Home Cloud Computing Cloud Computing: Invasion of Privacy – Part 2

Cloud Computing: Invasion of Privacy – Part 2


Every once in a while an opportunity for greater control of the masses will emerge. The West’s war-on-terror will have focused governments’ attention around the globe. Their security and intelligence services will have been tasked to seek better and faster ways of monitoring dissent and those who might perpetrate a terrorist act. Cloud computing is a one-time opportunity to consolidate both political and commercial power by centralising the capture of personal information and extending its scope by making it more efficient.

Lost in the Mesh 

Until recently, the adoption of personal computers has been highly egalitarian and, when connected to the internet, has resulted in a myriad of communications. This culture of equality and freedom has been provided predominantly by an unsung hero of the internet, the DNS server. These servers are widely distributed around the internet and are responsible for translating the tens of millions of personal and business domain names. The resultant mesh of communications between computers on the internet is a logistical nightmare for the intelligence community because so many points on the internet must be intercepted and monitored; practicalities limit the scope on any surveillance.

To learn more and to read the entire article at its source, please refer to the following page, Cloud Computing : Part 2 : Invasion Of Privacy :: Sanders Research Associates Ltd.

DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors