Based on the large data experience brought to us by cloud computing

Source: Internet
Author: User
Keywords Cloud computing suppliers large data security


Cloud's supply-chain solution, http://www.aliyun.com/zixun/aggregation/12240.html "> Data and data-sharing methods have not revolutionized anything." Here are some of the experiences and lessons that these solutions can teach us about big data.



Cloud-based solutions provide great value to the enterprise, and there is nothing more obvious than cloud computing's ability to handle large data.



This is a good illustration of the cloud solution of the supply chain, where the methods of data acquisition and data sharing have not undergone any revolutionary changes in a long time.



In the past, the supply chain of an enterprise has been certified by the Enterprise ERP (Enterprise resource planning) system for each supplier, using EDI (Electronic data Interchange) access methods to deal with thousands of suppliers. Using EDI, test the API (Application programming interface) between the vendor and the enterprise repeatedly until all data transfer and security permissions are realized. At this point, the supplier is allowed to enter the enterprise's ERP system to complete the business. This process is laborious and repetitive. This is a real it resource consumer.



Then, the cloud Solution's supply chain enables thousands of pre-qualified suppliers and producers around the world to enter a secure network. In this network, data and even large data are shared and protected throughout the network, rather than through continuous and repetitive vendor certification. Cloud providers are responsible for sharing data pools, not only transactions, but also shipping and bill of lading documents, orders, product specifications and schematics, and any other documents that are considered important in the manufacture and carriage of goods. The end result is a single data repository in the cloud with a combination of a variety of data, anyone who has the right settings allow access to the network has access to secure data in the cloud.



The manufacturer and supplier of each product in the network, in a single data repository, is the concept of a converged central network, structured, semi-structured, and unstructured data that some enterprises have considered, but they need to see results in the business process. Today, the new vendor's cloud network deployment process can be implemented within a few hours. In the era of electronic authentication, the process could take months. Chaotic communications rarely occur in the cloud because each participant has the same cloud resident database. Cloud manufacturers and vendor networks also enable many different businesses to use popular operations to exchange standards and large datasets, and to do this safely.



How does cloud computing do all this? By marking the name of each large data, anyone can easily access it and by giving each trading partner a set of business rules in the cloud network, allow each partner to specify security permissions and privileges so that each individual within the enterprise can exchange large data information with other enterprises.



Companies have taken a meaningful step to leveraging cloud solutions to deal with external business processes, but internal systems are not yet well resolved. At the same time, it is now time for companies to take a closer look at what cloud computing has already been deployed, and to learn from the relevant "lessons" to facilitate their own internal systems and processes for large data. These lessons include:



"A single version of the Truth," whether you're dealing with structured, semi-structured, or unstructured data, the more you consolidate the information into a set of facts and figures and graphics, the more people working in an enterprise can avoid the confusion caused by different systems spouting different data. When you build your large data "Data mart", it is an excellent opportunity to standardize these fairs so that "do well." ”



The use of rights management to ensure the security of large data, control of individual business units. A mobile security Rights Management end business unit (rather than using it as the primary administrative authority) to create flexible communications. However, this should be particularly cautious in order to maintain the safety standards of the enterprise. It is advisable to involve external security compliance experts in the process.



Treat your data in a more "democratic" way, whether large or small. Central data repositories operate well in the cloud because they store large or small data with specific business functions. Enterprises should build data marts in the same way.






(Responsible editor: Schpeppen)


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.