The world's major technology companies compete in the cloud computing market, Microsoft machine election to strengthen the transformation

[summary] Amazon's rivals include Microsoft, and the new chief executive, Satiana della Satya Nadella, has made it a priority to raise cloud business revenue. "Microsoft will continue to transform, strengthen our strategic priorities and expand our leading edge in cloud computing," Nadra said in a conference call with the fiscal quarterly earnings analyst. "Sadie Network News" March 9, according to foreign media reports, the world's major technology companies compete in the cloud computing market, what they intend to do? The scale is close to 300 billion dollars (about 18460 RMB).

The future big data security to watch a lot, which enterprise is more tough

When the data is more and more and the network is more and more common, the traditional security protection mode of setting boundaries is more and more powerless.   With large data technology for security analysis, that is, large data security analysis methods, gradually into the mainstream. IDC predicts that by 2020, cloud security, Internet security and large data security will be the three pillars of the information security market, and that large data security is the key to ensuring enterprise security in the future. As early as two years ago, Gartner had predicted that the boundaries of security would become increasingly blurred and that big data would be the key to solving security problems. and g ...

Cloud security governance should be valued by industry

It leaks have raised public concerns about cloud security. To limit potential problems, enterprises must consider governance requirements, tools, providers, and more. The security of applications and data is critical to any enterprise, but responsibility is not evenly distributed. As a result, it organizations need to develop a cloud security strategy that will identify compliance policies or principles that the rest of the enterprise needs to comply with. The public cloud eliminates part of the infrastructure and management overhead of traditional data centers, but the burden of meeting cloud governance needs rests with the IT department. In the changing ...

Wave information to be launched before the end of the "cloud computing" operating system

NetEase Financial October 31 News of the wave of information issued stock trading abnormal fluctuations in the audit bulletin, the company does not exist on the company should disclose the major issues not disclosed, the company will be launched by the end of the "cloud computing" operating system.  The company's controlling shareholder Wave Group Co., Ltd. promises that there is no such act as a major asset reorganization, acquisition or issue of shares within 3 months. The company will "cloud computing" operating system and large servers and other core equipment as a breakthrough focus, to provide users with soft and hard integration of the infrastructure solution, and the "industry cloud" as the current major development areas. ...

Wave information focus on breakthrough cloud computing today trading

NetEase Financial November 1 News of the three consecutive trading tide information, since October 27, the tide of suspension of information disclosed today the verification bulletin.  Wave information indicates that the company does not have a significant impact on the stock exchange price of the undisclosed material information, the company, the controlling shareholder and the actual control person does not have the disclosure should not disclose the important matters, and also did not buy and sell the company stock situation occurs. However, the "cloud computing" concept of the market stir-fry, the wave information has made a concise explanation. Wave information, although the company has "cloud computing" operating system and the big server, such as core equipment as ...

Wave information proposed to raise 1 billion yuan to raise capital cloud computing

NetEase Financial February 11 News of the wave of information at night announced the targeted additional plans, the wave of information to be no less than 17.81 yuan per share of the price-oriented additional 57 million shares, the estimated capital of 1,003,660,000 yuan for cloud computing operating system research and development upgrades and container Mobile data center research and Development.  Among them, cloud computing operating system research and development upgrade and industrialization project to invest 340 million yuan, container mobile data center research and Development and industrialization project investment 663 million yuan. Before the issue of additional, wave information holding shareholder Wave Group Co., Ltd. holds wave information 48.3 ...

Wave information focus on breaking cloud computing today unlimited Trading

NetEase Financial November 1 News of the three consecutive trading tide information, since October 27, the tide of suspension of information disclosed today the verification bulletin.  Wave information indicates that the company does not have a significant impact on the stock exchange price of the undisclosed material information, the company, the controlling shareholder and the actual control person does not have the disclosure should not disclose the important matters, and also did not buy and sell the company stock situation occurs. However, the "cloud computing" concept of the market stir-fry, the wave information has made a concise explanation. Wave information, although the company has "cloud computing" operating system and the big server, such as core equipment as ...

Feng Jinghui: Domestic DDoS attack is very serious

Absrtact: Feng Jinghui is the founder and vice president of safety Bao, the chief architect of security system architecture. Before the creation of the safety treasure, he was at that time in China's largest anti-virus enterprise rising company as a research and development manager, enterprise product line technical director, etc., led the team in the enterprise-class security product line developed a large number of products. "SaaS Pioneer" series continues to present for you, in the previous installments we have focused on sharing the domestic CRM, collaborative office and other fields of pioneer Enterprises, today we bring the domestic security field has a special impact of enterprise-safety treasure. Safety Treasure is the first in the country entirely based on SAA ...

Open source software Xen warns of high-risk vulnerabilities, multiple cloud services to take action

Many cloud computing services face a brief outage due to the new open source software Xen update to fix the vulnerabilities found. Xen is well known in the cloud computing industry and is developed by the University of Cambridge, where users include mainstream vendors such as Amazon EC2, Aliyun ECS, IBM SoftLayer, Linode and Rackspace Cloud. By Csdn, Tencent, Tencent Cloud, Tencent Foundation sponsored by the "Open Source technology Conference 2015" (Open source Marvell Conference, abbreviation O ...

Ming Road CEO Xianghui: Major elimination of obstacles in the next few years

Absrtact: Ming DAO is an enterprise information management application which can be synchronized in PC and mobile end. At the same time, open interfaces to third parties, developers can put their own research and development applications on the Ming Road Platform for enterprise selection, there are currently financial, human, marketing, storage, efficiency management and other fields of application in the Ming road shelves in the interview of Ming Road CEO Xianghui, he gave me the first impression is unusually agile thinking, Talk simple and clear and to the point, originally prepared for half an hour of interviews, the results of 20 minutes will end the fighting, saying that the author of the Long Interview "at first also refused." Okay, here we are.

Microsoft Cisco has teamed up to look at cloud computing services

Dry Goods: Microsoft and Cisco announced the expansion of both sides in the cloud and data center cooperation, and release Cisco Cloud architecture for the Microsoft Cloud technology platform, Designed to promote Cisco's network devices and servers to telecom operators and other cloud computing services, as well as Microsoft's Windows Azure Pack. Microsoft and Cisco announced in Wednesday to expand their cooperation in the cloud and data center. Two technology giants announced their market-entry partners last July ...

2015, Century Interconnection will focus on building cloud ecosystem construction

"IT168 Information" March 12, in a media editor of the spring meeting, the Century Internet Blue Cloud Division President Covenda revealed that as of 2014, the number of Windows Azure cloud services operated by the century has reached 50,000 users, and another office 365 of the trial users also totaled 35,000. After the successful introduction of Microsoft Cloud computing services and the landing of the Chinese market in 2015, century Interconnection will focus on the construction of the cloud ecosystem. Blue Cloud: The first "international cloud" as early as 20 ...

The future of cloud computing in China and how to achieve

The cloud, which was once fired up in the country, has recently fallen silent. But in foreign countries, but some moderate and dynamic. In the early March 12 of Beijing time, cloud storage company Box released its first financial report since its IPO in January 2015, with box stocks plunging 16% after the losses, as earnings were bigger than expected. The big losses in box and the plunge in stocks are likely to surprise many people. This can not help but reminiscent of the domestic cloud computing enterprises, China's cloud computing where to go? In response to this issue, the author interviewed Daocloud co-founder Beijing-based. In no ...

Zhang Qi: Cloud computing security is the most important

RSA General Assembly Information Security International Forum has been working to attract the global elites in the field of information security to explore the most focused topics in IT security field. With the increasing importance and impact of IT security, the RSA General Assembly Information Security International Forum has played an indispensable role in keeping global security experts in communication. 2011 RSA General Assembly Information Security International Forum will focus on application and development, cryptography and architecture, hackers and threats, mobile and network security, and trusted computing and cloud computing. More than 50 Chinese and foreign information security experts will be divided into ...

How to apply cloud storage in cloud computing background

Many people would argue that two copies are better than one. But redundancy also costs. Also, you need to spend the cost of managing two backup destinations while enduring the less-than-certain success rate of recovery with tape, disk, or cloud. This may sound difficult to solve. The key to an efficient backup strategy is to clearly define what each type of backup needs to accomplish and to combine it organically. The hybrid approach is not just about two backup copies, it's not just about choosing a software vendor or a service provider. A hybrid backup will help you develop and implement a smart and cost-effective whole-disk backup recovery plan. Small and medium ...

Cloud computing is the wings of Smart city development

The pace of urbanization is getting faster. According to statistics, 70% of the population will live in the city in 2050. Cities are growing, populations are exploding, traffic is deteriorating, pollution is severe, energy consumption is staggering, medical resources are scarce and living costs are rising. A collection of multiple applications, for many industries, a systematic platform is ready to resolve the contradictions between resources and needs, this is the concept of intelligent city. Intelligent City is an innovative urban environment form under the support of new generation information technology. The core concept of intelligent city, on the one hand, is people-oriented, on the other hand, constant innovation. The construction of Intelligent city ...

Tips: Some suggestions for outsourcing cloud computing security

Many companies have either configured cloud computing or are about to configure cloud computing. Cloud computing is the latest technology to improve flexibility and reduce costs.   By providing bundled, scalable software, infrastructure, data storage, and communication solutions, outsourcing cloud computing vendors saves money, avoids high-cost it commitments, gets the scale of an effective system on demand, and can quickly configure the latest services. What to consider before you walk in the clouds however, without a free lunch, outsourcing cloud computing cannot solve legal risks (along with third-party awareness of data storage and transmission locations ...).

Cloud computing security threshold Enterprise hesitated?

In terms of cloud computing security, there is a question mark hanging over the head.    The concept of cloud computing, which keeps corporate data in a data center outside the corporate firewall, and accesses it over the Internet, does make many businesses feel unreliable.    Should companies worry about cloud computing security?    Cloud computing does raise a range of new cloud security issues compared to traditional technology projects, but from an expert point of view, cloud computing is actually more secure than traditional technology projects. Ovum chief analyst Graham Titterington believes that cloud computing ...

How do you plan to implement a cloud computing network?

Cloud computing represents a huge change in business functionality, especially for an organization's IT infrastructure. No one can feel the impact of this change more than Internet managers, because their task is to ensure the security of institutional data and network users. While sharing data, applications, and it infrastructures can bring significant cost and productivity benefits, they only occur outside the ideal area of the enterprise firewall and physical environment. As a network manager, your task in the cloud computing process is to deliver data, applications and infrastructure to the cloud, and still ...

Hacker attacks increasingly strong cloud computing security crisis increases

Hacker attacks more powerful wisdom security network in the past year in the commercial computing system, the number of loopholes in the amount of, although similar to previous years, however, hackers targeted these vulnerabilities to take the frequency of locking attacks is increasing, that is, not patched or updated system vulnerabilities, is bound to expose the safety of enterprises in high-risk groups. Nearly half of all security vulnerabilities are not core systems, but are most likely to be in Web application, or plug-in portal interactive services sites, but these vulnerabilities pose a great threat to the overall security of the enterprise. Network attack packs and botnets, which can be easily purchased on the web and used to attack businesses ...

Total Pages: 418 1 .... 37 38 39 40 41 .... 418 Go to: GO
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.