Skip to main content

Home/ Groups/ Cloud Computing
1More

Scalr 1.1.0 - getting in touch - Part I « Bosom of Abraham - 0 views

  •  
    Scalr 1.1.0 - getting in touch
1More

InfoQ: Securing A Cloud Infrastructure - 0 views

  •  
    George Reese discusses the number one challenge faced by cloud computing - security. He discusses transparency, credential management, and identity management, intrusion detection, perimeter security, compliance, and the "biggest security hole in the cloud - the custom Web application."
1More

Gellman: "Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Comput... - 0 views

  •  
    This report discusses the issue of cloud computing and outlines its implications for the privacy of personal information as well as its implications for the confidentiality of business and governmental information. [...] The World Privacy Forum is a non-profit public interest research and consumer education group.
1More

Cavoukian: "Privacy in the Clouds - a White Paper on Privacy and Digital Identity: Impl... - 0 views

  •  
    Informational self-determination refers to the ability of individuals to exercise personal control over the collection, use and disclosure of their personal information by others. It forms the basis of modern privacy laws and practices around the world. [...] At the Office of the Information and Privacy Commissioner of Ontario (IPC), we have long advocated a strong role for individuals in managing their personal information, not just by exercising their privacy rights under Ontario law, but also by becoming better informed and using privacy-enhancing technologies (PETs). [...] This paper explores what will be possible if proper digital identity services are deployed and the full power of Cloud computing is realized.
1More

Youseff et al: "Toward a Unified Ontology of Cloud Computing" (PDF, 2009) - 0 views

  •  
    Towards the end-goal of a thorough comprehension of the field of cloud computing, and a more rapid adoption from the scientific community, we propose in this paper an ontology of this area which demonstrates a dissection of the cloud into five main layers, and illustrates their interrelations as well as their inter-dependency on preceding technologies. The contribution of this paper lies in being one of the first attempts to establish a detailed ontology of the cloud.
1More

Susan W. Brenner: "The Fourth Amendment in an Era of Ubiquitous Technology" (PDF, 2005) - 0 views

  •  
    The physical and informational barriers we once used to differentiate between our "private" and "public" selves are being eroded by technology, and the erosion is accelerating. If we persist in utilizing a zero-sum, spatial conception of privacy to implement the Fourth Amendment, we will render it ineffective as a guarantor of privacy in the face of arbitrary government action. If we continue along this path, the Fourth Amendment will become, in effect, an artifact - a device that protects against a limited class of real-world intrusions (which will become increasingly unnecessary given the other alternatives).
1More

Communications-as-a-Service (CaaS) - 0 views

  •  
    Communications-as-a-Service (CaaS), a hosted on-demand model for adding communications capabilities to applications and services without up-front capital costs.
1More

IntelePeer - 0 views

  •  
    IntelePeer Inc., showcase Communications as a Service (CaaS) Voice 2.0 innovations at the ITEXPO
1More

Open Source Is Key to Cloud Computing: Yahoo! SVP | Search Journal - 0 views

  •  
    Exclusive Q&A with Shelton Shugar, SVP Cloud Computing, Yahoo! Ultimately, we believe that advancement in cloud computing technology will be driven by open source initiatives where large communities of engineers can collaborate and develop new code for the new applications and demands posed by the cloud model
« First ‹ Previous 341 - 355
Showing 20 items per page