Ugly Hedgehog - Photography Forum
Home Active Topics Newest Pictures Search Login Register
General Chit-Chat (non-photography talk)
Explaining the cloud.
Aug 26, 2018 07:07:16   #
Sirsnapalot Loc: Hammond, Louisiana
 
The cloud

https://youtu.be/CFdZWgiAj8I

Reply
Aug 26, 2018 08:03:26   #
jerryc41 Loc: Catskill Mts of NY
 
Good one! Fortunately, that's just a comedy sketch. We all know that the Cloud is perfectly secure. : )

Reply
Aug 27, 2018 06:04:15   #
Manglesphoto Loc: 70 miles south of St.Louis
 
jerryc41 wrote:
Good one! Fortunately, that's just a comedy sketch. We all know that the Cloud is perfectly secure. : )

Loved the sketch.
Sure it is

Reply
 
 
Aug 27, 2018 06:47:45   #
Powder Hound
 
jerryc41 wrote:
Good one! Fortunately, that's just a comedy sketch. We all know that the Cloud is perfectly secure. : )


Yeah, sure. Like the cloud owners and/or admins are going to advertise it if they get hacked. Do they even know? I think not.

Cheers,

PH

Reply
Aug 27, 2018 07:24:46   #
bobmcculloch Loc: NYC, NY
 
jerryc41 wrote:
Good one! Fortunately, that's just a comedy sketch. We all know that the Cloud is perfectly secure. : )


Yeah!

Reply
Aug 27, 2018 08:15:37   #
Sirsnapalot Loc: Hammond, Louisiana
 
jerryc41 wrote:
Good one! Fortunately, that's just a comedy sketch. We all know that the Cloud is perfectly secure. : )


We could only hope!

Reply
Aug 27, 2018 09:30:07   #
DragonsLady Loc: Los Alamos, NM
 
What about those cloud services that will encrypt your data? What if they lose the encryption key? Just wondering.

Reply
 
 
Aug 27, 2018 11:09:33   #
CPR Loc: Nature Coast of Florida
 
That was great. Thanks for sharing the link.

Reply
Aug 27, 2018 13:16:31   #
safeman
 
Should be required viewing for anyone considering cloud storage of anything.

Reply
Aug 28, 2018 18:49:40   #
Ka2azman Loc: Tucson, Az
 
Safe? until the government wants something. Remember phone security and they paid a hacker to break into phones so they can see what is in them for a criminal investigation; but I don't recall if the break in was worth (found any) evidence to use by them?

Reply
Aug 31, 2018 10:56:16   #
pendennis
 
DragonsLady wrote:
What about those cloud services that will encrypt your data? What if they lose the encryption key? Just wondering.


The encryption keys are well safeguarded, and it's highly unlikely that a "cloud" company could ever lose those keys. While we look at redundancy, they look in terms of triple and quadruple redundancy, as well at outward facing servers, making them extremely difficult to hack.

The "cloud is nothing new". We used what would later be termed as cloud computing (AKA time sharing) in the late 70's and into the 80's on mainframe computers and terminals, well before Ethernet was developed. With primitive modems (by today's standards) and analog processing, we stored data remotely on mainframe computers, using applications housed on those mainframes, and storing data and applications on a variety of disc drives. Since the files were analog in nature, and communication was by modem, it was fairly easy to maintain security. Using a modem, users would dial in to the mainframe, but only gaining access when the sending telephone number was known to the system, and the mainframe modem making a call back to the requesting user.

However, as you can imagine, that method became obsolete very quickly with the advent of the personal computer and the need to talk to mainframes. Server technology was still primitive, and mainframes were still considered "de rigeur" for computing and storage. Emulating programs were used to make the necessary connections.

Reply
 
 
Aug 31, 2018 14:47:21   #
Sirsnapalot Loc: Hammond, Louisiana
 
pendennis wrote:
The encryption keys are well safeguarded, and it's highly unlikely that a "cloud" company could ever lose those keys. While we look at redundancy, they look in terms of triple and quadruple redundancy, as well at outward facing servers, making them extremely difficult to hack.

The "cloud is nothing new". We used what would later be termed as cloud computing (AKA time sharing) in the late 70's and into the 80's on mainframe computers and terminals, well before Ethernet was developed. With primitive modems (by today's standards) and analog processing, we stored data remotely on mainframe computers, using applications housed on those mainframes, and storing data and applications on a variety of disc drives. Since the files were analog in nature, and communication was by modem, it was fairly easy to maintain security. Using a modem, users would dial in to the mainframe, but only gaining access when the sending telephone number was known to the system, and the mainframe modem making a call back to the requesting user.

However, as you can imagine, that method became obsolete very quickly with the advent of the personal computer and the need to talk to mainframes. Server technology was still primitive, and mainframes were still considered "de rigeur" for computing and storage. Emulating programs were used to make the necessary connections.
The encryption keys are well safeguarded, and it's... (show quote)


Oh!

Reply
If you want to reply, then register here. Registration is free and your account is created instantly, so you can post right away.
General Chit-Chat (non-photography talk)
UglyHedgehog.com - Forum
Copyright 2011-2024 Ugly Hedgehog, Inc.