Amazon's cloud computing center in North Virginia State, in April 2011, has been hit by a number of websites that use the Amazon service's answer service Quora, news services Reddit, HootSuite and location tracking service Foursquare. The interruption lasted nearly 4 days. For this reason, Amazon has issued more than 5,700 letters of apology to users for the downtime event, and has provided 10-day service points for the affected users. March 2011, Google Mail broke out large-scale users ...
After dominating the dominance of the cloud computing world, Amazon Web Services made a lot of thinking, such as the future of the cloud world, what would it be like? While many believe Amazon Web Services will mimic businesses like Microsoft and IBM in the past, I personally do not think so. So what will the cloud world look like? I have some ideas, mainly based on the current mode of adoption. In four years, the focus will be on specific cloud services, not the cloud itself. As a result, there will be industry clouds that provide professional services, such as: ...
At the Zendcon conference, Amazon, IBM, and Rackspace company representatives discussed the cloud security and its usability, and the use of SQL and database connections. As early as a few years ago, when the concept of cloud computing began to rise, security was the most discussed issue, and security is still the biggest headache for developers, the IBM spokesman stressed. At the Zendcon conference in California, IBM and Amazon executives had a heated discussion about cloud-related security issues. IBM Outstanding ...
With the development of Docker, the ecosystem of Docker is getting more and more mature. There are many open source projects related to Docker on GitHub. Recently, CenturyLink summarized 10 blogs based on Docker's development tools, mainly on http://www.aliyun.com/zixun/aggregation/14123.html"> PaaS platform, cluster management, continuous integration and Docker Management tools, etc. four ...
In the past decade, has been plagued IT companies, but also will die IT companies have always wanted to break is the storage island. As businesses begin to embrace hybrid cloud deployments, storage silos are determined to rise due to the lack of visualization of cloud storage. Yet one cloud storage provider offers solid management capabilities while the other offers almost the same functionality. In this article, we mainly talk about which points need to be taken into consideration when considering public cloud or hybrid storage deployment. The so-called "Knowledge Liberation Labor" is right and wrong. On the one hand, pay close attention to the storage location, the cost is how much ...
The story about Linux is actually a battle between the two ends. In the cloud, the operating system has become a top player. While in the enterprise, Linux is eroded the exclusive territories of Unix systems, but if you want to talk about the operating system, still Microsoft's Windows in the enterprise dominate. With the popularity of cloud computing, Linux may (but not be guaranteed) gain more and more acceptance in the enterprise. Linux was born in 1991, a small but growing share of the business. The operating system has never let big companies think it is better than Microsoft Wi ...
Raise a question about cloud security to five different people, and you may get five different views. Cloud phenomena are rapidly evolving and changing so that the rules of security and other related regulations are difficult to keep up with. The concepts applicable to cloud, such as multi-tenant and unified user identification, are forcing security vendors to provide new and better responses. But when they are ready, the cloud may have created a whole new set of security challenges. The standard may be an answer, perhaps not an answer, because the standard has a fixed time to keep up with or predict fast-growing innovations. Therefore, there must be a ...
Founded in 2009, the Cloud Security Alliance, with its 20,000 members, is often used as the main voice for cloud security in cloud computing. As Jerry Archer, a member of the Cloud Security alliance and Sallie Mae's chief security officer, explains, the organization does not want to be a standard organization, but instead seeks ways to promote best practices. These best practices will be agreed by users, it auditors, cloud and security solution providers. One result is the Cloud Security alliance's GRC stack. This is a set of tools to help ...
Scalable, cost-saving enterprises can rely on the unlimited scalability of third cloud providers, without worrying about investment issues, after using cloud storage for backup. In fact, a pay-as-you-go model reduces the annoyance of backup purchases and implementations. This approach allows us to anticipate and manage capacity growth and operating costs. Efficient, reliable cloud providers often provide state-of-the-art technology, such as disk-based backup, compression, encryption, data de-duplication, services ...
At present, cloud computing is highly praised by industry and launched a series of services based on cloud computing platform. But security has been a concern in the already-implemented cloud computing services. Security and privacy issues have become one of the main obstacles to the spread and spread of cloud computing. In an IDC survey of "What do you think the challenges and problems of cloud computing model" is, security is at the top of the 74.6% ratio, and the security issue is the biggest concern for cloud computing. January 21, 2011, ITGI from the research company said, considering the security of its own data, ...
With the development of cloud technology, cloud computing has become the gossip of most enterprise employees. What is cloud computing? There are many ways to define cloud computing. At least 100 explanations can be found for what cloud computing is. It is now widely accepted that the National Institute of Standards and Technology (NIST) defines: Cloud computing is a pay-as-you-go model that provides available, convenient, on-demand network access, into a configurable pool of computing resources (resources including networks, servers, storage, applications, services), which ...
As the popularity of cloud services increases, companies must work with it to decide what can be put on the cloud and how to ensure other security. Cloud computing has gained more and more attention from enterprises. Does it mean that cloud services are safe enough for businesses? Although my answer is "appropriate," it is critical for security managers to understand that a generalized negative answer is not an acceptable answer. Executives and other business leaders are attracted to the benefits of cost and convenience provided by cloud-based vendors. However, in taking any ...
How do enterprises integrate WAN and Internet cloud services, or use the cloud computing services of the public Internet? Most businesses support remote users through SSL VPNs on the Internet. There are also a number of Internet VPN to connect branch offices to the data center, effectively make the enterprise WAN Internet VPN. For businesses that already use the Internet as a WAN, opening cloud services via the Internet may be the best option. If you want to achieve a more stringent service level agreement (SLA), the other option is to let the cloud service provider straight ...
Enterprises need to improve the security of data in the 2012, small and medium-sized enterprises will be more focused on the cloud computing, with the small and medium-sized enterprises on cloud computing concern, the security problems of cloud computing has again aroused people's attention, About 35% of people surveyed by Itbusiness.ca, a science and technology news site in Toronto in September 2011, showed that the biggest concern for cloud computing remained security issues. Today most cloud providers have the software services they need to run cloud computing on their servers and provide a ...
Cloud opponents say you should take virtual machines out of the cloud because cloud security issues constrain their business. Worse, cloud opponents ' bleak vision of the security of a virtual machine may be deep inside the IT administrator. The overly restrictive stance on cloud security is undermining the potential benefits of moving from a virtual environment to the cloud, which includes the flexibility of computing resources and the cost reductions associated with economies of scale and access to and from anywhere (or almost anywhere). Cloud opponents ' assertions about virtual machine security sometimes seem justified. "Once you put the virtual machine into the cloud, you give up ...
The enterprise's IT strategy is being pressured to make changes, and cloud computing is becoming more and more important in correcting the solution. IDC analysts hope that enterprise it stores can increase the implementation of private cloud solutions. The core part of these cloud scenarios is often storage. The cost of private cloud storage is expected to reach an annual growth rate of 28.9% per cent from 2010 to 2015. At this rate, private cloud storage will turn three times times 2015 years ago. This is larger than the current annual growth of 4% of internal storage. The report notes that although the next four ...
"We see a lot of business people taking the liberty of investing in private clouds rather than working together with CIOs to work out a unified plan to make the most effective use of cloud computing," he said. If many different parts of the enterprise make these decisions independently, you will find that these decisions can be quite diverse. "We also see that many business units are catching up with cloud computing in a variety of ways, but it poses a tricky problem for CIOs," he said. There is no doubt that CIOs are starting to think about union clouds. "Consider the fact that the head of the business unit is trying to shorten the time to market, almost heart ...
Public Cloud makes enterprise it uneasy. For one thing, this is a disruptive technology-transforming computing resources into a shared public facility. This technology also leads to a lack of transparency and less control of IT assets. BYOD has led to concerns about data loss and security, and no wonder some cloud novices have suddenly rushed out of the hive. Searchcloudcomputing.com with Jim Reavis, who is the executive director of the Cloud Security Alliance (CSA), on the public cloud and private cloud real security issues and the enterprise into the cloud ...
According to Cloud Dog Internet report: Datarealm, a leading provider of secure cloud Server (www.yundoog.com) hosting services, recently spoke of cloud security awareness and responsibility, regardless of cloud providers and enterprise customers cloud computing must implement data security best practices to protect user data. VPS Cloud security should be seen as a partnership between suppliers and users, both of which are fully committed to the implementation of security systems and processes. Datarealm believes that cloud providers should strive to provide customers with easy-to-use tools and support in the use of cloud Platform security. ...
With the rapid development of cloud computing, the requirements of the market for enterprises become more and more stringent. The improvement in the technology sector's ability to innovate means that companies eventually reach a place where they can make informed it decisions, and truly leverage the advantages of a new generation of technology tools and management strategies to reduce risk and achieve long-term development. In this context, the interoperability of cloud computing has become a new bright spot in the market development. But there is no common standard about the interoperability of cloud computing, there are some problems needing attention. Cloud computing and vendor lock-in are well known, and vendor Lock-in is a cloud business model ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.