Content deleted Content added
m Archiving 2 discussion(s) from Talk:Cloud computing) (bot |
m Archiving 2 discussion(s) from Talk:Cloud computing) (bot |
||
Line 1,040:
--[[User:Top19|Top19]] ([[User talk:Top19|talk]]) 05:40, 8 March 2017 (UTC)
:[[File:Yes check.svg|20px|link=|alt=]] '''Done'''<!-- Template:ESp --> [[User:TheDragonFire|TheDragonFire]] ([[User talk:TheDragonFire|talk]]) 11:21, 12 March 2017 (UTC)
== Security Instances. ==
There is/are no statements here accorded the extreme open ended none security Cloud servers are. For legal relationships, they are nothing but an attempt to monopolize via acceptable ' dictatorial ' relationships (a standard beaurocratic subsidian mistake similar to the Bradley Tank debacle), with absolutely no intent to retain liability and responsibility. Defacto, the overal purpose would be to cause plausible deniability and diffuse liability and responsibility even further and directly onto a discardable third party element.
' Cloud ' computing, is another nomer for ' distributed node computing', one of the terms used to describe the use of Internet in cases of a national disaster (Dod specs), where each node could take up the load for a node that fell out.
Without doubt, the military and CLOSED industrial park applications are there, however, the commercial and PRIVATE enterprise applications are NOT there (Unless you definitely want a military Indian Microsoft Guru to pass personal information via a Cloud Server to his continental Indian ' mates ' of the potencial whereabouts of any remaining 2008 Sri Lankan Tamal Indian whom was not summarily executed. NO doubt a tactic that Northern Arabic Mix Indians would highly prefer).
Windows 10 & the use of Cloud servers have decremented PRIVATE personal security measurements exponencially, leaving most any open to beaurocracies with not much in mind but ' total domination ' and obliteration of all, except their own ' In ' Groups.
I would be off the opinion that these days, Heil Hitler comes in the form of Microsoft & Cloud Servers, and include quote IT professionals with absolutely no savor for much of any life, including their own, the overal instances of NONE security clearly denoting a suicidal measure.
Question here: How many times are individuals bribed (or wannabe a favoured), by removing commentaries that provide directivity that clearly state that there are con & frauds in place? <!-- Template:Unsigned IP --><small class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/186.88.226.115|186.88.226.115]] ([[User talk:186.88.226.115#top|talk]]) 00:52, 24 March 2017 (UTC)</small> <!--Autosigned by SineBot-->
== As a former Tymshare employee ... ==
I feel that nothing deep can really be understood in the network and cloud computing technology and historically (1986) constrained UX evolution if one does not include the Tymshare contribution, its Tymnet public service as a trigger of the Telecommunications Deregulation and its impact on "multimatics pregnancy", the initial international packet switch services radical monopoly of its Tymnet multitechnology, and the notion of network extended services (missing layers six presentation and eight interapplications). Some more information on the Tymnet architecture and Keykos Tymshare operating system seem of the missing essence in here. <!-- Template:Unsigned IP --><small class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/176.128.155.140|176.128.155.140]] ([[User talk:176.128.155.140#top|talk]]) 10:20, 13 May 2017 (UTC)</small> <!--Autosigned by SineBot-->
|