Three deployment modes of Datang Mobile cloud computing platform

Introduction to cloud computing concept in October 2007, when IBM and Google announced their collaboration in cloud computing, cloud computing attracted a lot of attention and quickly became a hot spot for research in industry and academia. Cloud computing is more advanced than traditional logical abstractions, and underneath it is the multi-level virtualization technology that enables the abstract process of physical motion to logical motion. At a high level, cloud computing is a resource integration and utilization technology, the underlying technical support is mainly virtualization technology. Virtualization technology is the key technology to realize cloud computing. A single server can support multiple virtual machines running multiple ...

Ufida Accelerate Cloud computing transformation focus on the development of private cloud Platform

Through the management software to the Cloud Computing transformation machine, the domestic largest management software manufacturer Ufida Co., Ltd. to the old opponent Kingdee base in Shenzhen to launch an attack. Recently held in Shenzhen, "Happy Shenzhen Happy Enterprise-2011 Shenzhen Enterprise Information Conference" on, Ufida senior vice President Zhu Tiesen said, "Guangdong Ufida Group is the largest domestic market, in Guangdong's market share has already surpassed rivals, the future Ufida will comprehensively upgrade Shenzhen in the group's strategic position." "Ufida CEO Li You explained further, the company will focus on developing private cloud and e-commerce in Guangdong ...

Pacific Telecom builds green cloud computing platform

Cloud computing as the 2011 the highest rate of it terminology, much attention. But many people know cloud computing is still foggy, and the "Shenzhen Cloud" has been the rain landing: Shenzhen is one of five domestic cloud computing pilot cities, Shenzhen, the first development of cloud computing industry in the country, set up the first cloud computing Industry Association, the Establishment of cloud computing center and the Establishment of Cloud computing alliance. At present, cloud computing has been considered as an important project in the "Twelve-Five industry planning." According to the authority of the forecast, China's cloud computing industry in the next few years the annual composite growth rate will exceed 80%, to "Twelve-Five" end, the output value will be broken billions ...

Cloud computing: The PAAs you need to know

Cloud computing discussions always start with the IPS Category: Infrastructure as a service (IaaS), platform as a service (PaaS), and Software as a service (SaaS). The advantage of this classification is that it is easier to understand and that the assessment requirements can be properly developed. Want an application? A single purpose application (human resources, finance, printing, etc.) can be found in software as a service provider. Want to write your own application? You can find an infrastructure, a service provider, that allows you to create your own custom applications. While focusing on the application functionality, you want to understand how to use the software advantage of others to manage ...

Sina Cloud computing platform SAE new online: Enhanced application Store

September 15 News, as the first public cloud computing platform, Sina Cloud computing strategy of the core components of Sinaappengine (http://sae.sina.com.cn) recently a new version of the online, the page continues to maintain a "concise, fresh" style, emphasis on strengthening the user experience, In particular, Web developers ' application development hosting requirements. This revision pays more attention to the detail, and has carried on some unique innovative visualization design, further strengthened the page navigation, the application store, the interactive feedback and so on function. Basic functionality to continuously meet the potential needs of users ...

Cloud computing terminology Interpretation--cloud bursting

Cloud Burst (cloud bursting) is an application deployment pattern that runs in a private cloud or data center and suddenly enters the public cloud when the demand for computing power reaches its peak. A cloud burst (cloud bursting) is an application deployment pattern that runs in a private cloud, or data center, and suddenly enters the public cloud when the need for computing power reaches its peak (the common cloud). This hybrid cloud (hybrid cloud) ...

Cloud computing, mobile Computing, memory computing and management software integration prospects

After years of accumulation, China's industry information market is in the critical period of transition from "external force traction" to "domestic demand". Informatization has become the key means and new impetus of enterprise reengineering business model, continuous optimization process. CCW Information believes that the change of enterprise Information application power and the combination of new technology and service will cause a series of changes of information application. First of all, the company's demand for service providers has changed. The demand for service providers ' comprehensive service ability is increasing. Companies require service providers to provide a package of solutions to meet better support ...

Cloud computing Downtime Warning record

When it comes to cloud computing, users and vendors are still exploring uncharted territory when they adopt the new infrastructure. Failure problems and unexpected downtime will inevitably occur. Even the biggest and best cloud makers are in vain before their services are occasionally "stopped". So what went wrong in the event of a cloud outage? What can IT managers and users learn from every event? To help readers better run their services, some downtime events are sorted according to the severity of the downtime incident. Microsoft is even testing ...

Side effects of security: advantages and disadvantages of cloud computing security

Computer security was an easy job decades ago, and computers in that era were placed in a tightly guarded room. The head of the engine room will take your punch card in front of the window, and as long as the card that holds the code is not folded, damaged or truncated, it will be read by the Hollerith reader and executed on the computer. Only one program can be executed at a time. Of course, if your program is wrong, it will be a few hours or a few days after the supervisor returned to request debugging. (in the age of the FWIW card rule, careful design, architecture and desk checks are routine;

Sheng to the loss of user data the road to domestic cloud computing is still very long

August 6, Sheng was damaged by a physical disk, causing user data loss. After the incident, Sheng issued a statement on his official microblog. The following picture: In the statement, Sheng expressed the apology to the user. But also caused by netizens and industry professionals questioned. Have Netizen Blunt, Sheng host like is 5 years ago already eliminated host virtualization technology. Some netizens also pointed out that physical disk damage is unavoidable, but the service providers know that it is difficult to avoid also caused accidental losses, the blame. In general, the sound of questioning is mainly focused on "in order to avoid your accidental loss ...

Cloud computing security is fundamental to the virtualization technology of the Agency

The UNDP virtualization technology requires effective security tools and best practice scenarios. As new technologies and solutions evolve and are widely used by enterprises, it is imperative for IT staff to maintain information security. In the past, the information chief or other decision makers could store confidential information on a single entity server, and then restrict access rights. But with the advent of virtualization technology, today's security issues have become more complex, according to Joe Baguley of SC Magazine. Global Enterprise Server Virtualization market will be 3 per year ...

Please do the cloud computing service error Preparation

Cloud services will inevitably fail. Some of the failures are temporary and others may be much more serious. It is important that you prepare for it. All services run smoothly in the cloud until a certain moment of failure occurs. Consider Microsoft's so-called "leap Year" (leapyear) software bug, which caused the company's Azure cloud computing services to collapse last month. Billlaing, vice president of Microsoft's server and cloud computing department, described the system failure in post, claiming that Microsoft would improve disaster recovery and other aspects of the business in a comprehensive way ...

Analytics: Cloud computing Security protection applications

Event playback In recent months, many consumers to the media complaints into the "broadband discount" scam, and the situation has become increasingly fierce. Scam by means of buying a mobile phone network can enjoy a "lifetime discount", to buy high-definition player can reduce the monthly broadband fee, and then to add money can do a wide variety of broadband speed, and so on. Of course, the pretext of perfection is not likely to deceive the consumers fully believe that there are supporting measures. Consumer's address, broadband account number, ID card numbers and other information readily available, there is no omission. The beginning of the scam stems from a disguise.

Cloud computing realizes single sign-on upgrade convenience at the expense of security?

Managing a single cloud service is challenging for service providers, not to mention multiple cloud services. But many companies are working on multiple cloud strategies that seem to conflict with the customer's uncomplicated and bulletproof security strategy. The customer requires single sign-on (SSO) functionality, but the provider and customer must ask themselves whether the convenience of cloud SSO is worthwhile for their potential security letter. Cloud providers say they now face a daunting challenge: they must push end users and IT managers to use multiple sign-on to maintain security, or they must find out how to secure a federated cloud ...

Cloud computing era needs to provide integrated security cloud services

The internet has changed our lives, and cloud computing is changing the Internet. In the future, only need a notebook or a mobile phone, you can through the network services to achieve everything we need. But, the great convenience, also contains the great danger, whether cloud computing will provide a newer and bigger "stage" for the network hacker? Does its open posture open up the Dora box and run out of countless demons from inside? In the face of these puzzles, how do we build a "security cloud" environment? In this regard, Fei TA (China) Technical director Li Hongkei that the key in the information security framework on how to protect the "public ...

Three hidden risks of cloud computing

While cloud computing is attractive in terms of both management and efficiency, it also poses a variety of known and unknown risks, according to a recent cloud computing risk report from Cornell University Labs. The well-known risk topics of cloud computing include information security risks, internal attacks, and cloud downtime. The Cornell University report says there are three hidden risks to cloud computing: as third-party cloud services increasingly take multiple hardware pools, unpredictable interactions between load balancing and various loosely-dispersed cloud services can lead to "cloud downtime". Two...

Cloud computing focuses on virtualization security

Cloud computing Globalization in the wave of development, cloud computing from the original concept of the various applications to the landing, its advantages gradually revealed. The world's leading companies are also starting to chase the pace of cloud computing. In this situation, the domestic "cloud" footprint is not to be outdone, all over the cloud data center has been planning and construction.   And the important challenge that restricts the popularization of "cloud computing" is still the security issue.  Virtualization security is the focus of cloud security technology is mostly focused on virtualization security, the security technology for cloud applications is not much involved. ...

McAfee deploys four centers of gravity in cloud computing security market

Last year the US announced its support for cloud computing and the green economy, hoping to compress government spending and support environmental protection. This March, French police said the 25-year-old French hacker "Hackercroll" was arrested for hacking into Obama's Twitter account.   Given that Obama's accounts can be hacked, can the data security of cloud computing users be guaranteed? Market research reports show that 87.5% of users currently believe that "security issues" is the main obstacle to their use of cloud-related services, and "Enterprise intelligence Research" results also show that the safety of ...

Virtualization and cloud computing security divide security experts and it

Does migrating to virtualization and cloud computing simplify network security or complicate it? When it comes to the problem of 2,100 it elites from 27 countries, their reactions are mixed, which suggests that there are different approaches to security within the enterprise. Nearly one-third of companies see virtualization and cloud computing as adding to security difficulties, while another one-third think the difference is small and the remaining one-third means simplifying security maintenance, according to a report on the 2010 Corporate Security Survey-global data. The telephone survey was last month by Applie ...

Intranet security technology involves privacy and cloud computing considerations

Intranet security Behavior audit can find a lot of intranet security "inside Ghost", but domestic for "behavior audit whether infringement of personal privacy" has been debated. From an enterprise point of view, the deployment of behavioral monitoring and behavior audit products is understandable, this is an important step in corporate compliance. such as Mail archive and auditor, this is very necessary work. From a technical point of view, behavioral audit does not necessarily violate personal privacy, or not completely violate personal privacy. Only need to provide some key audit words, by means of software, and strictly limit the trial ...

Total Pages: 417 1 .... 35 36 37 38 39 .... 417 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.