February 6, 2013 Cloud News Report: Top Three This Week in Cloud

February 6, 2013 by Diana Nolting

Appearing each Wednesday, this Cloud News Report will compile our top three favorite cloud news stories from the past week.

The delusions that companies have about the cloud

Cloud can be a volatile subject. In this editorial article on GigaOm, the former president of enterprise at Google, Dave Girouard, doesn’t mince words as he tries to direct any individuals who still have doubts or misunderstandings about cloud by knocking down each pillar of doubt one at a time.  This article is an easy read that captures a lot of interesting stories and information that everyone can enjoy and includes some passionate commentary to follow-up the editorial piece.

To read the full article, click here.                                         


The Future of Higher Education and Cloud Computing

An industry-targeted article about the future of cloud in higher education, this Edudemic article highlights many benefits of cloud for universities as well as addresses some common concerns.  The article states cloud can help accommodate the rapid rising mobile device dependency rate, help mitigate big data concerns, and help streamline the admissions and enrollment processes. The statistics cited in this article position colleges as a bit behind other industries, with only 6% currently maintaining cloud-based technologies, but 28% are implementing those technologies currently and 29% plan to adopt cloud in the future.  32% are still in the discover phase.

To read the full article, click here.           


Navigating the Security Maze for Cloud Computing

Security is a top concern for many, if not all, cloud users. This wired article focuses mainly on how your SLA can impact your security.  The author cites and links to a whitepaper by the Cloud Standards Customer Council end-user advocacy group with 10 steps to security success. Among others, a few highlighted steps mentioned are: auditing operational and business processes, managing people, roles and identities and enforcing privacy policies.

To read the full article, click here.