SlideShare una empresa de Scribd logo
1 de 7
Headlines from the group ”Cloud”
Key data on online engagement: platform
On platform: 112 members, 28 discussions, 108 comments


                    Most discussed:                                              Most active:

   Should Europe build its own cloud technology, or use
                                                                       Michele           Cimmino
   existing developments?                                         22
   Are SMBs gaining significant IT security benefits from using
                                                                       Stephan           Engberg
   the cloud?                                                     10
   Cloud Storage Privacy - What's Really At Stake                 9
                                                                       Yves              Le Roux
   Inside cloud 9                                                 7
   What are the most relevant obstacles for Cloud adoption by
                                                                       Paul              Miller
   SMEs?                                                          7
   Should Europe build its own cloud factories?                   6
                                                                       Jordi             Torres
   Green cloud                                                    5
Key data on online engagement: twitter




Most                                       Most
RT                                         active
Wordcloud overall discussion
Headlines from the group ”Cloud”
Purpose of this Group
To make Europe not just Cloud-friendly but Cloud-active and contribute in shaping
 the European Cloud Computing Strategy

Challenges
• Creating a favorable environment to cloud adoption in Europe (removing
  barriers)
• Mitigate risks on cloud adoption (vendor lock-in, portability, interoperability,
  privacy, security)
• Strengthening role of EU players in cloud technology development and research
• Ensuring access to cloud (available and cheap broadband)
• Improve provisions on liability and accountability of cloud service providers
Highlighted quotes

Paul Wallis @OBASHI_Chief
Are there really black swans in the #cloud? http://ow.ly/bwCNw | #CIO #hotcloud #da12cloud
#data #eu
Headlines from the group ”Cloud”
Actions recommended
1-Empower citizens to engage in secure transactions in cloud. What matters “isn't
the services' own policies, but how they deal law enforcement, government
  agencies and lawyers in civil cases (several worries on foreign laws such as US
  Patriot Act). Ensure security and privacy also outside cloud.

2-In order to guarantee the accessibility of the information, we need possibility to
store our part of cloud inside EU territory. WHERE is currently the element
establishing WHO controls and WHAT are the provisions applicable for any issue.

3-Full achievement of the single market. That would speed up cloud dramatically
  as it would eliminate the main barriers. Focus also on interoperability and
  portability.
Highlighted quotes

Pablo Martinez @las_lenas
#Cloud Computing: How Marketers Are Alienating CIOs - Forbes http://onforb.es/Lx5WYC
#da12cloud #da12
Headlines from the group ”Cloud”

Actions recommended
4-EU to work on broadband targets and roaming tariffs, for mobile and/or
crossborder access to data stored in cloud. Also looking to other countries with
whom we do business now and in the near future as Latin America: Brazil, Argentina
  or Chile, as well as USA and China.

5- Ensure that EU is at cutting edge in cloud research and cloud related know how.

6- Action to help SMEs in accessing information on cloud related subjects easily.
The awareness amongst SMEs is still low. Cloud is still a big unknown by the
  SMEs.
 Highlighted quotes
 Submitted by rebentisch on Fri, 2012-05-25
 Not "made in Europe" but "governed by our laws". [...]
 Cloud servers in third nations makes it possible for authorities in these nations to get legal
 and extralegal access and there are no sanctions against business/industrial espionage
 because the laws of your jurisdiction do not apply. Certainly government services cannot be
 outsourced to foreign jurisdictions.

Más contenido relacionado

La actualidad más candente

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...David Terrar
 
The cloud landscape nad 2012
The cloud landscape   nad 2012The cloud landscape   nad 2012
The cloud landscape nad 2012David Terrar
 
Phil wainewright risks of eu clopud strategy cloudcamp london 24.10.12
Phil wainewright  risks of eu clopud strategy   cloudcamp london 24.10.12Phil wainewright  risks of eu clopud strategy   cloudcamp london 24.10.12
Phil wainewright risks of eu clopud strategy cloudcamp london 24.10.12Chris Purrington
 
Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...
Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...
Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...Rene Buest
 
Mary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for CiscoMary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for CiscoMary Barnsdale
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 

La actualidad más candente (8)

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
 
The cloud landscape nad 2012
The cloud landscape   nad 2012The cloud landscape   nad 2012
The cloud landscape nad 2012
 
David Terrar the cloud landscape
David Terrar the cloud landscapeDavid Terrar the cloud landscape
David Terrar the cloud landscape
 
Phil wainewright risks of eu clopud strategy cloudcamp london 24.10.12
Phil wainewright  risks of eu clopud strategy   cloudcamp london 24.10.12Phil wainewright  risks of eu clopud strategy   cloudcamp london 24.10.12
Phil wainewright risks of eu clopud strategy cloudcamp london 24.10.12
 
Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...
Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...
Cloud Computing - 10 minutes essentials and the future of cloud (Cloud Develo...
 
Copyright in the Clouds
Copyright in the CloudsCopyright in the Clouds
Copyright in the Clouds
 
Mary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for CiscoMary Barnsdale article about Fog Computing for Cisco
Mary Barnsdale article about Fog Computing for Cisco
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 

Destacado (8)

Public services
Public servicesPublic services
Public services
 
Innovation
InnovationInnovation
Innovation
 
Job & skills
Job & skillsJob & skills
Job & skills
 
High speed
High speed High speed
High speed
 
Convergence
ConvergenceConvergence
Convergence
 
Data
DataData
Data
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Social media
Social mediaSocial media
Social media
 

Similar a Key data and discussions from the "Cloud

Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloudTalentLMS
 
Ever–ready for every opportunity
Ever–ready for every opportunityEver–ready for every opportunity
Ever–ready for every opportunityaccenture
 
CloudAsia 2012 Highlights
CloudAsia 2012 HighlightsCloudAsia 2012 Highlights
CloudAsia 2012 HighlightsAlan Quayle
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...M Biro
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud RoundtableInternap
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 mythsDot Net IT
 
Cloud Computing: IT evolution or revolution ? Answers from an European Commun...
Cloud Computing: IT evolution or revolution ? Answers from an European Commun...Cloud Computing: IT evolution or revolution ? Answers from an European Commun...
Cloud Computing: IT evolution or revolution ? Answers from an European Commun...Francesco Mondora
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
The European Cloud Computing Strategy: Key Actions
The European Cloud Computing Strategy: Key ActionsThe European Cloud Computing Strategy: Key Actions
The European Cloud Computing Strategy: Key ActionsCarl-Christian Buhr
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Livingstone Advisory
 
OW2 @ China Cloud Computing Conference 2013
OW2 @ China Cloud Computing Conference 2013OW2 @ China Cloud Computing Conference 2013
OW2 @ China Cloud Computing Conference 2013OW2
 
CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?karlmotz
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Vince Santo
 

Similar a Key data and discussions from the "Cloud (20)

Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
Deutsche telekom
Deutsche telekomDeutsche telekom
Deutsche telekom
 
Ever–ready for every opportunity
Ever–ready for every opportunityEver–ready for every opportunity
Ever–ready for every opportunity
 
CloudAsia 2012 Highlights
CloudAsia 2012 HighlightsCloudAsia 2012 Highlights
CloudAsia 2012 Highlights
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
Business Drivers and Challenges of Cloud Computing and Social Networking Appl...
 
The fundamental five
The fundamental fiveThe fundamental five
The fundamental five
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud Roundtable
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
 
Cloud Computing: IT evolution or revolution ? Answers from an European Commun...
Cloud Computing: IT evolution or revolution ? Answers from an European Commun...Cloud Computing: IT evolution or revolution ? Answers from an European Commun...
Cloud Computing: IT evolution or revolution ? Answers from an European Commun...
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Hybrid cloud computing explained
Hybrid cloud computing explainedHybrid cloud computing explained
Hybrid cloud computing explained
 
The European Cloud Computing Strategy: Key Actions
The European Cloud Computing Strategy: Key ActionsThe European Cloud Computing Strategy: Key Actions
The European Cloud Computing Strategy: Key Actions
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 
OW2 @ China Cloud Computing Conference 2013
OW2 @ China Cloud Computing Conference 2013OW2 @ China Cloud Computing Conference 2013
OW2 @ China Cloud Computing Conference 2013
 
CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?CLOUD, FOG, OR SMOG?
CLOUD, FOG, OR SMOG?
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010
 

Último

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Key data and discussions from the "Cloud

  • 1.
  • 2. Headlines from the group ”Cloud” Key data on online engagement: platform On platform: 112 members, 28 discussions, 108 comments Most discussed: Most active: Should Europe build its own cloud technology, or use Michele Cimmino existing developments? 22 Are SMBs gaining significant IT security benefits from using Stephan Engberg the cloud? 10 Cloud Storage Privacy - What's Really At Stake 9 Yves Le Roux Inside cloud 9 7 What are the most relevant obstacles for Cloud adoption by Paul Miller SMEs? 7 Should Europe build its own cloud factories? 6 Jordi Torres Green cloud 5
  • 3. Key data on online engagement: twitter Most Most RT active
  • 5. Headlines from the group ”Cloud” Purpose of this Group To make Europe not just Cloud-friendly but Cloud-active and contribute in shaping the European Cloud Computing Strategy Challenges • Creating a favorable environment to cloud adoption in Europe (removing barriers) • Mitigate risks on cloud adoption (vendor lock-in, portability, interoperability, privacy, security) • Strengthening role of EU players in cloud technology development and research • Ensuring access to cloud (available and cheap broadband) • Improve provisions on liability and accountability of cloud service providers Highlighted quotes Paul Wallis @OBASHI_Chief Are there really black swans in the #cloud? http://ow.ly/bwCNw | #CIO #hotcloud #da12cloud #data #eu
  • 6. Headlines from the group ”Cloud” Actions recommended 1-Empower citizens to engage in secure transactions in cloud. What matters “isn't the services' own policies, but how they deal law enforcement, government agencies and lawyers in civil cases (several worries on foreign laws such as US Patriot Act). Ensure security and privacy also outside cloud. 2-In order to guarantee the accessibility of the information, we need possibility to store our part of cloud inside EU territory. WHERE is currently the element establishing WHO controls and WHAT are the provisions applicable for any issue. 3-Full achievement of the single market. That would speed up cloud dramatically as it would eliminate the main barriers. Focus also on interoperability and portability. Highlighted quotes Pablo Martinez @las_lenas #Cloud Computing: How Marketers Are Alienating CIOs - Forbes http://onforb.es/Lx5WYC #da12cloud #da12
  • 7. Headlines from the group ”Cloud” Actions recommended 4-EU to work on broadband targets and roaming tariffs, for mobile and/or crossborder access to data stored in cloud. Also looking to other countries with whom we do business now and in the near future as Latin America: Brazil, Argentina or Chile, as well as USA and China. 5- Ensure that EU is at cutting edge in cloud research and cloud related know how. 6- Action to help SMEs in accessing information on cloud related subjects easily. The awareness amongst SMEs is still low. Cloud is still a big unknown by the SMEs. Highlighted quotes Submitted by rebentisch on Fri, 2012-05-25 Not "made in Europe" but "governed by our laws". [...] Cloud servers in third nations makes it possible for authorities in these nations to get legal and extralegal access and there are no sanctions against business/industrial espionage because the laws of your jurisdiction do not apply. Certainly government services cannot be outsourced to foreign jurisdictions.