Dear Hackers – Please Do Not Kill the Cloud…

There are already plenty of nude photos in the cyberspace. No matter how attractive these celebrities are, their photos are not worth what is at stake. News Reports have been taken over by the celebrity nude photo celebration. Here is a good summary, in case you missed out:

” MICHAEL BRISSENDEN: Explicit photos of dozens of female celebrities have been dumped on the internet in what’s believed to be one of the biggest celebrity hacking scandals to date. Jennifer Lawrence, the Oscar winning star of the cult movie the Hunger Games, is among dozens of high profile Hollywood actresses to have naked images posted on the internet by hackers. The incident has raised serious questions about the security of internet storage systems.

work-on-keybordSo far I have not made an attempt to see the leaked photos. Come to think of it, I have seen enough of them (when I was working in merchant navy) to last me a lifetime – so I will do this either. Is it really that big a deal? These people had posed for the photos, so assumedly they did not mind some people seeing them in those poses.

It is really of question of which people, and in what circumstances. When I posed for this photo, I did so with full knowledge that some people will look at it, and it might perhaps even leak from my cloud account. I do not mind if it happens; though now that I have put it here in this blog, hacking them will be purposeless. If you have photos of yourself in the cloud that you would not like people to see, delete them or make them public. Privacy is a luxury that does not exist in the global village.

We are all Kardashians now. But, the purpose of this blog is not to decry the loss of privacy – in my view it is overrated anyway. Plus, that bus has departed long ago. Purpose, of this blog is to make a direct appeal to the hackers to not kill the cloud. Too much is at stake. Global economic integration, supply chain 3.0 planning, collaboration, concurrent engineering, even cool products such as the next generation of phones, watches and tablets – none of this will be possible anymore with data residing in cloud and enabling So dear hackers – you will lose your cool products.

You will lose the low prices for great things – cost of everything will go up massively, if supply chain 3.0 planning and collaboration cannot be accomplished. And, you will lose your own ability to send huge files across the internet to your friends. Would you like to see that happen? A few photos of scantily clad (or unclad) bodies are not really worth that much.

Related articles

 

Care? 'Share'

FREE - Get An Extract From Any Of Our Books!

All you have to do is - comment below. Your opinions are vital for building a vibrant global community of professionals. In time, you will be proud of your contributions:

  • Share Your Opinion

  • Participate in The Conversation

  • Contribute to The Community

FEATURED COMMENTS WILL EARN A FULL COPY OF ANY OF OUR BOOKS.

What are you waiting for?  Share Now, and Win.

 

Vivek Sood

I write about "The Supply Chain CEOs", "The 5-STAR Business Networks", and, how to "Unchain Your Corporation". In my work, I help create extraordinary corporate results using several 'unique' supply chain methodologies. Contact me for interesting, high impact projects, or, to get access to my IP for creating transformations using these methodologies.

  • Nevaeh says:

    Thanks to starting a very sensitive topic that is the security of the cloud. Ultimately, it is the duty of the organization to apply control over the cloud. The regulatory-compliant procedure of public clouds requires that enterprises implement clear guidelines on cloud usage responsibility and cloud risk acceptance processes. Those who don’t implement a tactical approach to the use of cloud computing could eventually discover they have put themselves in an unsecured position.

    Due to constant the increase in security requirements, physical access to data centers will also be strictly limited. For entry into the secure premises, you will not only need be in possession of an electronic key but also undergo a potential procedure for biometric scanning.

    The future of cloud computing and security is extremely promising with a huge opportunity for the technological breakthrough for the companies already using this technology today. The next few years will show the impact cloud will have the world than one has ever been able to imagine. It is compulsory for CEO’s to be aware of the latest innovations in the world of cloud technologies in order to remain competitive. Soon enough, cloud technologies will support working faster and more effectively than it is today.

    • SCM executive says:

      More and more, we are seeing technology moving to the cloud. It’s not just a fad — the shift from traditional software models to the internet has steadily gained momentum over the last 10 years. Looking ahead, the next decade of cloud computing promises new ways to collaborate everywhere, through mobile devices.

  • Benjamin says:

    I agree with this topic. one time I lose all my project data while I was on cloud-based storage and no one responds to my losses. Defiantly, if we won’t change our thinking or use of style. We could lose the benefit of the cloud.

    • Neveah GSC says:

      Hey Benjamin, Said to hear about your loss i can understand from what you have been suffered it takes time to built a precious project and to lose over after is very said but sometimes cloud-based storage is very useful too.

  • >