Next Practices

Solutions today for tomorrow's information problems

Menu

Skip to content
  • Home
  • About Me
  • Blogs and Links
  • Contact Me
  • The Bookshelf

Cloud

China Seeks Out Unlikely Ally: U.S. Tech Firms – WSJ


Chinese President Xi Jinping’s visit to the U.S. starts Tuesday with meetings with tech executives in Seattle rather than government officials in Washington, but politics will still be front and center, writes Christopher Mims. Source: China Seeks Out Unlikely Ally: U.S. Tech Firms – WSJ

21 September 2015 in Business Models, Cloud, Critical Infrastructure, Disruption, Economics, Emerging Technology, Internet, National Security.

CFPB Makes Public its Cloud PIA


For those of you that are unaware, the CFPB is in the cloud in a big way. The CFPB’s cloud PIA was made public yesterday. I think it’s pretty interesting that a financial services regulator is storing its data in the cloud.

11 September 2015 in Cloud, Financial Services, Regulators.

Apple and Other Tech Companies Tangle With U.S. Over Access to Data – The New York Times


Government conflicts with Apple and Microsoft reflect heightened resistance by businesses intent on demonstrating efforts to protect customer information. Source: Apple and Other Tech Companies Tangle With U.S. Over Access to Data – The New York Times

7 September 2015 in Cell/Mobile Phones, Cloud, Criminal, Emerging Technology, mobile devices, National Security, Security, US Federal Law.

The Sensor-Rich, Data-Scooping Future – NYTimes.com


The Sensor-Rich, Data-Scooping Future – NYTimes.com.

6 May 2015 in Big Data, Business Models, Cloud, Customer Data, Data Mining, Economics, Emerging Technology, Internet of Things.

Internet security: How to back up a country | The Economist


Internet security: How to back up a country | The Economist.

6 March 2015 in Business Continuity, Cloud, Critical Infrastructure, National Security.

Protect Your Data in the Cloud with TrueCrypt


Protect Your Data in the Cloud with TrueCrypt.

16 February 2015 in Because it's cool, Cloud.

Box hands cloud encryption keys over to its customers | Ars Technica


Box hands cloud encryption keys over to its customers | Ars Technica.

16 February 2015 in Business Models, Cloud, Emerging Technology.

IBM offers cloud-based services to Chinese firms to address security concerns | Reuters


IBM offers cloud-based services to Chinese firms to address security concerns | Reuters.

8 August 2014 in Asia, Business Models, Cloud.

Microsoft Protests Order for Email Stored Abroad – NYTimes.com


Microsoft Protests Order for Email Stored Abroad – NYTimes.com.

10 June 2014 in Cloud, Criminal, Cross-Border Transfers, Customer Data, Litigation, Search and Seizure, US Federal Law.

Cloud Services Triple Likelihood and Cost of Data Breaches – The State of Security


Cloud Services Triple Likelihood and Cost of Data Breaches – The State of Security. Interesting, but I am not sure I agree with the first bullet point.

6 June 2014 in Cloud, Security.

Post navigation

← Older posts
Newer posts →

Join 185 other subscribers

#jbauerofprivacy

Error: Twitter did not respond. Please wait a few minutes and refresh this page.

Categories

  • Advertising
  • Africa
  • Apple
  • Artificial Intelligence
  • Asia
  • Authentication
  • Automotive Industry
  • Because it's cool
  • Big Data
  • Biometrics
  • Boards
  • Books
  • Business Continuity
  • Business Models
  • Canada
  • Career
  • Cell/Mobile Phones
  • Change Management
  • Children
  • Cloud
  • Compliance
  • Compliance-Enabling Technologies
  • Conference
  • Criminal
  • Critical Infrastructure
  • Cross-Border Transfers
  • Customer Data
  • Cyberbullying
  • Data Localization
  • Data Mining
  • Discrimination
  • Disruption
  • Drones
  • Economics
  • ediscovery
  • Education
  • Emerging Technology
  • Employee Discipline
  • Employee Privacy
  • Encryption
  • Enterprise
  • Ethics
  • EU
  • Event Management
  • Facebook
  • Facial Recognition
  • Financial Services
  • FinTech
  • Genetics
  • Geolocation
  • Google
  • Governance
  • Hacktivism
  • Health
  • HIPAA
  • Humor
  • identity
  • Insider Threat
  • Insurance
  • Internet
  • Internet of Things
  • IT
  • Litigation
  • marketing
  • Microsoft
  • Misc
  • mobile devices
  • National Security
  • Net Neutrality
  • Notice & Consent
  • Online Behavioral Advertising / Tracking
  • PCI-DSS
  • Policy
  • Privacy Shield
  • Professional Development
  • Regulators
  • Reputation
  • Research
  • Retail
  • Right to be Forgotten
  • Risk
  • Robotics
  • Safe Harbor
  • Search and Seizure
  • Security
  • Self-help
  • Senior Management
  • Social Engineering
  • Social Networking and Media
  • Society and Technology
  • Strategy
  • Surveillance
  • Telecomms
  • Thoughtful
  • Threats
  • Training
  • Uncategorized
  • US Federal Law
  • US State Law
  • Vendor Management / Outsourcing
  • Wearable Devices
  • Wireless

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com
Blog at WordPress.com.
Next Practices
Blog at WordPress.com.
  • Follow Following
    • Next Practices
    • Join 48 other followers
    • Already have a WordPress.com account? Log in now.
    • Next Practices
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...