The views of enterprise IT professionals on virtualization and cloud computing

The Gartner Data Center Conference (Datacenter Conference) was held in Las Vegas, USA in December 09, and the Enterprise IT professionals presented their own views on virtualization and cloud computing. From the point of view of information security, Gartner analysts and attendees have given me some insights into cloud computing. 1. Virtualization is justified: VMware's curriculum is full, and most of the courses on virtualization and storage exchange networks are surging. The course on virtualization security mentions a heavy ...

Unified communications technology migrating to the cloud

New research finds that unified communications technology is migrating to the cloud. Technology vendors are now working more closely with voice IP hosting providers, leading several branches of unified communications technology to migrate to the cloud, according to a report by ISUPPLI, a market research firm. They include "Mixed versions" of client-owned device management or hosting services, targeting mainly small and medium-sized enterprises, full hosting for small business enterprises, and improved broadband telephony services for small office/Home Office users. Cloud's migration indicates that the supplier is beginning to make unified communications ...

Cisco's chairman and CEO defines cloud computing as "a security nightmare"

When the words "cloud" and "security" are put together, has always been a frown on the business world, the most sensational remark the journalist had heard at the RSA security Conference in San Francisco this April was Chambers, the Chairman and CEO of Cisco, who directly defined cloud computing as a "security nightmare", apparently If cloud computing does not solve security problems, the imaginary "cloud revolution" or "Internet of Things" era will be a bubble. The traditional security approach to cloud computing security is clearly at a dead end, new scientists have suggested that since the cloud can be traced ...

The importance of cloud security

So far, the Cloud Security Alliance has issued reports on more than one occasion, advising and urging companies to take measures to better protect cloud services. The Cloud Security Alliance's new report defines the definition of cloud computing as well as the definition of the international Standards and Technology Association (NIST), as well as the need for self service, broadband network access, resource sharing, rapid configuration and scalability, metering and usage. NIST also divides cloud services into three categories: software services (SaaS), where applications are provided by service providers, and platform services, where providers provide tools and programming languages, customers develop and deploy their own applications;

How to drive cloud computing and application services

As one of the most popular words in the 2009, "cloud computing" is familiar to everyone, but to achieve cloud computing is not an easy task, so that users to use and pay is more difficult. How to promote cloud computing and application services is very important. Cloud computing Application Services market choice in the cloud computing market, according to the different positioning can be divided into two types of roles, suppliers and operators. Suppliers help operators set up cloud computing applications and services, while operators peddle services to users. In the provision of cloud computing services, the current major focus on the traditional IDC upgrade to build the cloud Computing data center and its ...

The current situation and development trend of cloud computing security

December 8, 2009, RSA Chief Technology officer Bret Hartman came to China, ZDNet reporter interviewed him. Mr. Bret Hartman and I shared RSA's current status and trends in the area of cloud computing security. Bret believes that cloud computing will face more security threats, companies should devote more effort to ensure the security of the cloud, dynamic password technology will gradually become mainstream. Cloud computing security crisis when it comes to cloud computing security, Mr Bret Hartman stressed that security in cloud computing environments ...

Three development trends of Internet security

According to foreign media reports, IBM Internet Security Research team on the 2010 Internet security trends have been forecasted, and summed up the three major trends. In the past year, the Internet security situation is not optimistic, worms rampant, fake anti-virus software emerging, then 2010 will show what trend? 1. Pirated software is far more harmful than expected pirated software can not be updated, because of the lack of patch protection, users can only be exposed to a variety of hazards. Moreover, some of the new version of pirated software itself is pre-installed malware, is a veritable virus propagator, thus to the global ...

More and more companies are turning to cloud computing services

According to foreign media reports, Microsoft's former chief security officer and White House Network security Advisor Schmidt (Howarda.schmidt) recently received an interview that "bad guys" on the internet-hackers, cyber-criminals and cyber-fraudsters, Their Internet attacks are increasingly organized and targeted. As companies begin to turn to cloud services, these companies are wary of the network security problems they have faced, and are making them more cautious lest they fall into the same trap in the future. Information security Forum may give itself the world ...

Cloud resources may continue to deteriorate security and file transfer issues

In a service-oriented architecture, testing does not save application uptime. Yes, the runtime process and the environment must be tested, but developers can benefit greatly by looking at the capabilities of the service in a subtle way. A common problem is that the culprit that can hinder service performance is the attachment. Transferring large files is a chronic problem that has plagued the IT community for years. The problem could get worse because cloud computing provides seemingly limitless resources on demand, says Frank Kenney, Gartner research director. "When we started using more cloud-based services, ...

Identification and data protection in cloud computing

The RSA,EMC (NYSE:EMC) Information Security Division has released a new rsa® security profile entitled "Identification and data protection in cloud computing: Best Practices for building a trustworthy environment". This overview provides guidance and the best possible solution for organizations that need to address identity authentication and data security challenges in cloud computing. The RSA security profile for this issue brings together top technical experts in cloud computing security to help organizations understand how to build a trusted environment for cloud services, how to defend against cyber fraud, and how to respond to new cloud environments ...

Talk about trend technology and some of the interesting work that IBM has done

I'm beginning to think that the fear of cloud security is a bit exaggerated, "51cto.com." Reason? Because a smart framework for protecting data, applications, and connections is already there. It's called "encryption." is now in development, and is nearing perfection is a set of agreed implementation and best practices. With this article, let's talk about some of the relevant and interesting work of trend technology (Trend Micro) and IBM. As for trend technology and IBM, what we see in addition to industry leader identity, ...

Intel and Huawei strengthen deep cooperation in cloud computing

Huawei's Fusionsphere cloud operating system has intensified in-depth cooperation between the two sides, the company announced on September 3 at the 2013 Huawei Cloud Computing Conference (HCC 2013), and Intel, the leading maker of global computing innovation, to collaborate on cloud computing. The integration of Intel's hardware platform in the virtualization of innovative technology, performance and reliability, compatibility, security and so on have been continuously upgraded. Fusionsphere is an open, efficient cloud platform, providing data center-oriented heterogeneous manufacturers computing, storage, network resource pool level of integration for customers ...

Wind River OVP promote cloud computing development

"News Points" · Wind River Open Virtualization profile ultra-low latency, high performance comparable to physical equipment, among the industry's best list. · Communication services can operate flexibly anywhere in the network, dramatically increasing network utilization, speeding up business speeds, and reducing the total cost of ownership of service providers. Wind River Open Virtualization profile for Linux versions based on open source and compatible yocto projects ...

Juniper Vice President: Cloud computing determines the future survival of operators

On the development of cloud computing, many people take a different attitude, there is a point of view, the development of cloud computing, only to enable operators to replace the dumb pipe problem with a "dumb cloud", but foreign science and technology media heavyreading that "telecom operators in the use of cloud services have an unparalleled advantage, because they have the network." Juniper's vice-president, Douglasmurray, says cloud computing is the key to determining the future survival of the carrier. Operators have the risk of being pushed back by OTT service providers if they do not realize the urgency of developing their own cloud mobile services ...

Cloud computing Unified Communications wave approaching

According to Gartner analysts recently, unified communications are entering the third wave, integrating social media into the existing functional portfolio. Analysts say the first wave of unified communications is the unification of telephony, voice mail, audio and web conferencing, and business call center operations. The second wave has further expanded these services, including e-mail, VoIP, instant messaging, web-real and videoconferencing. The third wave has yet to come, but there is evidence that social software, corporate social networks, documentation and workflow management processes, mass capture and creative management are being added to the Unified Communications Group ...

Facing cloud computing: Is your network ready?

According to Gartner Research data, in 2010, cloud services in the world market total of 68 billion U.S. dollars, a 16.6% increase in 2009, this gives operators a huge opportunity, but also to the network management challenges. Corporate network managers are traditionally focused on providing a stable infrastructure, managing the various requirements on the network, and maintaining business uptime. After entering the cloud era, software as a service (SaaS), virtualization, Data center consolidation, and so on all benefit from this kind of it transformation brings opportunities, and suddenly, network and network management ...

Cisco New cloud Computing Framework Cloudverse to achieve "three cloud" collaboration

Cisco has unveiled new products and packaging options this week for customers seeking to implement public cloud, private cloud and hybrid cloud computing. Cisco's new Cloudverse framework is designed to enable organizations to establish, manage, and connect public, private, and mixed clouds. It includes existing Cisco products, such as unified computing systems servers, Nexus switches and network management applications, and software for collaboration, improved management and enhanced connectivity, and services to help customers design and deploy their environments. By 2014, more than 50% of the computing effort in the data center would be based on clouds, according to Cisco. Furthermore, to 20 ...

Focus on communications: Smartphones are the King of cloud Computing

September 26, 2011, "a new generation of technology" as the theme of China International Communications Exhibition in Beijing China International Exhibition Center opened grandly, many well-known communications enterprises have unveiled. At present, the rapid development of science and technology, the rapid upgrading of communications technology, and the industry's large enterprises often act as a "revolutionary" role, therefore, as the communications field of the annual event, communication exhibition is not only the new technology, new products concentrated display platform, but also the perfect embodiment of the industry trend. Let me talk to you about the industry focus in small series. Smart phones, "stew" mobile internet in the apple trend leading ...

Cloud computing, virtualization and mobile devices to promote network change

Market watchers believe that cloud computing, virtualization and mobile-office trends have become the driving force behind current corporate network changes. They also say that while companies have increased their investment in server, storage and network integration, the problem has not been completely resolved. Recently, reporters interviewed Frost & Sullivan, a researcher in the Asia-Pacific ICT sector, Mayankkapoor. In an interview, Kapoor that virtualization and cloud computing have become the biggest drivers of today's development of regional network markets. These technologies have greatly increased ...

Juniper Cloud plans to speed up competition with Cisco's data center

Juniper has been involved in the data center area since the launch of the first ex-series Ethernet switch, which has juniper again into intense competition with Cisco BAE and Extreme NX. It is reported that in the next few months, Juniper will launch more EX series products and other data center product. These initiatives are only part of the "Stratus Project" project, which is now the responsibility of the newly established Data Center business unit. February 24 ...

Total Pages: 418 1 .... 83 84 85 86 87 .... 418 Go to: GO
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.