Cloud-Based Storage of Secured Info Increasing

   According to a survey conducted by the Ponemon Institute and Thales e-Security, using cloud-based data storage for secure info is nearly becoming the norm. Approximately half of the respondents from this survey of 4000 IT pros in seven countries stated that they do use cloud storage for their sensitive data. This approach has several pros and cons - in the positive there is the fact that data storage space is not a local necessity and maintenance is performed off-site as well; however, in the negative secure data is typically something which is encrypted and that requires encryption keys which means said keys lie in several hands. Therefore, in order for someone to use cloud-based encryption one must trust the encrypting entity completely meaning that it is imperative to only use completely proven and trustworthy vendors for any cloud-based encryption services.

Supercomputing is Being Made Affordable

 

 

   The overall cost of producing and acquiring computer equipment has been decreasing over many years and this is also true in the realm of Supercomputing. Supercomputers were once on a level far outside the reach of even many large corporations due to costing hundreds of millions of dollars; but, that has changed due to technological advances as well as cost reduction and Supercomputing power can be rented at levels as low as around $1000/hour. A company called Cycle Computing provides such services on several levels allowing companies to avoid the multi-million dollar cost of actually building their own Supercomputer. This way, the massive power of a Supercomputer can be utilized on an as-needed basis as opposed to maintaining a high cost mega-machine on a regular basis.

83 million Facebook Accounts are Fakes and Dupes

 

 

 

   People should be aware of that creating a Facebook profile for your pet is actually a violation of Facebook's TOS (terms of service) and they can remove that account from public view. The roughly 83 million fake accounts consist of such things as people's pets or companies having actually created accounts as opposed to just creating a page. Resolvecomputer.com has a Facebook page which is what a website is supposed to do as opposed to having an actual account. The idea is to keep it real that is Facebook is about showing your face, showing the real you have use a fake name that puts you in one of the categories that exist among the 83 million that Facebook is attempting to categorize and rectify.

3-D Printing Has Come a Long Way

 

    The three-dimensional printer was initially something used primarily by industrial and architectural engineers to create prototypes. This, however, has changed. Two to three decades ago 3-D printing was primarily a thing used to create prototypes because it is complex technology and was considered very complex back in the 1980s. Due to advances in technology enabling the use of high-performance materials 3-D printing is actually something that could become a household term. It's not likely that to many people would spend upwards of $1 million for such a piece of equipment; but, it does not cost that much to buy a 3-D printer now. In fact, reports indicate that 3-D printers could be acquired for as little as $1000 and if you can actually print three dimensionally that might be of use to a fair amount of people. Research in this field is continuing and expanding to include printing of such things as batteries and even food. What was once thought to be very complex and was very expensive is now like many other things on the verge of becoming ubiquitous. Cornell University has a creative machines lab in which much of this research is being conducted and development is very promising.

Newly Revised Cybersecurity Bill Introduced in Senate

    This revised bill was introduced in the Senate by Senators Joe Lieberman and Susan Collins of the Senate Homeland security committee. It is basically a somewhat scaled-back version of a bill introduced in February of this year and many people are saying that it is a better version. This new revision includes the formation of a multi agency National Cybersecurity Council whose purpose would basically be to assess the risks and vulnerabilities of critical infrastructure computer systems. There would be involvement on the part of several entities within the government including members of the Pentagon, the Department of Commerce, the Justice Department, the intelligence community and federal regulatory agencies related to specific critical infrastructure governing while being led by Homeland Security Secretary.

SiteLock