Cloud Environment

Alibabacloud.com offers a wide variety of articles about cloud environment, easily find your cloud environment information here online.

Ascend worth the wait: to minimize the chance of theft during data transfer

Public cloud environment, data encryption has become a key means to ensure data security. But when a chip needs to send or receive data stored outside of the chip, it will give the attacker an opportunity to learn about the workload and pinpoint the target. At a MIT press release on July 2, researchers brought a system called Ascend that addresses the security flaws that involve memory access. Ascend through a series of measures to minimize the attackers get from the memory data transfer process ...

New pivot OS help build OpenStack secure and robust cloud environment

Cloud computing era, led by OpenStack Cloud operating system is the highest concern, as the virtualization representative technology of cloud computing, OpenStack Cloud operating system has become the main support in the current cloud computing field. Strong security, high flexibility, good compatibility and scalability make OpenStack famous in cloud computing. As we all know, OpenStack is both a community, a project and an Open-source software that provides an operational platform or toolset for deploying the cloud. Its purpose is to help organizations run virtual computing or ...

Key business moved to private cloud! Oracle Push Middleware Machine

The enterprise's key business cannot move to the virtualized cloud environment? Before migrating, you must test and prepare for the job beforehand?...... If you are very cautious about private cloud construction, or if you are hesitant, look at Oracle's newly released Exalogic Elastic cloud system, and perhaps you will change your view. ▲ Cloud Computing Middleware Machine: Oracle following the year after the database machine after another masterpiece September 20, Oracle OpenWorld 2010 Conference, the CEO Larry Ellison in his keynote speech ...

Research on storage virtualization document encryption in cloud computing environment

Research on storage virtualization document encryption in cloud computing environment Zhang An with the development of network technology, especially the appearance of cloud computing, data documents will be changed from traditional local data to virtualized storage in cloud environment. In this process, the traditional data document encryption method will no longer apply to the cloud computing environment for document storage encryption. Therefore, it is necessary to put forward a new data encryption method suitable for virtual storage environment. In view of the characteristics of storage virtualization in cloud computing environment, it is proposed that the intelligent dynamic encryption and decryption will become the encryption and decryption method of the data document in the virtual storage environment.

Cloud storage is gaining popularity, but most people don't back up mobile data

The more companies that come to store their data in the cloud as part of a hybrid storage solution (both inside and outside the enterprise), many admit that they simply cannot back up large amounts of data. Research firm Vanson Bourne A survey of 650 it policymakers in the US, UK, France, Germany and the Netherlands, highlighting that cloud computing backup and storage is now seen as an important component of a hybrid storage environment, with about 66% of respondents saying that by 2015, They will increase the amount of data stored in the cloud environment. In those already using the mix ...

Interactive visualization platform based on MapReduce

Interactive visualization platform based on MapReduce Wang Galiang, Cimbe, Liu Jianjian, Liu Ni in this paper, an interactive visualization platform architecture based on cloud environment is proposed for the interactive visualization of marine environment information in long time series. Based on Hadoop, the visualization platform introduces GPU and MPI parallel computing into mapreduce processing mechanism, realizes the parallel processing of large-scale data set in marine environment spatial data field, such as retrieval, extraction, interpolation calculation and feature visualization analysis, and achieves the goal of remote interactive visualization of mass data. Key words: Marine environment information ...

RSA challenges traditional Cloud computing thinking security need evidence don't promise

Mr. Asser Covillo, Executive vice President of EMC Inc., EMC Information Security Division, and executive chairman of the RSA Board of Directors, NYSE:EMC at the opening keynote address of the RSA Conference, described how to end the corporate strategy of cloud computing's lack of trust. Because of the lack of trust, many enterprises always hesitate to deploy mission-critical applications in the cloud environment. Not just through keynote speeches, but also in the new EMC Vision Book (EMC Vision Monitors), released today entitled "Proof of Commitment: Building a trusted Cloud", E ...

Research and implementation of PC data synchronous backup based on cloud computing

Research and implementation of synchronous backup of PC data based on cloud computing Wu Yu Chen Junhua in order to better ensure data security, integrity and convenient data management, from the local database and personal data from the perspective of data backup as the focus of the use of Microsoft Cloud database management System SQL Azure and application development tools visual Studio, designed and implemented a PC data synchronization backup system based on Microsoft Windows Azure Cloud Environment, and used this platform to publish and deploy the Web portal for the system ...

Setup of Ubuntu 10.10 Server version Cloud Environment

In fact, starting with the Ubuntu10.04 version, canonical started to offer cloud services through Ubuntuone, offering 2GB of free online storage and, if you want more space, paying an extra fee to buy. Cloud computing in recent years from a somewhat vague concept, gradually rise to the use of the stage.      This makes every it vendor see infinite Business opportunities, canonical naturally also refused to ignore this sumptuous feast. After Ubuntu10.04 tasted the sweetness of cloud computing, Ubu ...

Evaluation and comparison of security problems in cloud environment

Evaluation and Comparison of security Issues on Cloud Computing environnement priyanka Aurora, Arun Singh Himanshu Tyagi this pap Er describes about the configured of differ ...

Eight tips to ensure cloud security

While the benefits of cloud computing continue to be highlighted – including on-demand services that increase enterprise efficiency and control it costs, cloud security is often considered the first major obstacle to making cloud solutions widely accepted.   According to industry experts, many companies also hesitate to the cloud environment in the data integrity, recovery and privacy, the rules of compliance.   At the Gartner Security and Risk Management Summit, Verizon Business offers the following tips to protect data and network security. Evaluate your goals in deciding to relocate IT services ...

The top ten trends for the next five years in the PAAs field

Frost & Sullivan, an IT research and consulting firm, recently predicted that the platform-service (PaaS) market would be the next area of intense competition for cloud-computing start-ups, as the two areas of infrastructure, service (IaaS) and software as services (SaaS), were already commercialized. As most of the software available from the cloud environment is standardized, organizations now expect to take full advantage of the PAAs solution, as this will be the only area where service providers can gain differentiated advantages. It is worth mentioning that PAAs this class of cloud computing services will ...

Cloud Performance management tools: The Eye of the cloud

Various new cloud performance management tools and technologies will make the visibility of applications in the cloud environment clearer. 1 milliseconds is just a short moment. But if you're a SaaS provider, with thousands of databases running more than 2 billion SQL queries a day, it's very valuable to provide 10TB of SQL data. Performance is also critical to visibility-especially when your system is connected to other providers ' systems in the cloud. This is exactly what concur technology has been doing, and it is dealing with more than 50 billion dollars a year in the cloud ...

[Document] A dynamic service private cloud system adapted to large-scale data processing

Dynamic service for large-scale data processing private cloud system Wang Zhu, Merlin, Lilei, Chang, Hu Guang Summary: In order to adapt to a private cloud environment with large amount of data, computationally intensive, complex process of computing task demand, for reference to the public cloud computing related theory and technology, combining the characteristics of private cloud environment, This paper presents an implementation scheme of a dynamic service private cloud system which adapts to large-scale data processing. This scheme uses the job file to describe the computing task, constructs the processing work flow dynamically with the job logic structure, and introduces the MapReduce parallel framework through the data stream driver service request.

Video: Building a credible cloud ecological environment

Introduction: Cloud Security Alliance China Branch director Zhao Food that in the rapid development of cloud computing process, the network security concerns have been one of the industry's focus. The traditional threats remain, and new threats are constantly being uncovered. Improve the real level of cloud security protection while increasing the confidence of potential cloud users and top management. This requires the joint efforts of the entire industry to build a more credible cloud environment. First, Zhao shares the Cloud Security alliance on Risk Prevention practices, with the "Cloud Security Guide" a book on cloud computing Security in all areas of the series ...

Eight ways: To become a cloud security expert

In a public cloud environment, where there is relatively little information on how to secure data, how do enterprise IT consultants and IT staff get information about cloud computing security? Through a survey, it consultants and IT staff get information about cloud security through three sources: niche meetings, large conferences, and networks.   Now the author of these eight ways to all of you to make an introduction. Cloud computing Security Niche Conference: 1. November 2011 16 ~ 17th, the Cloud Computing Security Alliance CSA will hold CSA2011 in Orlando, USA ...

Understand 6 questions, better choose IaaS Provider

Gemini chief Technology Officer Joe Coyle listed six questions for future IaaS vendors before choosing the IaaS vendor. For us to better grasp the situation, so as to obtain the best possible benefits for ourselves. 1. What if your cloud computing resources are not available? Although cloud computing is still fairly stable, like disaster recovery and high-availability issues in the IaaS data center, it is appropriate to find a way to target a cloud environment that can be implemented or used. ...

How does Digital Rights Management (DRM) ensure cloud security?

Another survey shows that security is a big problem for those who want to adopt cloud computing.   Ipswitch, a network equipment maker, asked 1000 customers whether they planned to invest in cloud technology in 2011. The good news is that more than two-thirds of customers are said to have given a positive answer.   The bad news is that most of what is needed is a private cloud environment (29%), or a mixed environment (21%) of a public cloud and a private cloud. No one agrees entirely with the elements of a private cloud, but it is generally agreed that a private cloud is a way to provide services like the cloud.

Research on access control technology based on negation rule in cloud computing

Research on access control technology based on negation rule in cloud computing the security and privacy protection of Wu Zhengxue data poses great challenges to the cloud computing field, and a access control technique based on negative rules is proposed to realize the sharing of some data among cooperative enterprises in a cloud environment without involving confidential information. The main idea is to prevent illegal access by judging whether the access query is authorized and whether there is conflict between the authorization and the negative rule. Theoretical analysis and experimental results show that this mechanism can effectively guarantee the security of cloud data. Research on access control technology based on negation rule in cloud computing

[Document] Data storage security in a cloud environment

An approach for Data Storage security in Cloud Computing The main objectives of this monitors are, 1) to prevent data access from Unau thorized access, it propose a distributed scheme to provide ...

Total Pages: 11 1 .... 4 5 6 7 8 .... 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.