上海千花验证归来

first_imgLetters to the Editor, September 15, 2002 Representing ChildrenAs an attorney who has practiced dependency law under Ch. 39 within the State of Florida, I found the June 15 article headlined “Children in state custody need more representation” rather interesting. While the recommendations seemed sensible and aimed at the problem, the biggest problem is the State of Florida’s unwillingness to spend the money necessary to provide these children with adequate and zealous legal representation.Educating the public is a noble task. Creating legislation that truly helps children is necessary in our modern society. Unfortunately, attorneys cannot pay bills with good intentions and education. They pay their bills, raise their children, pay for college, and pay their staff with real dollars, not kind sentiments. Until the State of Florida, specifically the counties, embrace an acceptable hourly wage to pay the practitioners of dependency and delinquency law within Florida, I am afraid you will find the list of attorneys who practice in this area of law dwindling. I think the best solution to this problem would be to rid our court system of the annual flat fee contracts that are offered to attorneys to accept dependency and delinquency cases and offer a per-hour fee arrangement with the counties. I for one would be more than willing to re-enter into the practice of dependency law should the state, in its wisdom, restore the per- hour fee arrangement. C. Donald Detky Jacksonville September 15, 2002 Regular Newslast_img read more

first_img 47SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr,David Basri Mr. Basri has been designing and implementing software and process improvement for financial institutions for over 35 years. He has worked with, and gained experience from, over 500 institutions both … Web: www.pointent.com Details One of the fastest growing trends in branch strategy is the implementation of cash automation for teller operations. These include new generations of cash dispensers and cash recyclers. There are five reasons commonly cited for justifying cash automation:Automated vault service. Cash automation devices can serve as the branch vault, allowing tellers to buy, and with recyclers sell, cash without involving a vault teller or supervisor.Improved transaction throughput. A traditional teller must count cash at least twice: to or from the drawer, and to or from the customer. Cash automation replaces one of these steps with what is generally a faster operation from a machine. The marginal benefit increases with the amount of cash in any given transaction, so it is greater for commercial transactions and night bags.Improved customer service. The theory is that time which used to be spent counting cash can now be spent interacting with the customer.Improved teller balancing. Since a machine is now handling the cash, teller balancing percentages should be higher.Universal staffing is more feasible. Traditional tellers who process a lot of transactions and balance all the time have skill, experience and self-discipline. These traits are not easy to replicate across an entire branch staff. Cash automation removes one of the more challenging aspects of teller work from the required skillset. In addition, cash automation can provide cash security in an “open” branch layout without a traditional teller counter.Cash automation are expensive systems. Dispensers cost $15,000 to $30,000 per device, and recyclers cost $25,000 to $45,000 per device. In many cases management and/or interface software is required, adding another $1000 to $3000 per device. Freight and installation will add another $2000 to $3000 per device. Annual maintenance will be approximately 10% of the device cost. Fully implementing cash automation would mean a device for every two tellers, though something less than that is far more common.While all the justifications above are valid and seem reasonable, the question should be: What is the actual benefit in the real world of my branch operations? Let’s take a second look at each justification in that context.Automated vault support is an explicit benefit and may actually have additional side benefits. If it is simple and quick for tellers to get more cash during the day, they can carry less in their drawers.Transaction throughput is a bit trickier. The improvement can only be realized when all tellers have a steady stream of customers. Are the tellers connected to cash automation actually doing more transactions than traditional tellers? Is this true (or not) on average, or only during peak times? If teller activity and staff forecasting are not being measured, there is no way to tell if cash automation is having an actualized benefit.Improved customer service can also be more subtle than it first sounds. If time is being “saved” as proposed in reason #2, then it cannot also be “used” for customer interaction. A teller can either have a shorter transaction time and not interact more with the customer, or interact more but not save transaction time. They cannot do both.Improved teller balancing seems obvious, but again the question is how is it realized in overall branch productivity? Tellers still have to reconcile a drawer, though it should be quicker and there should be fewer out-of-balance conditions. There is some new overhead associated with managing and reconciling the device itself. When the device is down what are the procedures and how well do tellers that have become dependent on automation perform? How accurate are traditional tellers now? The more accurate existing tellers are, the smaller the benefit.Cash automation can be a contributing factor in a program to implement more of a universal staffing model. However, it is one piece of a much larger and complex plan. There is no question that cash automation changes the security equation for institutions considering an open branch layout, but at that point full self-service kiosks likely are also part of the consideration.It is not the intent of this article to suggest that cash automation is not justified. In some operations and branches it no doubt can be of significant benefit. The point is that realizing a benefit may not be as simple as it sounds when the justifications are taken individually on face value. If you are not measuring what the branches and their employees are doing, how they are doing it and when they need to be doing it; how can you ever really know?last_img read more

first_imgA home with a helipad was among the most popular dream-house desires. Photo: Sarah MatrayImagine the sort of home you could create with a blank cheque book and your wildest imagination.Respondents were asked to identify their deepest dream-house desires in a recent survey by prize-home charity, RSL Art Union.Of those asked, 60 per cent channelled their enthusiasm toward a MasterChef-style kitchen with self-cleaning ovens, room-size pantries and state-of-the-art appliances.Second place in the survey was reserved for an indoor fitness centre with 25-metre lap pool, while the third most popular was a triple-level cinema room.Things were interesting in the back end of the list.A hair salon and beauty spa, a private jetty, and a 10-car garage with workshop plus 360 degree vehicle turnstile all made a strong showing among the wants.More from newsMould, age, not enough to stop 17 bidders fighting for this home3 hours agoBuyers ‘crazy’ not to take govt freebies, says 28-yr-old investor3 hours agoAnother great contender was, incredibly, the dream of a moat with a draw bridge — five per cent voted this their most desired inclusion while 13.5 per cent put it in the top three. CHECK OUT THIS ‘GAME OF THRONES’ INSPIRED HOME THAT’S FOR SALE Two per cent asked for a nightclub, four per cent wanted a bowling alley and three per cent were keen on a golf course at their wonder homes.While it doesn’t have a moat to keep out marauding hoards, the RSL Art Union’s latest prize home Yandina on the Sunshine Coast would certainly fit the bill as having plenty of space. An outdoor room with a pretty tasty view at Yandina.Follow Kieran Clair on Twitter at @kieranclair There’s plenty of room to move in the RSL Art Union’s latest prize home in Yandina, QLD.At 940sq m of living area, it’s the largest prize home the RSL has ever offered.last_img read more

first_imgSports Related Videospowered by AdSparcRead Next San Beda has a 6-2 record and the Lions will be coming in fresh from 95-60 demolition of Mapua on Tuesday.A San Beda win ties the Red Lions with La Salle at 7-2 but the Archers will fall to third by virtue of the winner-over-the-other rule.FEATURED STORIESSPORTSGinebra beats Meralco again to capture PBA Governors’ Cup titleSPORTSAfter winning title, time for LA Tenorio to give back to Batangas folkSPORTSTim Cone, Ginebra set their sights on elusive All-Filipino crownSan Beda dealt La Salle its first loss in the tournament, before the Archers absorbed their second loss against arch-rival Ateneo, 81-75, on Independence Day.In other matches, St. Benilde and Adamson look to finish strong entering the quarterfinals as they seek wins against separate foes. What’s next for Jeff Horn? Carpio hits red carpet treatment for China Coast Guard PLAY LIST 02:14Carpio hits red carpet treatment for China Coast Guard02:56NCRPO pledges to donate P3.5 million to victims of Taal eruption00:56Heavy rain brings some relief in Australia02:37Calm moments allow Taal folks some respite03:23Negosyo sa Tagaytay City, bagsak sa pag-aalboroto ng Bulkang Taal01:13Christian Standhardinger wins PBA Best Player award Winfrey details her decision to withdraw from Simmons film LATEST STORIES Volcano watch: Island fissures steaming, lake water receding Steam emission over Taal’s main crater ‘steady’ for past 24 hours Jury of 7 men, 5 women selected for Weinstein rape trial View comments In fight vs corruption, Duterte now points to Ayala, MVP companies as ‘big fish’ Don’t miss out on the latest news and information. Lights inside SMX hall flicker as Duterte rants vs Ayala, Pangilinan anew The Blazers will lock horns with San Sebastian at 3:30 p.m. before the Falcons clash with Lyceum in the 5:15 p.m. game.Arellano and University of Santo Tomas will try to end their campaigns on a high note in the opening match at 12 p.m.The knockout quarterfinals will take place on June 28, with the semifinals slated on June 29 and the finals on June 30. —MA. ANGELICA D. GARCIA, IVAN RUIZ L. SUING, JUSTIN ROBERT VALENCIA, TRAINEESADVERTISEMENT Dave Chappelle donates P1 million to Taal relief operations China population now over 1.4 billion as birthrate falls DepEd’s Taal challenge: 30K students displaced MOST READ Photo by Tristan Tamayo/INQUIRER.netDefending champion San Beda will have a chance to steal No. 2 seeding in the playoffs Friday when the Red Lions battle Emilio Aguinaldo College at the close of the Filoil Flying V Preseason Cup.The Lions take on the Generals in the 1:45 p.m. contest at Filoil Flying V Centre in San Juan with a win giving San Beda second ranking over UAAP powerhouse La Salle in the playoffs.ADVERTISEMENTlast_img read more

first_imgSANTA FE SPRINGS – Thirteen-year-old Andres Rodriguez considers himself a catalyst for positive change. At a diversity conference Friday, the Santa Fe Springs Christian School eighth-grader urged his peers to be more tolerant and compassionate toward others. “We’re always quick to judge, not to think,” Andres said. “I learned how not to judge people but to think first and get to know them.” Andres, a Downey resident, was among 180 students selected to participate in the weeklong conference aimed at helping young people face and combat prejudice and discrimination. “At first, they isolate themselves and get into groups,” Capacete said. “But they realize they’re all going through the same things, so that brings them together, and you begin to see a lot of understanding going on.” [email protected] (562) 698-0955, Ext. 3024160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set! The 17th annual Diversity Summit – themed Agents of Change this year – included workshops on peer pressure, violence, inter-generation conflicts, stereotypes and other issues. “Our objective is education and awareness about the issues they’re facing,” said Anthony Lopez, who helped coordinate the conference. “I want to believe that, with our children, these issues have been minimized and that they really have been growing up in a diverse community.” City and school officials started the summit after the 1992 Los Angeles riots, which threw a spotlight on the need for tolerance and respect, Lopez said. “It wasn’t something that was jumping out in our community. They just wanted to be proactive in addressing those types of issues,” said Rick Brown, the city’s early youth intervention coordinator. Pacific Clinics case manager Raquel Capacete, who led one of Friday’s workshops, said she saw transformations taking place during the summit. last_img read more

first_imgGilly Flaherty believes this weekend’s FA Women’s Cup semi-final against her former club Arsenal Ladies is the ideal test for Chelsea’s new-look side.Flaherty was one of eight new faces recruited by Blues manager Emma Hayes ahead of the new season, as was fellow ex-Arsenal midfielder Katie Chapman.So far it appears to be working, with Chelsea unbeaten in six games this season, a run of fixtures that includes five wins and one draw, including two victories over last season’s FA Women’s Super League runners up Bristol Academy and a 3-1 win at big-spending Manchester City.This Sunday Chelsea face Arsenal at Woking’s Kingfield Stadium with the winners set to face Notts County or Everton Ladies in the final at Milton Keynes Dons’ Stadium MK on June 1.“It would mean everything to reach the FA Cup final with Chelsea,” said Flaherty.“It’s not about beating Arsenal as they are my old tea. When you step on the field they are just another team stopping you achieving your goals and I’ve said to the girls here losing a semi-final is one of the hardest things to take.“A lot of the girls here haven’t won trophies before and are excited to get to a semi, but I’ve won and lost and emotionally the defeats don’t go away, they stay with you and drive you on.“I think we are the underdogs going in to the game as Arsenal are used to winning, but we need to go out there and show what we can do as this is a club built to win things and this would be the perfect way to show this team can achieve that.“Both teams are going through a time of transition and despite our good start we certainly won’t write them off as you know what Arsenal are capable of.  But we don’t fear them and will be confident going in to the game.”The FA Women’s Cup semi-final between Chelsea and Arsenal takes place on Sunday May 11 at 2pm at Woking FC’s Kingfield Stadium. For more information and tickets visit http://www.chelseafc.com/chelsea-ladiesFollow West London Sport on TwitterFind us on Facebooklast_img read more

first_imgShare Facebook Twitter Google + LinkedIn Pinterest Temple Grandin, the renowned author and advocate for farm animal welfare and persons afflicted with autism, will speak at Wilmington College March 30 during two sessions, 3 and 7:30 p.m., in Hugh G. Heiland Theatre.Wilmington College’s Agriculture Department and the Clinton County Farm Bureau are co-sponsoring the event, which is free of charge and open to the public. She may be available to sign her books.Grandin was diagnosed with autism at two years old. The anxiety she experienced provided her with insight into the stress experienced by livestock, which resulted in her inventing more humane methods for handling animals at meat plants.Grandin will be inducted into the National Women’s Hall of Fame in Seneca Falls, NY, this September. In 2010, TIME magazine selected her among its “100 Most Influential People in the World” and, last year, she was inducted into the American Academy of Arts and Sciences.A professor of animal science at Colorado State University, she is the author of 12 books, including Animals in Translation and Animals Make Us Human. She is an advocate for animal health and wellbeing and her writings on the flight zone and other principles of grazing animal behavior share strategies for reducing the stress experienced by livestock.She designed livestock handling facilities located throughout the United States and on three other continents. Meat plants handling nearly half of the cattle in North America utilize the center track restrainer system she designed. Also, her curved chute and race systems for cattle are used worldwide.Also, many corporations employ Grandin’s objective scoring system for assessing the handling of cattle and pigs at their meat plants as a means for improving animal welfare.Her other areas of noted research are: cattle temperament, environmental enrichment for pigs, reducing dark cutters and bruises, bull fertility, training procedures and effective stunning methods for cattle and pigs at meat plants.last_img read more

first_imgRelated Posts sarah perez At a keynote event during this week’s Mobile World Congress in Barcelona, Qualcomm Chairman and CEO Dr. Paul Jacobs talked about how mobile technology could be used to connect non-phone, non-tablet devices and objects to the Internet. This concept is generally referred to as the “Internet of Things,” or, as Dr. Jacobs says, “the Internet of Everything.”In this future where everything is Web-connected, mobile phones will serve as the hub, or the remote control, for all the things around you. It will operate as your 6th sense for the machine-to-machine network of devices.Mobile Phone is Hub of Internet of Things Why IoT Apps are Eating Device Interfaces Tags:#mobile#NYT#Trends Role of Mobile App Analytics In-App Engagement What it Takes to Build a Highly Secure FinTech … The Rise and Rise of Mobile Payment Technology Dr. Jacobs began his talk by looking back on the history of mobile. “Ten years ago, voice was killer app,” he said. Now voice is less and less important, while data is increasingly so. People expect data everyone – more than phones, tablets, and e-readers – “going forward, everything is going to be connected.”And in this new network, where inanimate objects are Internet-enabled, your mobile phone will sit in the center of this Web of things. It will help you orchestrate the interactions of the things around you and provide real-time access to all sorts of info, including the people you meet, the places you go and the content that’s available there.The phone is the key to authenticating with these connected devices and taking their content with you, wherever you go.Developments NeededBut in order to support this emerging machine-to-machine environment (M2M), there are several things that will be needed. First, there needs to be peer-to-peer support between devices. You should be able to discover the objects in a room with devices that are operating at a very low power level. This technology should even be down to the physical layer of device, he said, and the interactions it enables shouldn’t need to hop on the cellular data network to occur – they should bypass it.That means that modern devices will need to support multiple radios in addition to the cellular radio. They should also have a local radio, Wi-Fi, GPS, Bluetooth, satellite, NFC (near field communication), etc. End users won’t care how it works – they just expect the phone to connect to the fastest connection available to them at the present time.In this multi-radio environment, radios will become embedded into all sorts of devices, consumer electronics and otherwise. This will lead to an explosion of data on the network. For operators, that means they’ll need to figure out how to make their networks run more efficiently to accommodate the data traffic.By 2014, said Dr. Jacobs, 70% of all consumer electronics devices will be connected to the Internet.Another facet of the development of this Web of things will be the creation of devices with increased capabilities. Devices will have multi-core processors, multi-mode radios, 3D capture and play abilities and other sensors. Augmented reality will come into play, too – that is, looking through your phone’s camera, you can “see” a data layer over top the “real” world.Mobile Sensors & Health One of the major areas of development in this Internet of Things is in wireless health . By 2014, there will be greater than 400 million wearable wireless sensors shipped. Just like the Internet helps you feel more connected with other people, these wearable devices will help you feel more connected to your healthcare professional. You will have a sense that you’re being looked after. There’s an economic incentive here too – the management of chromic disease accounts for three quarters of health care costs, Dr. Jacobs said. Your phone will act as the hub for the wireless sensors around you, connecting you to this information about your health.Initially, emerging markets may see developments in wireless health first, simply because of need, but these developments will come to more developed markets as well.At the end of the speech, Dr. Jacobs said that it’s an exciting time in the mobile industry – it’s as exciting as the beginning of the mobile Internet itself. We can’t help but agree.Disclosure: The author’s travel, hotel and conferences expenses were paid for by Qualcomm. They did not request this coverage, it’s just interesting. last_img read more

first_imgDuring my six-week bike ride last spring (during my sabbatical), I covered nearly 2,000 miles, most of it over land that hadn’t seen a drop of rain since the previous fall; some of those areas — mostly in Texas — still haven’t gotten significant precipitation. Farmers in Texas have had to plow their cotton under or slaughter their cattle. If the drought continues through the winter, power plants may have to start shutting down for want of cooling water.Meanwhile, the Amtrak train that I was going to take home from Houston was canceled due to extensive flooding in the Upper Midwest. And back in Vermont, at the end of August, we saw whole towns cut off by flooding and washed-out bridges and roads from Tropical Storm Irene. An early snowstorm in October caused power outages in Connecticut and Massachusetts that lasted up to a week and a half. Resilient designIt is this sort of vulnerability that I thought about during my bike trip and during the remainder of my sabbatical when I was back home. It turns out that many of the strategies needed to achieve resilience — such as really well insulated homes that will keep their occupants safe if the power goes out or interruptions in heating fuel occur — are exactly the same strategies we have been promoting for years in the green building movement. The solutions are largely the same, but the motivation is one of life safety, rather than simply doing the right thing. We need to practice green building, because it will keep us safe — a powerful motivation — and this may be the way to finally achieve widespread adoption of such measures.Over the coming weeks, I’ll describe how we can address this vulnerability with more resilient homes and communities. Achieving such resilience won’t be easy and it will require investment, but I believe it is crucial for our future well-being. Alex Wilson is the founder of BuildingGreen, Inc. and executive editor of Environmental Building News. To keep up with his latest articles and musings, you can follow him on Twitter. RELATED ARTICLES There’s also terrorism to worry aboutWhile we are now experiencing the first effects of a changing climate, we also face other threats and vulnerabilities. Terrorism is now an ever-present reality, and terrorists of the future may well target our energy production and distribution systems. The U.S. has 160,000 miles of high-voltage electricity distribution lines, 3,400 power plants, tens of thousands of miles of natural gas and oil pipelines, and 150 oil refineries (nearly half located on the Gulf Coast). These installations could be targeted by terrorists wanting to harm the U.S. economy or our well-being.While these systems are vulnerable to direct terrorist attack, even more scary is the threat of “cyberterrorism,” in which terrorists hack into the controls of energy production or distribution systems. In 2007, researchers at Idaho National Laboratory testing the vulnerability of power generation systems to computer attack, were able to hack into the controls of a generator and get it to self-destruct. In a video declassified by the Department of Homeland Security you can see on YouTube the generator shake violently and begin smoking as it self-destructs. While precipitation levels will increase overall due to climate change (because more water will be evaporated from the oceans and other bodies of water), some regions will become more drought-prone — including much of the western U.S.We usually think of drought affecting agriculture or inconveniencing us by prohibiting lawn watering or washing our cars, but severe droughts will also impact our electricity grid. Roughly 89% of our electricity in the U.S. is produced with thermoelectric power plants that rely on huge quantities of cooling water. In 2007, severe drought in the southeastern U.S. resulted in one Tennessee Valley Authority nuclear plant being shut down and the output of two others reduced due to shortages of cooling water. And during the severe 2003 drought in Europe, 17 power plants in France and three in Germany were either shut down or their output reduced.If the current drought facing Texas and surrounding states continues into next year, we could well face a situation where power plants have to be shut down, reducing the margin of excess capacity — and resulting in brownouts, rolling blackouts, and increased vulnerability to unplanned outages. And don’t forget solar flaresYet another vulnerability is magnetic interference caused by coronal discharges from the sun (solar flares). These are the events that cause Aurora borealis or Northern Lights. According to an alarming 2008 report by the National Academy of Sciences, if we were to experience today a coronal discharge event as intense as one that occurred in 1859, tremendous damage could be done to our electrical grid — destroying transformers and causing power outages that could last months or even years. During the 1859 event, Northern Lights were seen as far south as Cuba and telegraph wires caught on fire!Since the NASA report came out, the utility industry has awakened to this concern and begun modifying electrical systems to make them more robust, but the concern is still very real, according to experts. Defining Habitable Temperatures Designing Homes and Communities That Can Survive a DisasterResilient CommunitiesResilient Design: Passive Solar HeatResilient Design: Dramatically Better Building Envelopes Designing Houses and Communities To Be Smarter and More ResilientResilience: Designing Homes for More Intense StormsBuilding Resilience for a ‘Close Encounter’ with DisasterGreen Building Priority #9 – Create Resilient HousesMaking Houses Resilient to Power Outages Welcome to climate changeClimate scientists tell us that we can expect more of these sorts of problems in the years and decades ahead. Precipitation patterns will become more variable, and more of our total precipitation will be bunched into intense deluges that run off as stormwater causing floods, rather than soaking into the ground to recharge aquifers.last_img read more

first_imgCognitive Automation is the Immediate Future of… antone gonsalves Massive Non-Desk Workforce is an Opportunity fo… 3 Areas of Your Business that Need Tech Now Cybercriminals and the mayhem they can cause have become the leading concern of security experts in cloud computing. That’s the takeaway from the Cloud Security Alliance’s latest poll on the top nine threats the industry faces.Changes In Security PrioritiesThe nonprofit’s latest survey found a reshuffling of security priorities pointing to the growing danger posed by cyberattacks aimed at stealing corporate data. Data breaches and account hijackings that were in the middle of CSA’s 2010 list of top threats rose to the number one and three spots, respectively, this year. At the same time, denial of service attacks made their debut as the fifth most worrisome threat.The CSA report is meant to give cloud service providers and their customers a snapshot of what experts see as the greatest dangers to storing data and conducting business with customers in the cloud. Fueling fears is a steady stream of break-ins at service providers and Web sites owned by businesses, government and educational institutions.So far this year, 28 breaches attributed to hackers have been made public, resulting in the loss of 117,000 data records, according to the Privacy Rights Clearinghouse. Service providers hacked included Zendesk and Twitter. In 2012 there were 230 publicly disclosed breaches for a loss 9 million records. Service providers that suffered breaches included Yahoo, eHarmony and LinkedIn.Experts agree that no organization doing business on the Internet is immune from a break-in, particularly as the quality of software tools available to hackers through the underground development community continues to grow in sophistication.“All the vulnerabilities and security issues that on-premise, non-virtualized and non-cloud deployments have still remain in the cloud,” Lawrence Pingree, analyst for Gartner, said. “All that cloud and virtualization does is enhance the potential risks by introducing virtualization software and potentially mass data breach issues, if an entire cloud provider’s infrastructure is breached.”Hackers Not The Only ThreatSurprisingly, the second greatest threat in CSA’s latest list is data loss not from cybercriminals, but from cloud service providers themselves. Accidental deletion happens more often than a lot of people may think.In a survey released in January of 3,200 organizations, Symantec found that more than four in 10 had lost data in the cloud and have had to recover it through backups. “It’s really kind of astounding,” Dave Elliott, a cloud-marketing manager at the storage and security company, told Investor’s Business Daily.Whether from hackers or a service provider SNAFU, the loss of data is damaging to the reputation of all parties involved – customer and service provider — no matter who is to blame, Luciano “J.R.” Santos, global research director for the CSA, said. The potential financial impact from losing customer trust is why data loss is so high on the threats list.“It’s your reputation,” Santos said. “A lot of folks are saying these are the things that if it happened to me or if it happened to me as a provider, they would have the most impact to the business.”The fourth top threat according to the CSA marks an improvement in internal security. In 2010, insecure application programming interfaces was the second greatest threat listed by experts.APIs are what customers use to connect on premise applications with cloud services, as well as to manage the latter. While the technology is improving, the fact that it remains on the list indicates that cloud service providers still have a ways to go in locking down their APIs.The Bottom FourThe remaining top threats, starting in order with number six, are malicious insiders, abuse of cloud services, insufficient planning on how to use cloud services and the vulnerabilities that may exist as a result of the way a cloud provider architects its infrastructure, so it can be shared among many customers.Abuse of cloud services refers to hackers who rent time on the servers of cloud computing providers to perform a variety of nefarious acts, such as launching denial of service attacks and distributing spam. This along with the other bottom four threats was higher in 2010.Overall, I see this year’s list as a mixed bag for cloud security. While some areas show improvement, data protection needs to get a lot better. Gartner predicts public cloud services will reach $206.6 billion in 2016 from $91.4 billion in 2011. That much growth won’t happen unless businesses are comfortable with data security.The Notorious Nine: Cloud Computing Top Threats in 2013Data BreachesData LossAccount HijackingInsecure APIsDenial of ServiceMalicious InsidersAbuse of Cloud ServicesInsufficient Due DiligenceShared Technology IssuesImage courtesy of Shutterstockcenter_img Related Posts Tags:#businesses#cloud security alliance#cloud service providers#CSA#Government#security IT + Project Management: A Love Affairlast_img read more