☆ Cloud Computing (CC): Naive Companies Can Save A Few Dollars While Losing Their Data To Others; What A Deal?

News Analysis: Cloud Computing (CC): Naive Companies Can Save A Few Dollars While Losing Their Data To Others; What A Deal? ‘CC’ is a Methodology we have advised our International Friends AGAINST for many years. The Risk is Far Too Great in having information potentially flow to others who are Competitors or to Governments around the World.

Many of the ‘CC’ Operations were initially funded, in part, by Intelligence Agencies, it has been said. The gullible “Journalism Majors” who write about Silicon Valley and the like: Either do not know any better; Are “getting greased”; or, Do not care about realities. All of the drivel they toss out to the ignorant about such matters very seldom discuss High Technology Espionage Capabilities of others, to penetrate ‘CC’.

‘CC’ effectively creates a large “Wide Loop” Information Chain that is readily penetrable. Conservatively operated Businesses will opt for a “Narrow Loop” with information stored close at hand by their own ‘Trusted and Verified’ IT Staff. Both systems can be penetrated by professionals, no doubt; but the “Narrow Loop” System is more difficult to enter and easier to identify transgressions, many Intelligence Professionals think.

The Loss of Pertinent Data to outsiders will be much more detrimental to a Company than equipment and wages for an IT Department. Maybe the Christmas Bonuses to Executives is a little less, but the safety to the Company is greatly enhanced.

Why be Penny-Wise and Pound-Foolish? Merely because some Marketeer tied to a “CC’  gives a good spiel about ‘Cost Savings’?

What about Information Loss to hackers or other who work for ‘CC’ Companies? Bribery for other Company’s Data is where one finds it.

Do not be a Sucker. Present ‘CC’ Fashionability can be VERY costly; Be Wise.

Reality.

Reference: http://www.theguardian.com/technology/2014/mar/31/data-storage-nsa-revelations-businesses-snowden

☆ U.S. National Security Agency (NSA) Gets its Data From Very Willing IT Contract Companies

News Analysis: Contrary to Protestations by IT Contract Companies (including “Internet Relationship” Sites), that they were “Kidnapped By The ‘NSA'”,  as we have stated many times, many were allegedly initially funded by various Intelligence Agencies, many people state. The ‘NSA’ does not now nor has it before, needed to act as a “Petty Crook”; it is an Organized Global Information Funnel.

That the ‘NSA’ does what it does should not be surprising to the “Aware”; the ‘NSA’ has the Drive, Funding, and Intellect to do as it chooses; one may not like it but a person of Wisdom will Respect It.

Since the IT Companies “Lie” to the American Public about their ‘NSA’ involvement they are as credible as one stating “You can keep your existing Health Insurance Policies” to the same Public; obviously they are of Minuscule Value.

What apparently is hurting these ‘Anything For A Buck” Personages in IT (but they are loathe to admit), is that they are losing money by each Revelation about the ‘NSA’. Not purchasing American Designed and Manufactured Electronic Components and Systems will further enhance their misery.

These ‘Worms’ trying to lie their ways out of the ‘Oven’ are of little surprise; their “God” is MONEY. They Worship it in choosing Partners, Employees, Close Relationships, and especially Business Deals. They really are mere “Dollar Hookers” acting as “Luxury Call Girls”; they wear the wrong Cosmetics to fool anyone.

Birds of a Feather Flock Together: such is “Silicon Valley’. 

Reality.

Reference: http://www.theguardian.com/world/2014/mar/19/us-tech-giants-knew-nsa-data-collection-rajesh-de

IT Appraisal by a Realistic Leader

News Analysis: A road-map for Information Technology [IT] growth in a country, which has largely developed its own systems successfully, can provide the direction for increased usage of that system by country neighbors far and wide. An important element to the employment by ‘outside the country’ customers is their knowledge that this technology has not been compromised by other governments’ IT machinations. Hardware developed in the ‘host country’ as well  locally developed Software, created by its honorable citizens, can help thwart IT espionage. This legitimacy, when properly marketed to computer customers,  will lead to increased sales to neighboring countries as well as others in the world IT matrix who tire of privacy invasions by other governments.

Reference: http://www.itar-tass.com/en/c32/926958.html