Computing technology becomes increasingly complex each year. Despite the
evidence that current methods are not sufficiently effective, companies and
government agencies are not re-architecting their software to minimize the risk
of attack.Despite its name, a new application architecture -
Regulatory Compliant Cloud Computing - has the potential to protect information
very securely even within enterprises. In addition, it can actually reduce the
cost of securing sensitive data.Just as a paradigm shift in
applications was necessary when the world transitioned from the mainframe to
Local Area Networks, and again to the world-wide web, such a paradigm shift is
necessary for applications given the risks of the internet, the ineffective
protections to data and the coming tsunami of Cloud Computing.Arshad
This is one of those bugbears that has no easy solutions. All computer systems
can be compromised, and regardless of what technology peddlers wish to sell,
there are no easy solutions to garanteed that IDs can't be stolen or
When I clicked on the hyperlink I find that apparentally my kids' Drs.
visit info. was sent to the State. Why is that? Is the state
"phishing" for possible applicants for Medicaid/CHIP?MY kids
Dr. bills are paid. WHY does the State of Utah get that info. from the health
care providers UNLESS I request Medicaid?
When government puts my confidential information in their data banks I expect
them to guard it. Now that they have left the barn door open they want us to
pay to fix their negligence.In the private sector people would get
fired over such negligence.