Computing Service

Discover computing service, include the articles, news, trends, analysis and practical advice about computing service on alibabacloud.com

Cloud computing security and privacy: identity and access management

Page 1th: Why use the IAM in the traditional sense, organizations invest in IAM practices to improve operational efficiency and meet requirements for regulatory, privacy, and data protection: improved operational efficiency The architecture of good IAM technologies and processes automates repetitive work such as user entry,   Thus improving efficiency (for example, self-service reset user request password without system administrator using Help desk dispatch system intervention). Compliance Management to protect systems, applications, and information from internal and external threats such as ...

Kingdee: China management cloud helps enterprises to move towards cloud era

October 20, 2011, hosted by Kingdee International Software Group, China Management Global Forum held in Guangzhou Baiyun International Conference Center, more than 3,000 executives from various industries across the country attended the meeting.   In the afternoon of the CIO sub-forum theme for the transformation of the era of cloud computing services innovation, Kingdee International Software Group Senior Vice President, chief scientist Dr. Zhangliangjie issued a keynote speech "China Management Cloud." In recent years, with the maturity of virtualization technology and the development of SOA technology, the application trend of cloud computing is becoming more and more obvious, especially in daily application, the Skydri of Microsoft ...

Virtualization, cloud computing, open source code, and more

A, virtualization virtualization refers to the ability to simulate multiple virtual machines on the same physical machine. Each virtual machine has a separate processor, memory, hard disk, and network interface logically. The use of virtualization technology can improve the utilization of hardware resources, so that multiple applications can run on the same physical machine with each other isolated operating environment. There are also different levels of virtualization, such as virtualization at the hardware level and virtualization at the software level. Hardware virtualization refers to the simulation of hardware to obtain a similar to the real computer environment, you can run a complete operating system. In the hardware virtual ...

Defending cloud security and unveiling a new era of "full cloud audit"

The beginning of "cloud computing", the question of its security has never stopped, cloud computing is a fire, but the cloud security problem is also quite a headache. Enterprises concerned about their own data will not be wantonly acquired, tampering, the most concern is that their private information will not be intentional or unintentional leakage. When the enterprise gives the data to cloud computing service provider, has the data priority access is not the enterprise itself, but the cloud computing service provider. In this way, it is not possible to exclude enterprise data from being compromised. In addition to cloud computing service providers, a large number of hackers who covet cloud data, they continue to tap the service providers ...

How to view the security problem of cloud computing

Cloud computing is a new way of sharing infrastructure that can connect huge system pools together to provide a wide range of IT services. Cloud computing is the Super computing model based on the Internet.     The pooling of information and processor resources stored on personal computers, mobile phones and other devices to work together. Is cloud computing necessary? Let me give you an example of this. In the past, people own wells, each drink water, to meet their needs can be. But with the population more and more, the demand for water is more and more big, start ...

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

Guangdong Qun-Ying based on cloud computing focus on enterprise application

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall in the beginning of the rise of cloud computing, Guangdong Qun Ying Network (http://www.qycn.com) is the establishment of the Enterprise Service Platform Research and development department, focusing on all aspects of enterprise software applications, the establishment of the construction of cloud computing as the core of the new IDC framework.   Recently, the entire enterprise cloud computing services platform has been completed and officially online. As in the network eight years of IDC operators, Guangdong Qun has excellent information security technology, has been shouldering the Guangdong Province information security of the local standards of the formulation work ...

Cloud computing, like near and far

Microsoft James Black, serif; Font-size:10.5pt "> I do not know who is the wise hands, created a" cloud computing "the word. It's so level, as the clouds are changing in the sky, and cloud computing seems to be just as elusive. Recent articles on cloud computing have been evolving, and everyone is defining cloud computing, but no one has ever been able to give an accurate definition of cloud computing. What is cloud computing? Because there are a number of vendors offering cloud computing services, the cloud models provided by each are not the same, and some have passed the service ...

Cloud computing ecosystem is emerging as a new business value trend

With the current cloud computing trend surging, more and more manufacturers start in the cloud computing aspects of a larger deployment, as a leader in the industry's cloud computing vendors, AMD currently has the "value ecosystem" as the core of AMD value cloud development, and strive to implement the concept of cloud computing. AMD Greater China President Deng recently in its signature article "using core to realize the value of cloud" in the field of industry chain, AMD on the one hand continuously develop innovative products and technology, the introduction of bulldozer (bulldozers), Hao long processor and other revolutionary products, and through the open ...

Trend Technology launches global Enterprise Cloud Computing Security Survey Report

Trend Technology recently released a recent Global Cloud computing Security Survey pointed out that the global scope has launched a huge, continuous multiplication of virtualization technology and cloud computing technology deployment wave. At the same time, how to secure the landing of enterprise cloud, how virtualization efficiency can be used for enterprises, has become a universal concern. Because of challenges in terms of security, availability, and performance, it decision makers remain sceptical about applying cloud computing technology to key businesses. Nearly half (43%) of corporate IT decision-makers say their cloud-computing service providers have been safe for the past 12 months ...

Array strategy to work with Cloud cube to promote cloud industry development

The global application optimization and global security access solution Provider array NX held a press conference in Beijing on the theme "The Wisdom Cloud delivers the data storm". press conference, the Array receptacle and Beijing Cloud Cubic Technology Co., Ltd. (referred to as Cloud Cube) signed a strategic cooperation agreement, the two sides will be a strategic partner in the identity of various levels of cooperation to promote the application and development of cloud computing industry. After this cooperation, more and more customers will be able to enjoy the fast, flexible cloud computing services, reduce the cloud computing service cycle, and get better cloud computing ...

Cloud computing security and privacy: identity and access management

This article is excerpted from the fifth chapter of the book "Cloud Security and privacy". This chapter describes the current state of identity and access Management (IAM) practices, and also describes the identity and access management support features that help users access cloud computing services for authentication, authorization, and auditing. Trust boundaries and identity and access management in a typical organization, applications are deployed within the scope of the organization, and "trust boundaries" are under the monitoring control of the IT department and are almost static. In traditional mode, trust boundaries include networks, systems, and private data centers that are in the IT department, sometimes in it ...

Cloud Computing Integrated service provider: The future of telecom operators

Over the past few years, the rapid development of cloud computing has become the focus of attention in telecommunications, the internet and IT industry, although there are still some disputes and obstacles to overcome, but the future will be a "cloud" era has become the consensus of the industry, which is actively seeking the road to change the telecom operators, It is not only a new opportunity but also a bigger challenge, how to adapt to the change of business model brought by cloud computing, adjust its transformation strategy to conform to the development trend of industry, become the urgent task faced by operators. To this end, this newspaper reporter interviewed the Beijing University of Posts and Telecommunications Management School deputy Dean Professor Pan, he thought cloud computing ...

How do you view cloud security issues?

How many enterprises and organizations are catching up with cloud computing in the Shanyun of everyone today? And how many onlookers are waiting for the opportunity to get ready to plug in? Before we go into the cloud, do we ask ourselves whether cloud computing is necessary? The need for cloud computing (Cloud computing) is a new way of sharing infrastructure that can connect huge system pools to provide a wide range of IT services. Cloud computing is the Super computing model based on the Internet. The concentration of large amounts of information and processor resources stored on personal computers, mobile phones and other devices ...

Eight requirements for cloud computing services security

If you are an engineer who is building a new cloud computing service, or a potential user who is evaluating a security policy for a service provider, the following eight commandments will help you avoid security breaches in cloud services that have resulted in theft of account information and disclosure of sensitive information. Instead of looking for a comprehensive list of commandments, this list will only help you narrow down the vulnerabilities to a minimum.   If the service requirements are higher than the standard security measures such as HIPAA or PCI specifications, then the manufacturers who cannot comply with these simple rules should be expelled or challenged. ...

Edge computing becomes the next point of the explosion, who will win the cloud computing giant and the CDN giant?

At the recent Yunqi Conference, Alibaba Group senior vice president and president of Alibaba Hu Xiaoming announced that IoT (Internet of Things) officially became the main strategy of Alibaba after e-commerce, finance, logistics and cloud computing, and in order to do a good job of IoT Alibaba Cloud will invest in the emerging technology field of “edge computing” in 2018.

The biggest question of cloud computing is security or privacy?

In recent years, cloud computing, as one of the most promising vocabulary in the IT industry, has received attention from various industries.

The security of the electronic file Center in the cloud computing mode

There are similarities and differences in the security of information system under the cloud computing model and traditional mode. The first goal is to ensure the integrity and security of data and information, and then the objects are the same, such as hardware and software, network, storage systems, and so on, and again will adopt some similar technology, such as various security detection technology, decryption encryption technology. The differences include management and technology issues such as virtualization, security issues that can result from the transition to cloud computing service patterns, and so on. 1. The security problems caused by the non-standard cloud computing. Cloud computing as a new technology is only in the initial stage ...

CIOs do not care about the energy efficiency of cloud computing, categorizing it as a cloud service provider

What is the green cloud computing? And self-built and operating data centers for comparison, the cloud computing whether energy or energy? Compared with the hosting mode, cloud computing is not really have a higher energy efficiency? And Advanced Data Center Hosting Services (Ideally Power Usage Efficiency - PUE = 1) What's Cloud Computing? Which is more energy-efficient than buying your own cloud from a cloud service provider (building your own services and applications under your corporate firewall)? Most CIOs can not back ...

What is the significance of IDC's open platform?

In the cloud market, from the original IDC into the cloud computing service providers quite a market. They focus on small and medium-sized enterprises, in different industries deep, fit user needs. But this kind of cloud computing service provider's malady is unable to be big, some also exists the original infrastructure to be unable to match the cloud computing architecture, this causes the following question: This kind of IDC cloud service provider, how they should transform successfully and enlarge, reshape the ecosystem circle? Recent Huayun data announced open platform. This one, immediately caused the industry hot debate. The reason is that Huayun data will be open to their cloud computing capabilities to help many IDC service providers (currently facing the main agent ...).

Enterprise cloud computing should pay attention to safety precautions

Cloud computing is the further development of Grid computing, distributed computing and parallel computing, and has become the focus of all industries.   It is an internet-based Super computing model that establishes a mechanism for accessing configurable resources such as networks, servers, storage, applications, and services on demand, with powerful computing and storage capabilities. With the popularization of cloud computing, the security problem has gradually risen, which has become an important factor restricting its development. April 2011, Amazon Cloud Computing center crashes, causing Amazon cloud service interruption for four consecutive days, answering services, news services and location tracking services ...

Total Pages: 15 1 .... 6 7 8 9 10 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us
not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.