Feeds

Stars behind the clouds: Oz government wants ratings

Security, privacy and trust should be standardized

Beginner's guide to SSL certificates

The Federal government has decided that the pursuit of cloud computing is so urgent that it’s just released a cloud issues paper dated October.

The report, prepared by industry advisory both the Information Technology Industry Innovation Council (ITIIC), recommends a ramp-up of cloud computing research in this country to be led by CSIRO and NICTA.

It also suggests a government-led program of business education about cloud computing, which it could be argued is superfluous since the report also cites research stating that 71 percent of businesses already use some variety of cloud service.

More usefully, Cloud computing - opportunities and challenges states that AGIMO and the Australian Information Commissioner help contributed to formulating security, privacy and trust guidelines for cloud computing, and that service providers agree on ways their services can be validated against the guidelines.

These guidelines could then be expressed as a set of marks – a kind of star-rating for cloud providers.

The report notes that Australia’s isolation – which, for example, imposes long latency on those communicating with offshore clouds – can be turned to the industry’s advantage, providing the chance to continue developing the country’s domestic cloud computing sector.

Members of the 24-member ITIIC include Ian Birks of SKRIB, Dr Alex Zelinsky of CSIRO, Amanda Heyworth of Playford Capital, Embedded Systems Technology CEO Dr Graham Hellestrand, Macquarie Telecom hosting managing director Aiden Tudehope, and IBM’s Glenn Wightwick.

Innovation minister Senator Kim Carr, who released the report yesterday, also announced $AU100 million worth of funding will be poured into the government’s Innovation Investment Fund, to support the final tranche of round three funding under the program. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.