aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About

Posts by tag

Privacy

14 posts
View Post
  • 4 min
  • Solutions

Helping European Education Providers Navigate Privacy Assessments

Every student and educator deserves access to learning tools that are private and secure. Google Workspace for Education and Chromebooks have positively transformed teaching and learning, while creating safe learning environments for more than 170 million students and educators around the world. Our education products are built with data protection at their core, enabling school administrators to demonstrate their privacy compliance when using our services. Before using the products and services of technology providers like Google, schools in Europe may be required by the EU’s General Data Protection Regulation (GDPR) or similar laws to conduct Data Protection Impact Assessments (DPIAs).…
View Post
Share
View Post
  • 5 min
  • Data

Using Data Advocacy To Close The Consumer Privacy Trust Gap

As consumer data privacy regulations tighten and the end of third-party cookies looms, organizations of all sizes may be looking to carve a path toward consent-positive, privacy-centric ways of working. Consumer-facing brands should look more closely at the customer data they’re collecting, and learn to embrace a first-party data-driven approach to doing business. But while brands today recognize the privacy and consumer consent imperative, many may not know where to start. What’s worse is that many don’t know what consumers really want when it comes to data privacy. Today, 40% of consumers do not trust brands to use their data…
View Post
Share
View Post
  • 3 min
  • Engineering
  • Technology

Verifying The Security And Privacy Controls Of Google Cloud: 2021 CCAG Customer Pooled Audit

Earning the role as our customers’ most trusted cloud requires commitment to ongoing transparency, collaboration and assurance. Our products regularly undergo independent verification, achieving certifications or attestations of compliance against global regulatory requirements, frameworks, and guidelines. At Google Cloud we work closely with our customers, their regulators, and appointed independent auditors who want to verify the security and privacy of our platform. One example of how the Google Cybersecurity Action Team supports customers’ risk management efforts is our annual audit with the Collaborative Cloud Audit Group (CCAG). In 2020, faced with the global COVID-19 pandemic and the demands for teleworking,…
View Post
Share
View Post
  • 12 min
  • Data
  • Engineering
  • Insights
  • Technology

17 Ways Technology Could Change The World By 2025

We asked our 2020 intake of Technology Pioneers for their views on how technology will change the world in the next five years. From quantum computers and 5G in action to managing cancer chronically, here are their predictions for our near-term future.   1. AI-optimized manufacturing Paper and pencil tracking, luck, significant global travel and opaque supply chains are part of today’s status quo, resulting in large amounts of wasted energy, materials and time. Accelerated in part by the long-term shutdown of international and regional travel by COVID-19, companies that design and build products will rapidly adopt cloud-based technologies to aggregate, intelligently…
View Post
Share
View Post
  • 4 min
  • Data
  • Enterprise
  • Tech

Here’s How Much Your Personal Information Is Worth To Cybercriminals – And What They Do With It

Data breaches have become common, and billions of records are stolen worldwide every year. Most of the media coverage of data breaches tends to focus on how the breach happened, how many records were stolen and the financial and legal impact of the incident for organizations and individuals affected by the breach. But what happens to the data that is stolen during these incidents? As a cybersecurity researcher, I track data breaches and the black market in stolen data. The destination of stolen data depends on who is behind a data breach and why they’ve stolen a certain type of…
View Post
Share
View Post
  • 4 min
  • Data
  • Engineering
  • People
  • Platforms
  • Tech

People Want Data Privacy But Don’t Always Know What They’re Getting

The Trump administration’s move to ban the popular video app TikTok has stoked fears about the Chinese government collecting personal information of people who use the app. These fears underscore growing concerns Americans have about digital privacy generally. Debates around privacy might seem simple: Something is private or it’s not. However, the technology that provides digital privacy is anything but simple. Our data privacy research shows that people’s hesitancy to share their data stems in part from not knowing who would have access to it and how organizations that collect data keep it private. We’ve also found that when people…
View Post
Share
View Post
  • 4 min
  • Data
  • Design
  • DevOps
  • Tech

We Need A Code To Protect Our Online Privacy And Wipe Out ‘Dark Patterns’ In Digital Design

A digital building code is needed to help designers better protect the privacy of people when they use online platforms and websites. At the moment no such code exists in New Zealand. Our study with designers shows they try to be ethical in what they do. But commercial pressures from clients and uncertainty around the privacy implications of design mean privacy concerns are often overlooked. That can put designers at risk of accidentally creating what are known as dark patterns on platforms that lure people to do things such as buying extras they don’t need or signing up for something…
View Post
Share
View Post
  • 5 min
  • Data
  • People
  • Software

6 Ways To Delete Yourself From The Internet

Finally ready to get off the grid? It’s not quite as simple as it should be, but here are a few easy-to-follow steps that should point you in the right direction. If you’re reading this, it’s highly likely your personal information is available to the public. And by “public” I mean everyone everywhere. So, how can deleting yourself from the internet prevent companies from acquiring your info? Short answer: it can’t. Unfortunately, you can never remove yourself completely from the internet, but there are ways to minimize your online footprint, which would lower the chances of your data getting out…
View Post
Share
View Post
  • 4 min
  • Big Data
  • Tech

The Privacy paradox: We Claim We Care About Our Data, So Why Don’t Our Actions Match?

Imagine how you’d feel if you discovered footage from your private home security camera had been broadcast over the internet. This is exactly what happened to several unsuspecting Australians last month, when the website Insecam streamed their personal lives online. According to an ABC report, Insecam broadcasts live streams of dozens of Australian businesses and homes at any given time. Some cameras can be accessed because owners don’t secure them. Some may be hacked into despite being “secured”. When asked if they care about their personal information being shared online, most people say they do. A 2017 survey found 69%…
View Post
Share
View Post
  • 5 min
  • Tech

Remote Education Does Not Require Giving Up Rights To Freedom And Privacy

As countries around the world are beginning their long and slow recovery from the coronavirus, schools and universities may have to continue their struggle to give their students a quality education while using remote communication services until the end of the year. With the need to continue classes and exams, school administrators have ended up relying on proprietary conference tools like Zoom to stay connected, and are unfortunately turning to contracting proctoring businesses with names like ProctorU, Proctorio, and Examity to monitor testing and exams. The increased use of proprietary test-administering software is a dangerous development, both because of the software’s proprietary nature, and because of its inherent purpose…
View Post
Share

Stay Connected!
LATEST
  • 1
    Building A Kubernetes Platform: How And Why To Apply Governance And Policy
    • June 4, 2023
  • 2
    Leave, This “United” “Kingdom”, This “Great” “Britain”
    • June 4, 2023
  • 3
    Amazing Federated Multicloud Apps
    • June 2, 2023
  • 4
    What’s The Future Of DevOps? You Tell Us. Take The 2023 Accelerate State Of DevOps Survey
    • June 2, 2023
  • 5
    Resolving Deployment Issues With Ts-node And Azure Development Pipelines
    • June 1, 2023
  • 6
    What To Expect From Apple’s WWDC 2023
    • June 1, 2023
  • 7
    What Is Platform Engineering And Why Adopt It In Your Company?
    • June 1, 2023
  • 8
    Four Steps To Managing Your Cloud Logging Costs On A Budget
    • May 31, 2023
  • 9
    Red Hat Puts Podman Container Management On The Desktop
    • May 30, 2023
  • 10
    The Agile Mindset: A Path to Personal Fulfillment and Growth
    • May 30, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Huawei ICT Competition 2022-2023 Global Final Held In Shenzhen — 146 Teams From 36 Countries And Regions Win Awards
    • May 27, 2023
  • 2
    Huawei OceanStor Pacific Scale-Out Storage Tops IO500 Rankings
    • May 26, 2023
  • 3
    MongoDB And Alibaba Cloud Extend Global Partnership
    • May 25, 2023
  • 4
    Tricentis Launches Quality Engineering Community ShiftSync
    • May 23, 2023
  • 5
    G7 2023: The Real Threat To The World Order Is Hypocrisy.
    • May 27, 2023
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.