The Cloud Service

Read about the cloud service, The latest news, videos, and discussion topics about the cloud service from alibabacloud.com

Steps to secure the use of Azure blob storage in Windows store applications

In the previous article, we demonstrated the steps to secure the use of Azure blob storage in Windows Store applications. The steps on Windows phone are similar to this, but there are some differences in client code and settings. But to make it easier for readers to read, I'll write a separate one for how to use Azure blob storage securely in Windows Phone apps. This will suffice for Windows Phone developers to read this article. We have been in this article ...

Cloud services: Multi-polarization market-oriented diversified innovation pattern

Cloud computing concept from entering China has been years, but until the last two years, through the calculation of resources to provide customers with the public cloud the most original form of cloud computing has become a real domestic cloud computing market, one of the hot topics. Although compared with the European and American countries, China's public cloud application market and service level are in the initial stage, but China's public cloud services in the existing market scale is far more than the traditional IT industry at the speed of growth. Ministry of Industry related research report data show that 2013 China's public cloud services market size is expected to reach about 4.76 billion yuan, growth rate ...

So many voices: IBM, Dell Development Strategy

Guest point of view Refining: IBM chip research, talent training two not mistaken IBM to spend 100 million U.S. dollars with China's 100 universities to do the focus of cooperation, some may open some large data and analysis of courses, and some even set up a large data center of excellence. It is well known that China's market environment may not be very adaptable to multinational companies such as IBM, or may be not friendly to this kind of enterprise, IBM this thing is very smart, the basic course of the general use of IBM's own product solutions to do some examples, which will bring benefits ...

Guangzhou to launch "Sky Cloud Plan" 10 million support cloud computing every year

"Guangzhou Cloud computing industry 2011-2015 years of Development Action plan" ("Sky Cloud Plan") yesterday in the Guangzhou Technology and Information Network officially released. Planning proposed that Guangzhou should "lay the groundwork for three years and see results in five years". By 2015, more than 5 international level of cloud computing services platform, cloud computing industry will break through the scale of 15 billion yuan, and drive 60 billion of related industrial chain value. In order to ensure the smooth implementation of the cloud plan, Guangzhou will improve policy matching and increase the investment in funds, plans to continuously improve the cloud service procurement in the Government information procurement of the proportion of expenditure, from this year to 2015 ...

Cloud computing needs better security standards

Gartner's latest study predicts that all cloud-sector businesses will continue to grow in double-digit numbers. But outsourcing key functionality to third parties also invites users to focus on security issues. When an enterprise runs the IT business internally, it can define and control the security protocol. But how do you know where the security protocols are when you rely on cloud service providers? And how do they do it? To solve these problems, the cloud industry itself is evolving and adapting its architecture. By defining the security standards for the cloud, it is the best solution--to provide in its industry ...

Analysis of the security and energy consumption of cloud computing and its development trend

Introduction with high-speed network development, growing network demand through large-scale data center processing, thousands of servers and network system storage, many internet companies such as Google, Amazon, Yahoo and other operators around the world such a large data processing center, this network service is called Cloud computing services. From the cloud computing service model, security is facing the problem of data privacy security, the data outsourcing to the cloud service providers how to ensure data privacy and security, the second is the credibility of services, how to determine the cloud service provider feedback Services is credible, the loss of data physical control and data location is not accurate ...

Connecting to the Cloud, part 3rd: Cloud Governance and security-securing Hybridcloud applications

This article is the 3rd and final part of a series of articles on building mixed cloud applications, examining governance and security for cloud computing. This article expands the Hybridcloud application for part 2nd by examining how to add access control policies to the Amazon simple Queue Service (SQS). Learn more about how Hybridcloud applications authenticate themselves to cloud services ...

How to choose cloud computing service provider?

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; When the enterprise is just beginning to use the public cloud services, the market has emerged a large number of cloud computing providers, the type of cloud computing, the number of service providers, so that enterprises dazzling. So how do our companies choose a suitable cloud provider to get cloud services? In general, the study of cloud computing service companies to spend a few months time, but after many more than ...

Standard helps push large data center forward

With the deepening of information construction, as well as the rise of cloud computing, large data and other emerging technologies, China's large data center market has never been more vigorous.   According to IDC forecast, 2012 to 2017 China data Center market composite growth rate of 9.8%, 2017 the overall size of the market will reach 19.03 billion U.S. dollars. In the face of such a rapid development of the data center market, how to ensure its orderly and healthy development, has become a general concern of the industry. Recently, the reporter specifically visited the Ministry of Communications Institute of Telecommunications Standards Institute of the Internet Center Director He Baohong and work letter ...

Design and implementation of a cloud computing Environment Network Security Service architecture

1. Research background cloud Computing is the product of Grid computing, distributed computing, parallel computing, utility computing, networked storage, virtualization, load balancing, and the development of traditional computer technology and network technologies. With the help of SaaS, PaaS, IaaS, MSP and other advanced business models, this powerful computing power is distributed to the end-user.   The core idea of cloud computing is to manage and dispatch a large number of computing resources with network connection, and form a computing resource pool to serve the users on demand. As cloud computing gradually becomes ...

Smart city cloud security faces five challenges

Now all over the country have set off the upsurge of intelligent city construction, many enterprises began to try to use public cloud technology as the core to improve it resource utilization, promote intelligent medical care, intelligent education, intellectual mining and other information construction, such as telecommunications cloud, municipal cloud, education cloud, community cloud, tourism cloud, etc. for all kinds of top-level applications to provide support. In addition, all over the country, including operators of large enterprises are pushing it private cloud landing, improve the efficiency of enterprise IT systems. However, the security threat brought by cloud technology is the biggest challenge for the current cloud business development and even the future network society. Especially faced with the constant occurrence of clouds ...

Oracle is actively expanding Oracle Cloud services Portfolio

Oracle Global Assembly, October 2, 2012-Oracle is aggressively expanding Oracle Cloud Services (Oracle Cloud Service) portfolio, Kurian, Oracle's vice president for product development, said yesterday. The move further delivers Oracle's broadest and most advanced cloud strategy commitment, while demonstrating the significant growth momentum presented by Oracle's key customers and partners in the cloud services industry. 7 of the latest and previewed Oracle cloud services offerings significantly enhance Oracle Cloud service array ...

Cisco forecasts: 2018 Cloud services will account for 76% of data center traffic

In a report published by Cisco, it predicts that cloud computing will account for 76% of global data center traffic over the next 4 years. As more companies adapt to cloud computing technologies, these flows will include public cloud computing services. Software as a service will account for nearly 60% of cloud service traffic. Cisco also predicts that total data center traffic will grow by twice times, from 2013 's 3.1-kilobyte (1-gigabyte-byte equals 1 billion TB) to 2018 's 8.6-gigabyte, with an annual growth rate of at least 23%. Of course, global cloud service flows are growing faster than global data center traffic. 2013, Cloud Clothing ...

A lie about cloud computing security: Private cloud is safe, public cloud is unsafe

Bernard Golden, chief executive of Hyperstratus Consulting, wrote that one after another survey showed that security is the most worrying issue for potential users of public cloud computing. For example, a April 2010 survey found that more than 45% of respondents said cloud computing risks outweigh the benefits. A survey conducted by CAS and Ponemon Cato also found that users have such concerns. However, they also found that, despite the user's doubts, cloud applications were being deployed. Similar to ...

Cloud computing standards: three major models and four configurations

"Cloud computing" can be either a hyped, doomed term, or perhaps the most wonderful prospect of future information technology, depending entirely on the object of your conversation. Despite the current hype over the concept of "cloud", we still believe that time will prove the value of these campaigns. Those who are entrusted with the task of developing it strategies or protecting the organization's information assets have a responsibility to adopt a cautious approach to cloud computing. However, this cloud technology and its business model of the spring and autumn era, but also for you to open a critical opportunity for you to develop from the "trusted Cloud" to obtain ...

Two big lies in cloud computing security

Public cloud computing security--the most worrying problem for potential users One example of the public cloud computing security problem is that a April 2010 survey found that more than 45% of respondents thought cloud computing risks outweighed earnings. A survey conducted by CAS and Ponemon Cato also found that users have such concerns. However, they also found that, despite the user's doubts, cloud applications were being deployed. The continued release of similar surveys and results suggests that mistrust of cloud computing security continues. Admittedly, most of the security of cloud computing ...

Design and implementation of a cloud security service architecture

1. Research background cloud Computing is the product of Grid computing, distributed computing, parallel computing, utility computing, networked storage, virtualization, load balancing, and the development of traditional computer technology and network technologies. With the help of SaaS, PaaS, IaaS, MSP and other advanced business models, this powerful computing power is distributed to the end-user.   The core idea of cloud computing is to manage and dispatch a large number of computing resources with network connection, and form a computing resource pool to serve the users on demand. With the cloud computing gradually become the trend of future development, has been the current industry and even the whole ...

Virtualization, cloud computing, open source code, and more

A, virtualization virtualization refers to the ability to simulate multiple virtual machines on the same physical machine. Each virtual machine has a separate processor, memory, hard disk, and network interface logically. The use of virtualization technology can improve the utilization of hardware resources, so that multiple applications can run on the same physical machine with each other isolated operating environment. There are also different levels of virtualization, such as virtualization at the hardware level and virtualization at the software level. Hardware virtualization refers to the simulation of hardware to obtain a similar to the real computer environment, you can run a complete operating system. In the hardware virtual ...

How to securely move data in cloud computing

As we all know, cloud service provider Nirvanix Company recently declared bankruptcy, let its customers into trouble. Nirvanix provides companies less than one months to transfer data. To avoid being relegated to the same situation as these customers, organizations should follow the best practices below to move data securely. Due diligence: The financial situation in the first Cloud security Alliance's February 2013 report, "the major threat to cloud computing in the 2013", shows that lack of due diligence is a continuing threat to cloud computing. When companies are evaluating cloud computing providers, their perception of things is ...

China's cloud computing research and development capabilities have become obstacles to development

On the surface has been exceptionally "cloud computing", in fact, not so good-looking inside. According to the recently released research report on China's cloud computing from the Ministry of Industry and Information Technology, the public cloud service market in China only accounts for 1/30 of the United States, and there is not yet one-third of the cloud computing revenue of an Amazon enterprise. Nowadays, as the Microsoft Azure cloud platform enters the market of China to stir up, whether it is the already laid-out Internet giants such as Ali, Shanda, Tencent, Sina, or the operators that take advantage of the network strength to enter the cloud market to break the "public cloud insecurity, private cloud Too expensive "status of the industry, forced eyebrows ...

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.