Cloud

Alibabacloud.com offers a wide variety of articles about cloud, easily find your cloud information here online.

Ctera puts forward the new concept of "cloud direct-attached storage"

NAS, SAN, grid storage, and even cloud storage are not enough for you? Ctera NX A "cloud direct storage" technology at the recent electronic consumer show, a storage device that can be backed up to a service provider.   Many products are now targeted at consumer users or Soho, and this "direct-attached" storage is also applicable to small and medium enterprise users and remote affiliates. Ctera Flagship Products Cloudplug because of innovative packaging technology and the absence of active parts, the CES conference attracted people's attention. Clo ...

Sina Cloud computing platform SAE new online: Enhanced application Store

September 15 News, as the first public cloud computing platform, Sina Cloud computing strategy of the core components of Sinaappengine (http://sae.sina.com.cn) recently a new version of the online, the page continues to maintain a "concise, fresh" style, emphasis on strengthening the user experience, In particular, Web developers ' application development hosting requirements. This revision pays more attention to the detail, and has carried on some unique innovative visualization design, further strengthened the page navigation, the application store, the interactive feedback and so on function. Basic functionality to continuously meet the potential needs of users ...

Netgear publishes three cloud storage services for commercial customers

Desktop video storage devices, rack storage, and network device maker Netgear now sights on the cloud, with three of three cloud storage services for commercial customers.      First, the Netgear rack-ReadyNAS Storage server supports up to 100GB of online archive capacity.      Second, the latest enterprise-class ReadyNAS storage platform now supports a cloud File server option that allows a user to share files between local and outbound users. Finally, Netgear now offers the right to ...

Cloud Computing and security

Cloud computing and Security China University of Science and Technology Xiong in recent years, cloud computing has become one of the hottest research directions in the IT industry. Almost all mainstream it vendors are talking about cloud computing, including hardware vendors (IBM, Intel, etc.), software developers (Microsoft, etc.), and Internet service providers (Google, Amazon, etc.) and telecoms operators (AT&T, China Mobile, etc.). These companies cover the entire IT industry chain and build a complete ecosystem of cloud computing. Cloud Computing and security

McAfee deploys four centers of gravity in cloud computing security market

Last year the US announced its support for cloud computing and the green economy, hoping to compress government spending and support environmental protection. This March, French police said the 25-year-old French hacker "Hackercroll" was arrested for hacking into Obama's Twitter account.   Given that Obama's accounts can be hacked, can the data security of cloud computing users be guaranteed? Market research reports show that 87.5% of users currently believe that "security issues" is the main obstacle to their use of cloud-related services, and "Enterprise intelligence Research" results also show that the safety of ...

Security chief expects cloud security spending to increase

Continuous deployment based on SaaS services and the transfer of data center resources to public and private cloud environments can force organizations to shift IT spending to data protection, monitoring, and managed security services. According to an IBM survey of 150 security chiefs, the perimeter of the network is becoming increasingly difficult to be controlled by security professionals. The security chiefs say the security budget is expected to increase over the next 3-5 years. Kris Lovejoy, general manager of IBM's security services and senior IT architecture and systems engineer, says the increase in security budgets is for hosting security service providers ...

Cloud computing Security: disturbing

In the 2012, the popularity of cloud computing began to decrease, and the cloud began to shift from the initial stage of conceptual hype to landing and pragmatism. Cloud computing has dropped from 1th place in 2011 to today's 10th place, according to a 2012-year technology trend forecast published by Gartner, the world's authoritative it research and consultancy firm. Over the past year, only 3% of CIOs around the world have applied enterprise IT systems to cloud computing. The fall in focus does not mean that cloud computing is no longer important, but that people are starting to look at cloud computing more sensibly. In the Itvalue community for the CIO crowd ...

Too early morning: application delivery How to solve the cloud computing security and application of the two major problems?

In recent years, more and more enterprises have opened the cloud computing application model. However, although cloud computing has many performance advantages, the security of the public cloud, the response speed and availability of cloud business are still the main factors restricting the overall popularity of cloud computing.   Especially for the latter, that is, the delivery of cloud applications, is the number of application delivery vendors are eager to meet the enterprise's efficient demand through continuous innovation. Industry insiders say the advanced application delivery system can offload network-related functionality from the server, increasing the efficiency of the data center by 20% to 50%. At the same time ...

Protecting API keys in the cloud improves enterprise cloud security

The API key, like the SSL key, is the top priority in security policy. Many people verbally say they want to protect the information in the cloud, but in fact we are all stones in cloud security. Most organizations use some form of API key to access cloud services. The protection of these API keys is important.   This article will discuss the issue of protecting API key and recommend some solutions. In the 2011, the importance of API keys was gradually recognized, and companies were more aware of their full protection of these keys. After all, API keys and access to sensitive information in the cloud have ...

Cstor A8000 uses the green to hold up the massive data cloud creates the storage to help the intelligent city construction

A few days ago, the Ministry of Housing and Urban construction in the national Intelligent City pilot set up a working conference on the publication of "National Intelligent City Pilot Interim management measures" and attached "national Intelligent City Pilot Interim management measures and pilot indicators system", after the publication of the first batch of 90 national Intelligent City Pilot list. One prefecture-level cities 37, counties 50, the Town 3. After 3 years to 5 years of creation period, the Ministry of Housing and Urban construction will be based on management methods and indicators system for these pilot cities and towns evaluation. Smart city, is the new generation of information technology in the context of rapid development, the full use of cloud computing, Internet of Things, mobile interconnection ...

Radware: The five most urgent security problems in cloud computing

As companies continue to accelerate the pace of cloud technology, using new technologies such as infrastructure, Service (IaaS) or software as a service (SaaS), the need for solutions to secure access and reliable operations in the cloud architecture is becoming increasingly evident. It now appears that, as enterprise data is kept in different devices, which are provided by different providers or partners, the enterprise must monitor and protect the new "security boundaries". Similarly, carefully weighing how to protect cloud-based data should be incorporated into the enterprise's context as part of the overall security strategy for the enterprise. and protect ...

Shuguang Company with independent technology to solve the network "cloud security" problem

As China's cloud computing industry leader, Shuguang is looking for a national, layout cloud computing, by summing up the dawning company in the field of cloud computing, it is no exaggeration to say that the dawn of the company's development strategy is the pursuit of China's cloud computing ideal realm. Vision Dawn "cloud computing" Center for the spirit of the national Internet is freedom, equality and sharing, as one of the most embodiment of the internet spirit of the computing model, cloud computing shows a strong vitality. It describes an extensible application that can be accessed over the internet ...

How to use visualization technology for cloud security

I have articulated the idea that cloud computing is not just a collection of services provided by business entities. In contrast, from a security standpoint, cloud computing is a single, interoperable system that includes interconnected subsystems designed to provide on-demand service-specific combinations across multiple entities. In this case, we define a system of "a set of interacting or interdependent components that form a complete whole", and a "set of independent but interrelated elements that contain a unified whole". In short, they voluntarily (e.g. negotiated successful paid services) ...

Cloud Server 7 great security protection tips

The advent of cloud technology does bring great convenience to modern enterprises. However, with the benefits of the accompanying, of course, there is a reluctance to touch the information security risks.   Since enterprises want to take advantage of the benefits of cloud technology, it is natural to find ways to solve the cloud security risks, reduce the risk faced by enterprises. Tip One: Start from the basic, timely installation of system patches.   Whether it is Windows or Linux, any operating system has vulnerabilities, timely patching to avoid vulnerabilities are deliberately exploited, is one of the important security of the server. Tip Two: Install and set up a firewall. To serve ...

Cloud server 7 Big security secret key also need data encryption

"Cloud" This word in recent years has been fired hot, in the information security sector, "cloud" is a big darling, the enterprises have been among the ranks of the cloud. Because, the advent of cloud technology does bring the modern enterprise very big convenience. However, with the benefits of the accompanying, of course, there is a reluctance to touch the information security risks. Since enterprises want to take advantage of the benefits of cloud technology, it is natural to find ways to solve the cloud security risks, reduce the risk faced by enterprises.   The following is to share the cloud of the server's 7 major security secrets, so that enterprises targeted security protection. Server data Security 7 big secret ...

Cloud Note Service Evernote announces acquisition of ipad handwriting apps penultimate

Beijing time May 8 morning news, according to TheNextWeb report, after the completion of 70 million U.S. dollars in financing, cloud note service Evernote announced the acquisition of San Francisco start-up company Cocoa Box design ipad handwriting application penultimate, It is hoped that this can improve the handwriting recognition ability of Evernote. The deal is not just penultimate revenue Evernote, penultimate is for the wider platform and equipment development ...

Cloud ERA blow only 40% enterprises pay attention to cloud security

Now with the continuous progress and development of cloud computing, many cloud computing providers are also starting to serve as a third-party cloud service to users of various cloud computing services, in the cloud, data security has always been the user and enterprise managers have been particularly concerned about, many companies are also beginning to consider their own data security strategy and planning issues.   Cloud ERA blow only 40% enterprises pay attention to cloud security? Now more and more companies choose to put their own data in the cloud, which includes the public cloud and the enterprise's private cloud and mixed cloud, which means that data and network security to become ...

HP provides box.net cloud storage services in business PCs

Cloud storage and collaboration platform Box.net with HP, HP Enterprise computer will install Box.net service. In a recent statistic, Box.net has 7 million users, all over 100,000 companies.   In October, Box.net CEO Allon Levi Aaron Levie said he would eventually work with HP to install its own services in HP's PCs sold to companies.   Today, HP and Box.net announced the deal. In the enterprise with HP computer, will ...

Cloud Security Alliance (CSA) release Cloud Control Matrix (CCM) version 3.0

The Cloud Security Alliance (CSA) announced in Thursday the official release of CSA Cloud Control matrix (CCM) version 3.0, fully upgraded to assess the cloud center information security risks of the industry gold standard. Since the release of the CSA-pioneering guidance field, the CCM3.0 Edition extends its control field to the address change of cloud security risk, and "focus on the key areas of cloud computing Security Guidance version 3.0" has taken a big step towards closer integration. Fully absorb industry-recognized safety standards, terms, and control frameworks such as ISO 27001/2, European Union Network and Information Security (ENI).

Research on data search and encryption scheme based on cloud computing

Research on data search and encryption scheme based on cloud computing re-appointment, Jianhua, Sun Huijie The technology of data search and encryption under cloud computing environment is the research hotspot at present. In view of the shortcomings of existing schemes, an improved data search and encryption scheme is proposed in this paper. In the area of data lookup, in this paper, the identity management model is established, and then the identity-based authentication algorithm is proposed to realize the optimal assignment between the system resources and the number of identities. In data encryption, a computational encryption scheme CES is proposed, which can support fuzzy retrieval of cloud data and basic arithmetic operation, Effectively to the user's ...

Total Pages: 461 1 .... 5 6 7 8 9 .... 461 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.