Cloud computing has been in the recent past defined as ‘fine internet’ thanks to its effectiveness (relative in this case). With shared resources, software and information provided to computers over a network, the service has saved users the hustle of putting up infrastructure since they can access a single server without purchasing licenses for different applications.
Cloud computing to be specific Apple’s icloud made headlines all day last week across boundaries owing to the leaked nude pictures. This headlines last forever and are exhausted to the maximum more than important issues are. Apparently, every media house wants to have this yellow headline and emphasize on the simple deed of released nudes. Jennifer Lawrence, Kate Upton, Ariana Grande and other affected celebrities must really hate icloud right now.
About nudes is not what I am trying to relay here. Cloud computing it is. East Africans should be happy about this one at least while convenience lasts. Access Kenya will be pushing for Cloud services in the region which means a new day for the internet users more so business establishments that are the chief targets for the service. This is with an intention to establish managed services solution for the entity.
This couldn’t come at a better time. Just when apple is facing suit cases, allegations and for lack of a better word rebuke from users who claim their rights have been breached. The online storage platform used to store content such as music, personal information, pictures and other content of choice has had audience since its establishment and with the assurance of security for the users, seems they got comfortable enough to take private to another level.
How private is private? Maybe I don’t know enough about cloud services but I think using a similar server, having multiple users use like resources, service dynamically relocated per demand already sounds insecure. Keep in mind also that your cloud data is accessible from anywhere on the internet, meaning that if a data breach occurs via hacking, a disgruntled employee, or careless username/password security, your business data can be compromised.
Maybe not establishing resources, having a single server may sound inexpensive. No, it is not. In fact its expensive. Many computer vendors claim to charge for what users use which is untrue and reason enough to have a close look at pricing plans and details for each application. In most cases, a company must commit to a predetermined contract independent of actual use.
Inflexibility is also one that any organization hoping to embrace the service should be consider. How easy would it be to add and subtract cloud computing users as necessary as business grows and contracts? Document uploads are not easy to upload onto a different format. This could jeopardize your business it’s definitely something to look out for.
It is a so-so situation you don’t want to be in as a business. Tech savvy have recommended the service but with caution. Don’t go all in, it’s a step at a time to test efficiency.
I am looking at tech giant Apple unable to sustain privacy and convenience for its users in an environment that ‘should know how’ as compared to the roll out in East Africa. The region is taking baby steps in exploring internet and even trying to impose automation in our services. The percent rates of internet users are still not pleasing. Even worse, some organizations don’t find a reason to establish a website or rather automate their services. Internet is still not sailing smooth in the community to already roll out a more delicate service.
In Kenya and the larger East Africa, Hacking and cracking is on the rise which makes it even worse. without enough and firm security measures in the region, cloud computing emphasis will only do more harm than good.
My advice; don’t take private too far, enjoy the unlimited storage capability in good dosage.
Apple’s icloud Latest
Apple has announced new security measures in a bid to protect its users following the celebrity hacking scandal by adding alerts and emails to warn users of potential account theft. Although the company still denies breaching security, users are assured to be on the know about their accounts using push notifications in case there is attempt of password change or even if there are attempts to log in from a device for the first time.
Users on the other hand have been asked to strengthen their passwords to beat hacking vulnerability as well as keep their accounts in check.