Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Security The Internet IT

Security In the Ether 93

Posted by Soulskill
from the less-likely-than-ether-in-the-security dept.
theodp writes "Technology Review's David Talbot says IT's next grand challenge will be to secure the cloud — and prove we can trust it. 'The focus of IT innovation has shifted from hardware to software applications,' says Harvard economist Dale Jorgenson. 'Many of these applications are going on at a blistering pace, and cloud computing is going to be a great facilitative technology for a lot of these people.' But there's one little catch. 'None of this can happen unless cloud services are kept secure,' notes Talbot. 'And they are not.' Fully ensuring the security of cloud computing, says Talbot, will inevitably fall to emerging encryption technologies."
This discussion has been archived. No new comments can be posted.

Security In the Ether

Comments Filter:
  • Microsoft today implemented its 100% Data Confidentiality package for T-Mobile Sidekick, comprehensively protecting users’ contacts, email and messages from any possible attacker [].

    “Our data security is impenetrable,” said Steve Ballmer, “and will reassure everyone of the data integrity of our Windows Azure Screen Of Death cloud computing and Windows Mobile initiatives.”

    Microsoft plans to leverage the new confidentiality mechanism to finally purge the horror of Vista from the face of the earth, in the same manner as firing all the contractors who knew how to build Windows 2000 and having to reconstruct Windows XP from bits of NT 4.

    Microsoft Sharepoint users looked forward to a similar denouement as the only safe way to scour their hopelessly incompetent organisations from the world in a manner that would not infect successor organisations.

    Microsoft is putting together an outsourcing proposal to the UK government for data protection.

  • by Anonymous Coward on Sunday December 27, 2009 @01:13PM (#30564294)

    Full homeomorphic encryption is, contrary to IBMs press team, still far from useable. In fact, there is no method in sight that could do the job.

    What you Linux lovers really want is full homoerotic encryption. So you can hide your gay porn.

Riches: A gift from Heaven signifying, "This is my beloved son, in whom I am well pleased." -- John D. Rockefeller, (slander by Ambrose Bierce)