Author: Chen Whilin, China Cloud Network technical advisor Bending Review founder North Aurora Venture Investment consultant 4 Case study-Amazon AWS 4.2 Amazon AWS Service Downtime Survey (2006-2009) Amazon AWS has experienced many service crashes since the March 2006 14 Open S3 file storage service and the August 25, 2006 EC2 Service, the August 2008 EBS service. These include EC2, S3 and EBS. The impact of ...
September 23, virtualization technology for the Linux kernel Xen was given a hat-trick with 3 security vulnerabilities. Xen vulnerabilities can be jumped out of the virtual host environment (ultra vires), or read other user data, control the hypervisor itself (host). A remote attacker could exploit a vulnerability that could cause the host system to crash and deny service to legitimate users. Xen Vulnerabilities and impact range is not small, such as Amazon AWS Large-scale restart server-the entire repair cycle lasted 5 days (from September 25 7 o'clock in the afternoon to September 30 5 o'clock in the afternoon), impact ...
Over the past two weeks, the author has participated in two very important meetings in the industry, Amazon Re:invent and SUSECon2014. Compared to the Amazon re:invent of the million people assembly, this article I would like to say that a small but very hard SUSECon2014 congress. The theme of the "Synch open" open source event is Susecon's third event, leaving the author's deepest impression is that the theme song for the General Assembly "modifiable is open", such as Xiao Ping ...
"Editor's note" Docker and CoreOS are excellent "graduates" of the Silicon Valley incubator, and it is said that two bosses have a good personal relationship, Docker do container engines, CoreOS container management, cooperation is very happy, but with the release of Rocket gradually "parted". Although Docker and CoreOS are seeking "Jane", but Docker "Jane" is to strive to achieve the most convenient use of the user, CoreOS "Jane" is the pursuit of the ultimate lightweight, which will be the future of container technology, in fact, it is difficult ...
2013, the most serious cloud computing interruption in China IDC Circle July 23 reported: cloud Computing for enterprises and ordinary users bring a lot of benefits, although the cloud is located in the "sky", but they are not spared the "earthly mistakes." Cloud computing users know that, like any other type of technology, web-based services can crash. If the supplier behind these services is smart enough, you should not lose any data, but you may be severely affected during the interruption of the service. Let's take a look at the worst cloud computing outage in 2013 so far. Ama ...
The Iranian government has launched a massive cyber attack on US financial institutions using cloud computing, a feature of the New York Times recently. Internet attacks (cyberattack), which were frequently reported in the past, were launched by hackers such as Anonymous and LulzSec, but this time the "cyber war" between countries, and the cloud computing era is showing new problems. The news of The New York Times, which was attacked by the bank's inexplicable cyber attacks, was reported in 2012 against the Bank of America.
The exposure of the NSA's secret file to steal data in June 2013 has rekindled concerns about the security of corporate data stored on the cloud. But the exposure of the NSA surveillance program will not cause some companies to be afraid of data disclosure no longer using hosting services, instead, it facilitates enterprise users and cloud service providers to reform their internal security and privacy policies and enhance cloud data security, something that businesses and suppliers have long overdue to do. Snowden first leaked NSA surveillance to media ...
Today's hottest IT field of non-cloud computing, none other than its rapid development momentum can be used to describe the crazy. Even the giants of the traditional IT industry have also been transferred to them, however, emerging technologies always have some unsatisfactory shortcomings. Xiaobian next to simply sum up the five key challenges facing cloud computing technology. 1. Data Governance Before introduced many kinds of data governance methods, principles and processes. Basically, businesses have a lot of sensitive data that needs to be monitored and protected. This type of data and the key information it generates is the organism of the business ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.