Spotting Cloud Formations

Adams, John
August 2010
Bank Technology News;Aug2010, Vol. 23 Issue 8, p25
Trade Publication
An interview with a group of technology analysts and financial professionals is presented. They discuss the safe use of cloud computing for the future adoption as it depends on bank's confidence in systems and data security as well as the user authentication. They elaborate the literal limitations of cloud computing and how one could get the providers attention in a multi-tenant environment.


Related Articles

  • Summarizing the 2014 State of the Cloud. KOVALICK, AL // TV Technology;10/1/2014, Vol. 32 Issue 21, p26 

    The article discusses the key findings of a report which is a survey of technical professionals on cloud computing. Topics include levels of experience of the respondents, hybrid cloud implementation, and a table showing the change in Challenges like security and compliance with Cloud Maturity...

  • A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment.  // International Journal of Computer Applications;Dec2010, Vol. 12, p19 

    The article proposes a data protection framework which authenticates, verifies and encrypt data transfer to maintain data confidentiality in cloud environment. Data protection is a critical issue in cloud computing since it has no boarders where data can be physically located in the world. This...

  • SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL. PEELUKHANA, RAVIKIRAN; SHANTHI BALA, P.; AGHILA, G. // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 4, p2857 

    The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required....

  • Alliance Develops Five New Security Models. Stewart, Jackie // American Banker;4/9/2012, Vol. 177 Issue 54, p6 

    The article announces the information technology consortium Open Data Center Alliance developed five security usage models and released an overview document about identity management in cloud computing.

  • What's at stake in the cloud? Hayden, Michael // Hill;10/5/2011, Vol. 18 Issue 135, p32 

    The author reflects on the federal strategy to implement cloud-computing solutions in the U.S. Government, wherein he notes the transition to cloud computing will give a chance for the government to change the blemished security paradigm.

  • Put Your Head in The Cloud. Stanbridge, Dean // Pest Management Professional;Apr2012, Vol. 80 Issue 4, p68 

    The article offers information about cloud-based technology which ensures data security.

  • Getting your head out of the clouds. OKURA, PAUL // Westchester County Business Journal;9/5/2011, Vol. 47 Issue 36, p15 

    The article looks on the risks and pitfalls of cloud computing, while it has several benefits, which include data security, application performance, and budget impact.

  • 30 seconds on...  // SC Magazine: For IT Security Professionals (15476693);Apr2014, Vol. 25 Issue 4, p16 

    The article discusses various ways for companies to evaluate third party providers including asking questions, checking the authentication on providing proper implementation and using deductive reasoning for avoiding breach that might cause business interruption, brand damage or sanctions.

  • Transformation from Identity Stone Age to Digital Identity. Kohli, Mohit // International Journal of Network Security & Its Applications;May2011, Vol. 3 Issue 3, p121 

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed Technological...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics