admin wrote this on 9 Aug 2012

Last five years have witnessed the rapid shift of computer services towards a centralized, cloud-based environment. This trend can be majorly attributed to faster internet connections, laptops, tablets and Smartphone-powered computing.The major advantages of Cloud computing:

1. Cloud computing is cost effective, much easier to maintain than disparate software and servers, and most importantly it enables the ubiquitous, cross-platform experiences.
2. People are becoming more reliant on cloud-based apps and devices; they have started entrusting more and more data with the likes of Microsoft, Amazon, and Google.

Other Side of Coin:

Unfortunately, playing in the cloud isn’t always sunshine and rainbows, a point recently underscored when some Mat Honan fell victim to a band of hackers who weaseled their way into his Apple’s iCloud account. They took advantage of iCloud’s lack of a two-factor authentication process to access his account and remotely delete the data on his MacBook, iPad, and iPhone.

Millions of PlayStation Network (PSN) subscribers trusted Sony with their name, address, birthday, credit card details, and other personal information, only to have all that information fall into the hands of hackers following a massive data breach that knocked PSN out of commission for almost a month.
Hacker attacks aren’t the only potential dark clouds. Computing in the cloud requires a level of a trust for things that are ultimately out of your control, like data outages and redundancy. If a data center goes up in flames, you have to trust that a team of engineers will be able to repair the damage quickly and efficiently, and that offsite backups exist so that your data can be restored. It happens more often than many people realize.
Amazon EC2 runs many major websites and services. Netflix, Instagram, and Pinterest have all been taken out of service during the outage of June 2012 but Amazon was quick to restore the services and not much damage was done.

What can I do?

Parking your data on third-party services isn’t inherently bad, it’s just risky. You can mitigate that risk by practicing smart computing habits, which first and foremost involves maintaining multiple backups. Safe computing practices ensure you’re doing everything possible on your end to prevent disaster, eliminating half the risk in the process. The other half is up to the players on the other side of the equation, and unfortunately, the very nature of cloud computing leaves that part out of your control.

About Neev Technologies:

Neev is an expert in making SaaS (Software as a Service) based products and applications and that is what most of our clients need.To know more about our capability areas log on to :

Visit us at to know more about our offerings.

Tags: , , , ,

facebook comments:

Leave a Comment