Cloud Storage is a cloud computing technology wherein data is stored in flexible storage devices found in logical locations on the internet owned by cloud hosting companies. The stored data is then made accessible anywhere and available anytime.
This technology has been widely used by businesses to store fresh website content such as music, documents, files, videos and photos as well as store data for archiving, backup and disaster recovery.
Some of the most common features of cloud storage services include any of the following:
PRODUCTS AND SERVICE PROVIDERS
The cloud storage industry is saturated with many products from multiple service providers including Microsoft Office 365, Dropbox, Microsoft OneDrive, Amazon Cloud Drive, Box, Just Cloud, Sugar Sync, Code42 Crashplan, Zip Cloud, SOS Backup, Carbonite, Mozy, HighTail, LiveDrive, iDrive, CertainSafe, Apple iCloud and Google Drive.
To learn more about cloud storage, watch this short video clip:
HTML (HyperText Markup Language) is a computer markup language used to create and design web pages that can be viewed, rendered and translated using a web browser.
A complete HTML code contains information about the semantic structure of a web page including the page elements such as images, objects, forms and texts – all enclosed by a beginning <tag> and an ending </tag> and formatted using attributes.
An html source code may contain any of the following HTML tags:
Br (Line Break)
HR (Horizontal Rule)
Href (HyperText Reference)
OL/UL (Ordered or Unordered List)
B (Bold) I (Italic) Formatting
To create an HTML code, you need software applications such as Notepad, Dreamweaver, KompoZer, and NVU.
The first draft version of HTML was published on October 1991 by author Tim Berners-Lee – founder of the World Wide Web. Today, the standard of HTML is currently maintained by the World Wide Web Consortium (W3C) and the most current version is HTML5.
To learn more about creating a simple website using HTML, watch this short video clip:
BYOD (Bring Your Own Device) is a IT Consumerization term used to refer to an educational, corporate or business policy wherein students or employees are allowed to bring their personal computing device such as a smartphone, tablet or laptop computers at their school or workplace and use these devices to perform tasks and other related activities.
When a BYOD policy is implemented, employees are requested to do or follow any of the following:
Configure their devices with a secure password
Protect their devices using encryption technology
Prevent installation of unsecure software applications
Limit access to certain sensitive database and network resource
Prevent local storage of corporate data
Download corporate applications from the private app store
This policy is said to increase productivity and employee satisfaction. However, IT experts are concerned about its effects on the corporate security.
BYOD SERVICE PROVIDERS
To protect IT systems and corporate data from a security breach, most companies are now employing advanced BYOD security into their networks using services provided by of the following companies: Trend Micro, Cisco, IBM and Dell.
To learn more about BYOD and its effects on data security, watch this short video clip below: