Skip to main content

Home/ Internetni praktikum/ Group items tagged cloud

Rss Feed Group items tagged

donnamariee

BBC News - How the cloud helps firms cope with ups and downs of IT - 0 views

  • Imagine running a business where most of your customers arrive during two weeks of the year.
  • Welcome to the world of Doug Clark, the IBM executive responsible for the infrastructure that runs the website of the Wimbledon tennis championships.
  • Spikiness is a common problem in the information technology world. It refers to the surges in demand for computing power and information storage. Retailers suffer from spikiness. They expect their website to be swamped in the run-up to Christmas.
  • ...5 more annotations...
  • Instead of buying huge amounts of computing power and storage that may be unused for most of the year, companies can get what they need in a more flexible way.
  • IBM has allotted enough computing resources to cope with the surge during the tournament.
  • Cloud computing has another useful feature. Instead of being locked into long contracts, firms can buy their IT over much shorter time frames. It can even be metered. This is extremely useful for companies that are launching one-off projects or perhaps start-up firms that are not sure how successful they are going to be. Extra capacity can be bought online and paid for as needed. Zoopla is a UK property website which allows users to search for homes.
  • Zoopla uses Amazon Web Services (AWS), which launched in 2006 and is the biggest player in cloud computing.
  • Analysts at Tier1 Research estimate that just 2% of total spending on information technology is on cloud services. Daniel Beazer, a hosting and cloud analyst at Tier1 Research, said: "Most companies have been around for a lot longer than the internet and have systems that are decades old." "Mostly what they have works, just about, so why bother shifting it? The savings from virtualisation and the cloud aren't currently big enough to justify it," he said.
anonymous

Small Business Cloud Apps That Make Work Easier | Inc.com - 0 views

  • Protect yourself against data loss, security blunders, and--that real productivity killer--inefficiency.
  • For small businesses, cloud storage is affordable and frees you up from maintaining expensive physical servers that need upkeep. And it also makes accessing, updating, and sharing files—usually from any device—simple and fast.
  • And unlike Dropbox or SugarSync that back up only the files you tell them to, Code 42's CrashPlan software automatically backs up everything on your hard drive—as much as once a minute—and encrypts it all before it leaves your computer. It also lets you back up to other computers and attached external hard drives as well as access, update, and share your files from mobile devices.
  • ...4 more annotations...
  • Another useful feature is that CrashPlan keeps copies of all versions of your files and even those you have deleted.  This means, for example, that you can go back and retrieve a version of a PowerPoint presentation you were using last year if you decide you liked it better than a more recent one.  And if you've ever accidentally deleted or lost a file you know how aggravating and time-consuming it is to recreate it. That's not a worry with CrashPlan.
  • Many cloud storage services claim to offer online collaboration features but Mindjet Connect is different because helping people get work done together regardless of their locations is its forte, not some add-on function.
  • Huddle Sync, Huddle's enterprise file synchronization platform, is different from consumer sync tools because it was built to meet enterprise security and compliance requirements and uses learning algorithms and predictive technology to fully sync only certain files. Not only that but it keeps track of where company data is stored and who has synced what files, as well as provides full audit trails for every single file.
  • Huddle Sync is currently in private beta but you can register at the site if you want to try it out.
donnamariee

Technology in schools: saving money with cloud, open source and consortia | Teacher Net... - 0 views

  • largest elements of a school's budget,
  • with the role of technology as a teaching tool and in society at large growing all the time, the trick is delivering savings without damaging pupils' education or putting them at a disadvantage in the world outside school.
  • open source software,
  • ...7 more annotations...
  • The change is saving around £3,000 a year in licensing costs, according to the schools' ICT manager Phil Jones.
  • The school has also moved to open source for its virtual learning environment (VLE), now run through Moodle.
  • While open source has brought benefits in terms of flexibility, there is no doubt that the reduced cost is a major attraction, however. "ICT is always a big drain on a school budget, and any way we can save money is a massive help,"
  • Open source is also one of the solutions adopted at Notre Dame High in Sheffield, where it is used for email and management systems, as well as the school's VLE, again on Moodle. One of the advantages of open source is its flexibility, but this is only appealing if the school has the technical know-how to tweak it according to its needs
  • Changes in the educational landscape, such as the emergence and growth of federations, academy chains and clusters of headteachers working together, may resolve this in the future, but in the meantime the benefits of the external support that come from a proprietorial system may outweigh the savings of free software
  • "One of the risks is schools that go very heavily into open source end up with a system that is so bespoke only the school's technical manager can understand it
  • Technology in schools: saving money with cloud, open source and consortia
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Urška Cerar

BBC News - Evernote says security has been breached by hackers - 0 views

  • hackers
  • hackers
  • website
  • ...7 more annotations...
  • network
  • Twitter
  • It said user names, email addresses and encrypted passwords were accessed.
  • online personal organiser, with users able to save data such as video clips, images, web pages, notes and itineraries in an external storage system commonly known as the cloud.
  • The firm apologised "for the annoyance" caused by the breach, which it said is becoming "far more common" at other "large services".
  • Apple revealed a "small number" of its computers had been hacked
  • micro-blogging website Twitter announced it had been the victim of a security breach which compromised the accounts of 250,000 users.
Blaž Gobec

Everything you need to know about the internet | Technology | The Observer - 0 views

  • The internet has quietly infiltrated our lives, and yet we seem to be remarkably unreflective about it.
  • All of which might lead a detached observer to ask: if the internet is such a disaster, how come 27% of the world's population (or about 1.8 billion people) use it happily every day, while billions more are desperate to get access to it?
  • THE WEB ISN'T THE NET
  • ...8 more annotations...
  • So the thing to remember is this: the web is huge and very important, but it's just one of the many things that run on the internet. The net is much bigger and far more important than anything that travels on it.
  • On the internet, web pages are only one of the many kinds of traffic that run on its virtual tracks.
  • 5 COMPLEXITY IS THE NEW REALITY
  • 6 THE NETWORK IS NOW THE COMPUTER
  • 7 THE WEB IS CHANGING
  • But in fact, the web has gone through at least three phases of evolution – from the original web 1.0, to the web 2.0 of "small pieces, loosely joined" (social networking, mashups, webmail, and so on) and is now heading towards some kind of web 3.0 – a global platform based on Tim Berners-Lee's idea
  • For baby-boomers, a computer was a standalone PC running Microsoft software.
  • First, the companies (Yahoo, Google, Microsoft) who provided search also began to offer "webmail" – email provided via programs that ran not on your PC but on servers in the internet "cloud".
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
pina bitenc

The death of Web 2.0 is nigh | Technology | Technology | The Observer - 0 views

  • The death of Web 2.0 is nigh…
  • The death of Web 2.0 is nigh… Our lives were changed by Web 2.0 platform technology, but according to an industry watcher its days are numbered
  • Our lives were changed by Web 2.0 platform technology, but according to an industry watcher its days are numbered
  • ...9 more annotations...
  • The prediction of Web 2.0's demise was made by Christopher Mims, a technology commentator who writes for the MIT journal Technology Review. He started by typing Web 2.0 into Google Trends search engine
  • As it happens, Web 2.0 does mean something, even though the definition gets a bit fuzzy round the edges. It first appeared in 1999
  • if the internet itself was the platform on which Web 1.0 – the first version of the Web as a simple publication system – was built, then Web 2.0 was the platform on which new, innovative  applications could be built.
  • Online mapping systems
  • Image-hosting services
  • social networking services such as MySpace, Orkut, LinkedIn, Facebook and Twitter.
  • Cloud computing
  • So one way of looking at Web 2.0 is simply to say that it's "the web done properly"
  • The big question, of course, is what will Web 3.0 be like? And the answer, I suppose, is that if we knew that then we wouldn't be here.
metapavlin

Kim Dotcom: the internet cult hero spoiling for a fight with US authorities | Technolog... - 0 views

  • We want to show the world that we are innovators. We want to show the world that cloud storage has a right to exist. And, of course, when you launch something like this, you can expect some controversy. The content industry is going to react really emotionally about this. The US government will probably try and destroy the new business … you've got to stand up against that, and fight that, and I'm doing that … I will not allow them to chill me."
  • Megaupload was created initially as a service that allows you to send large files because email attachments had limitations … and that's still the case today. The popularity and initial growth was all around that. This was never set up with the intent to be some kind of piracy haven. If the US government says that we are a mega-conspiracy, a mafia that has created this kind of thing to be a criminal network of pirates, they're completely wrong … for them it was about shutting it down and dealing with it later on the fly. They are hacking the legal system."
metapavlin

Kim Dotcom announces Mega, successor to Megaupload | Technology | guardian.co.uk - 0 views

  • Kim Dotcom, founder of the banned Megaupload filesharing site, has announced a new version called Mega designed to sidestep the American laws under which he is being prosecuted for £175m worth of alleged online piracy, racketeering and money laundering.
  • The site would not use US-based hosting companies as partners in order to avoid being shut down by US authorities, Dotcom said.
  • Megaupload was shut down in January 2012 when New Zealand police helicopters swooped into Dotcom's mansion outside Auckland to seize computers and other evidence at the request of US authorities.
  • ...2 more annotations...
  • Users of Mega would be able to upload, store and share photos, text files, music and films, encrypt those files and grant access using unique decryption keys, Dotcom said. "You hold the keys to what you store in the cloud, not us," a statement on the Mega website said.
  • Ensuring that files are not pirated will be the job of content owners, a major change from Megaupload, which the US film industry says ignored illegal content and profited from it.
1 - 10 of 10
Showing 20 items per page