Thinking about Cloud Computing raises some concerns. Security is one concern that looms in many minds. What are some issues and how can we get our minds around the pitfalls before they happen?

 

"Lots of vendors have run into trouble with their cloud services, but the challenges faced by Apple last week should give some IT shops pause as they evaluate cloud computing.  

People would be reaming Microsoft a new one but because it's Apple ... they get a pass

Gordon Haff, cloud strategist, Red Hat

Apple's iCloud is a synchronization service that lets users keep data stored on their iPhone, iPad, iPod Touch and Mac products in synch. As 20 million or so end users launched the service for the first time, it didn't work as expected, and the backlash has been significant. 

Siri, a cloud-based voice activation service unveiled with the iPhone 4S, has run into problems as well, according to Apple support discussion boards. It is supposed to let users control maps, call up recipes, arrange meetings and send messages, all via their voice. Artificial intelligence researchers have been working on this technology for decades. So it's not surprising that Apple hasn't got it right first time." (from "Why trust Apple in the cloud?", at TechTarget)

Views: 64

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

QCon London 2026: Tools That Enable the Next 1B Developers

At QCon London 2026, Ivan Zarea, Director of Platform Engineering at Netlify, discussed the impact of AI on web development, noting a surge in non-traditional developers among the 11 million users on the platform. He presented three pillars for developer tools: developing expertise, honing taste, and practicing clairvoyance, emphasizing the need for thoughtful architecture in a evolving landscape.

By Daniel Curtis

Uber Launches IngestionNext: Streaming-First Data Lake Cuts Latency and Compute by 25%

Uber launches IngestionNext, a streaming-first data lake ingestion platform that reduces data latency from hours to minutes and cuts compute usage by 25%. Built on Kafka, Flink, and Apache Hudi, it supports thousands of datasets, enabling faster analytics, experimentation, and machine learning workloads globally.

By Leela Kumili

Podcast: [Video Podcast] Agentic Systems Without Chaos: Early Operating Models for Autonomous Agents

In this episode, Shweta Vohra and Joseph Stein explore what changes when software systems start planning, acting, and making decisions on their own. The conversation distinguishes truly agentic use cases from traditional automation and looks at how architects and engineers should think about boundaries, orchestration, and system design in this new environment.

By Joseph Stein

AWS Load Balancer Controller Reaches GA with Kubernetes Gateway API Support

AWS shipped GA support for Kubernetes Gateway API in its Load Balancer Controller, dumping annotation-based configuration for type-safe CRDs with proper validation. The release handles both L4 (TCP/UDP via NLB) and L7 (HTTP/gRPC via ALB) routing through the Gateway API spec. Teams get cross-namespace routing, automatic certificate discovery, and role separation without cluster-admin permissions.

By Steef-Jan Wiggers

Presentation: Panel: Security Against Modern Threats

The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond basic scanning by adopting a zero trust mindset toward CI/CD pipelines and external dependencies.

By Sonya Moisset, Andra Lezza, Stefania Chaplin, Celine Pypaert, Emma Yuan Fang

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service