Welcome!

@CloudExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan, Zakia Bouachraoui

Related Topics: @CloudExpo

@CloudExpo: Article

Opinion: Cloud Computing Makes Me Nervous

Alan Patrick, too, is equally amazed at what people are sleepwalking into

Ian Betteridge's "Technovia" Blog

Maybe it's because I'm old, but cloud computing makes me nervous. I remember the Apple "1984" ad not just because it was a great piece of work by Ridley Scott, but also because of its underlying message. And that message was simple: monolithic computer systems supplied by monolithic suppliers aren't a good idea for individuals.

Cloud computing is a return to the dark ages of the 1960s and 1970s, when all of your most valuable things - your data - sat on a big server somewhere. You accessed it from a simple terminal, but only so long as you paid IBM or whoever to process your data. While you owned the data in theory, in practice you were at the mercy of your supplier.

Alan Patrick, too, has been around the blocks a few times, which is why he is equally amazed at what people are sleepwalking into:

"I've been reading some of the comments on other blogs about this with a mounting sense of wonder at the sheer naivete of some users. For anything that is important: Firstly, always plan for redundancy in your systems - have an online and on computer service that are synched. Secondly, do frequent backups to a 3rd source. Thirdly, if its important, pay for it. Ad funded services are responsive to the advertisers, not to the users - its that pipers / tune thing."

If you use Google Documents exclusively you are taking a serious risk that one day Google will lock you out of your data. I'm not impugning anything about Google here - they may, indeed, plan to "do no evil". But you are relying on their good grace, and that should make you nervous.

Own your own documents - keep them on your hard drive, and on a seperate drive or two as well. Use Google Documents as a backup, not your only storage.


[This post appeared originally here and is republished in full with the kind permission of the author, who retains copyright.]

More Stories By Ian Betteridge

Ian Bettridge blogs at Technovia - a blog on technology, science and culture - and at The Metaverse - a spin-off from Technovia about virtual worlds in all their forms, including Second Life. He's been a journalist and writer for over ten years professionally, mostly working in the field of technology.



Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).
SUSE is a German-based, multinational, open-source software company that develops and sells Linux products to business customers. Founded in 1992, it was the first company to market Linux for the enterprise. Founded in 1992, SUSE is the world’s first provider of an Enterprise Linux distribution. Today, thousands of businesses worldwide rely on SUSE for their mission-critical computing and IT management needs.
Mid-sized companies will be pleased with StorageCraft's low cost for this solution compared to others in the market. There are no startup fees, our solution has a predictable monthly cost, highly competitive pricing and offers ongoing value for our partners month after month. By enabling pooling and StorageCraft's 30-days of free virtualization the company removes several concerns surrounding machine size management and disaster recovery testing costs that add to the complexity of implementing a disaster recovery solution. In addition, their One-Click orchestration makes it simple to recover when needed, as all the work to setup a network and different connections is already complete.