cautious and do a non-destructive test to make sure that everything that you expect to happen will happen. Then once you’re convinced that everything is okay to delete you can do so.

Trust. Do we trust these companies to hold our data. For many people this comes down to privacy concerns. But I wonder if many companies are competent enough to be trusted to keep our data indefinitely.

Related Posts

Blog Traffic Exchange Related Posts
  • The biggest computer security vulnerability ever I talk quite a bit about computer viruses and computer security on this site. It's probably one of the bigger problems that I grapple with for my customers. Today I'm going to talk about the biggest computer security vulnerability there is. In fact, this is a general security vulnerability. It......
  • The Google Problem, or why I'm starting to use MSN and Yahoo more. This weekend has been a bit of an introspective for me on why google is still the primary search engine I use. I know, I've been a big "fan(?)" of google for quite some time, I've obviously incorporated many of their products into my pages and used Google for 99%......
  • Funny - list of reasons it doesn't pay to be "the computer guy"... I found this not too long ago at a techamok forum... copied here for convenience - not intended to slight the original author.... I only met my brother’s ex-girlfriend’s family once — the year they invited our family over to share Thanksgiving dinner. Since we were basically a group of......
Blog Traffic Exchange Related Websites
  • Make Free Phone Calls Anywhere in the USA with Google Voice, Gizmo, and Asterisk Update: The instructions here are no longer valid, because Google has since closed off inbound SIP calls into Google Voice. However, I have posted a new solution for making free phone calls with Google Voice, Gizmo, and Asterisk. I recently switched my GrandCentral account over to Google Voice. I fooled......
  • 85% of All Crimes Leaves a Digital Fingerprint It has been stated that 85% of all crime leaves a digital fingerprint in electronic devices. This may occur from an Internet intrusion, identity theft and traditional crime like murder. Computer forensics has aided in the investigation of these crimes. Computer Forensics is the use of specialized techniques for recovery,......
  • How to Protect Your Pension in the Credit Crunch As news of bank failures continues, and government officials are debating a $700 billion bailout plan, many consumers are starting to worry about the state of their pension plan. If you have it invested in the wrong stocks, you could end up losing it all, or at the very least,......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site