Image via Wikipedia
I'm very excited to announce that I'm writing a book about cloud computing for lawyers that the American Bar Association will be publishing at the end of 2010.
This book will explain the concept of cloud computing, including SaaS, IaaS, and PaaS platforms, and will provide lawyers with an overview of why cloud computing is becoming increasingly common and why it will become an increasingly evident alternative to traditional software systems. I'll also discuss the legal and ethical issues presented by lawyers using cloud computing platforms in their law practices and will cover the security issues presented as well.
I would greatly appreciate feedback from my readers as to what you would like a book about cloud computing to cover. Are there any topics that you think absolutely must be covered? What interests you the most? What are you biggest concerns about cloud computing?
Please leave any feedback in the comments below or contact me via email.
Thanks in advance for your feedback. I want to make this book as useful as possible for attorneys.
Also, I just finished writing a book about social media for lawyers with Carolyn Elefant, tentatively titled "Social Media for Lawyers: the Next Frontier" that will also be published by the American Bar Association in late March. You can find an excerpt of the book here. I'll provide you with more information about the book closer to its release date.
Exciting news! Can't wait to read it. Its the security concerns that I'm most interested in...
Hopefully you will have some details on the evolving encryption strategies for data inside the cloud... Presently, in order to perform searches or run calculations on encrypted data in the cloud, the data has to be decrypted first, then the process runs, then the data (and the results) are re-encrypted. However, there are some exciting developments about allowing these processes to run on the data while still encrypted which would obviously do quite a bit for the security of the raw data and of the resulting data.
Also, if two virtual machines are running on the same machine, sharing the same physical memory, it has been demonstrated where one of the machines can penetrate any of the other machines that are using the same memory source(s). An update on the evolving ways to solve this problem would also be great to see. (I think Microsoft has come out with a white paper on this topic, but I'm not sure...)
Thanks!
Posted by: Michael D. Bonasera | February 06, 2010 at 01:30 PM
Excellent. Im curious to read abouut the ethical dilemmas involved.
Posted by: Ben | February 17, 2010 at 07:44 PM