Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 4 - Look at Cloud Computing from Both Side...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Look at Cloud Computing from Both Sides Now
By: Bruce Coker
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 3
    2009-01-14

    Table of Contents:
  • Look at Cloud Computing from Both Sides Now
  • Appeal of the Clouds
  • Precautions
  • More Safeguards

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Look at Cloud Computing from Both Sides Now - More Safeguards


    (Page 4 of 4 )

    Use separate IDs for different services from a single vendor

    Maintaining a large number of different user IDs sounds like a lot of hard work, but it can be well worth it. Consider the example of Baker, not to mention that of Nick Saber. Saber is a paying Google customer who was recently locked out of all his Google accounts at once with no warning or explanation. These accounts included Gmail, Google Talk, Picasa (which was full of personal photos) and Google Docs. If only Nick had used separate IDs to log into all these different services, the damage wouldn’t have been so devastating. Like Baker, Saber got his data back eventually, but you might not be so lucky.

    Download and backup documents

    Any document (this includes spreadsheets, presentations and anything else you’ve created) that exists only in the cloud is vulnerable. How you choose to back your documents up is up to you. You could download them one at a time, copy and paste them into local applications before saving them, or use a utility such as the Google Doc Download Greasemonkey Script for Firefox that is designed to download all your Google Docs in one go.

    Consider signing up for a second photo or music service

    Now that most of us own digital cameras, there’s an increasing trend towards using online storage for our photos rather than having to provide all that hard disk space ourselves. While this often makes economic sense, limiting yourself to just one such service makes no sense at all. Of all personal documents, photographs are often the most precious in the sense of being irreplaceable. Anyone who’s been unfortunate enough to lose a collection understands their value. Don’t learn the hard way: sign up for a second photo service and upload your pictures to it, or burn them to DVD, and enjoy the security of having a backup.

    The same applies to music to a certain extent. Although music may not be unique and irreplaceable in the same way as photos, the time and effort involved in assembling a large collection is not something you would wish to repeat. Using a second service as backup helps to reduce the chances of this happening.

    Remember Schofield’s Second Law of Computing

    Above all, remember the phrase coined by Jack Schofield of the UK Guardian newspaper: “Data doesn’t really exist unless you have two copies of it.” As Schofield points out, although the chances of a disaster befalling you personally might seem vanishingly small, it’s worth remembering that if 10 percent of a billion Internet users have a data problem, that’s 100 million personal disasters. Don’t let one of them be you.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap