Application Intelligence for cloud computing escort cloud printing echoes
Source: Internet
Author: User
KeywordsCloud computing Cloud printing
Cloud computing lacks uniform standards, such as where data is stored. Do cloud providers meet local government requirements? ...... Same problem with cloud computing security, is data safe? Hacking attacks are more affected? Once the enterprise chooses the service from the cloud computing supplier, then how the information and the data security evade the risk becomes the enterprise most concerned question. Cloud computing is a disruptive concept for it, and it's impossible to do it overnight, and security is a deadly factor in the success of cloud computing ...
For the above issues, Tenkine reporter interviewed China million network Strategic Department senior engineer Jiang.
Q: With the landing of cloud computing, a lot of problems have erupted, security, privacy, regulations and so on has aroused widespread concern, as a user, you are most concerned about what problems?
Security is my top concern, and of course regulation and security are complementary, there is no regulation of the "cloud" security constraints, nor will it help cloud computing smooth landing, as an ordinary user, the most important thing is to understand in the virtual, complex environment, how to ensure that their applications, data is still clearly controllable, This is both a user's problem and a cloud service provider's problem, which is clearly seen in the information security community.
Q: Security is not unique to the era of cloud computing, but it seems to be magnified in the era of cloud computing, what do you think is the cause of such a phenomenon, or compared to traditional security, cloud security has what special?
For example, the cloud era's role is to put all the data on the service side, for some enterprises, is tantamount to all the property entrusted to the Third-party agencies, and this requires a lot of trust. If the enterprise's server is controlled by its own company, the security issue only needs to consider not to be attacked, but by the Third-party escrow, but also need to consider will not be stolen by the third party factors, in this case, cloud security is magnified.
Q: 2012 can be said to be the key year of cloud computing landing, whether your company has adopted the cloud computing technology plan, or has the relevant testing?
Yes
Q: If not, is it because of security? Will future cloud computing plan be adopted? If you already have tests, can you tell me how the deployment process solves cloud security issues?
Intelligently detects, classifies, and controls application bandwidth by using intelligent address blocking on ports and traditional firewalls. By detecting, classifying, and controlling applications, IT departments can block, limit, or optimize any particular application, whether it be sap, YouTube, or LimeWire.
Q: Do you know anything about cloud printing? Do you think cloud printing is a form of cloud computing? What is the biggest problem facing cloud printing?
Prior to understanding HP's proposed cloud printing technology, I think cloud printing, which is the application of cloud computing in real life, allows users all over the world to use any one of the world's "cloud" printers, including mobile phones, PCs, laptops and even cameras. And cloud computing is easy for hackers to use to send spam, or to launch for download, data upload statistics, malicious code detection, such as more advanced malicious program attacks, the biggest problem of cloud printing is mailbox confidentiality and spam processing issues.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.