In The Cloud It

Discover in the cloud it, include the articles, news, trends, analysis and practical advice about in the cloud it on alibabacloud.com

Application of CRM in cloud computing

The emergence of CRM, changed the past customer data dispersed, customer management complex and cumbersome situation, but also to enable enterprises to customer data, product information, employee data to achieve a unified. Since the 1990s, CRM's management concept and operation system have been rapidly accepted by the business community and widely used in large enterprises, but how to apply CRM effectively is a very important research topic for the small and medium-sized enterprises that account for more than 90% of the total enterprise. This is not only because of the large number of small and medium-sized enterprises, the national economy has a significant impact, but also because this is the survival and development of SMEs within ...

How to avoid coding errors in cloud computing I'll teach you to fix it.

Last week, we described how to evaluate the code used to extend cloud applications. Now, we're going to look at the coding and system-change strategies that are likely to make the system more vulnerable over time. Because of the seemingly never-ending development requirements of the CRM system, the durability of our code will be a key factor in the long-term smooth running of these systems. But before I begin, I need to declare that the usages and terms I cite apply only to the salesforce.com environment, and that other applications and platforms use different types of association ...

Security risk analysis in cloud computing environment

1 http://www.aliyun.com/zixun/aggregation/14032.html "> What is Cloud computing security?" In the rapid development of the Internet today, the security of the network is an unavoidable problem, especially the various security threats to the business system of potential harm gradually magnified today, any IT system construction is difficult to ignore the existence of security problems. And all kinds of "private cloud" or "public cloud" data center construction, safe, efficient business delivery is its success and necessary requirements. Every ...

Investment opportunities and challenges in cloud computing and the big Data age

2013 China International Cloud Computing Technology and Application exhibition was held in Beijing on April 7, and Qintie, executive director of Cloud Base, was invited to attend the meeting as a keynote speaker and a keynote address on investment opportunities and challenges for venture capital. He explained the opportunities, challenges and problems of cloud computing and the big data age, and explained the relationship between Gartner ' s Hype Cycle and venture capital. Internet: Resource concentration and cloud services the existence of the Internet has prompted a sharp increase in data volume, on the basis of large data generation cloud computing, so Qintie that the cloud computing revolution ten years ago ...

Competition and cooperation in cloud Computing's three main camps

Cloud computing has never lacked the participation of large Internet companies, and with the development of cloud computing, the field has initially formed three major competing camps, the Internet camp, the It camp, and the telecom operators ' camp. The Internet camp is led by the foreign Amazon and domestic bat, mainly for the public cloud market, the IT camp mainly in IBM, HP, Huawei and other representatives, mainly for the enterprise-class customers; Finally, the main representatives of the telecom operators ' camp are at&t and the three major domestic operators,   This article comes from Internet weekly. At present, the cloud computing industry ...

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

Research on key technologies of mobile file storage and spatio-temporal data analysis in cloud environment

Research on key technologies of mobile file storage and spatio-temporal data analysis in cloud environment the research work and innovation of the National Defense University of Science and Technology (Mao Hua) are as follows: (1) a seamless and unified access method for heterogeneous cloud storage services based on file system is proposed Wukong. At present, different cloud storage service access interfaces vary, because of the lack of seamless access to a variety of cloud storage Services Unified interface, spatio-temporal data applications can not modify the direct access and use of the back-end cloud storage data. File system is widely supported by the application of a data use interface to the file system interface to encapsulate various ...

Research on key technologies of water quality safety Service platform in cloud environment

Research on key technology of water quality safety Service platform in Cloud environment Zhejiang University Guo Sheng This paper uses cloud computing technology to construct water quality Safety Service platform, the integration of heterogeneous water quality information data, high performance parallel computation and remote simulation of water quality model are realized through the construction of distributed data resource layer, virtual computing resource layer and visualized water quality simulation rendering module. , water quality information and early warning information visualization. The main research contents and achievements are as follows: (1) The function requirement analysis of water quality Safety Service platform is completed, and the Water Quality Safety Service platform based on cloud computing technology is finished.

Application and improvement of key agreement protocol in cloud computing environment

Application and improvement of key agreement protocol in cloud computing environment Nimmin in order to solve the problem of the adaptability of the existing key agreement protocol in the cloud computing environment, the paper deeply analyzes the security requirements of the cloud computing scene to the key agreement protocol, and combines the security performance defects of the existing IKEV2 protocol, adopts the puzzle mechanism, The key material and the delayed transmission of identity information are used to improve the IKEV2, and a key agreement protocol ike-c adapted to the cloud computing network environment is proposed, which effectively improves the responder's anti Denial-of-service (DoS) attack capability, and resolves the man-in-the-middle attack which leads to the identity leakage of the initiator.

Research on data security in cloud computing security

Research on data security in cloud computing Security University Zheng This paper focuses on the cloud in this particular environment of data security issues for in-depth research, mainly do the following two aspects of work: 1. For security issues such as protecting the privacy of user queries and data confidentiality, by analyzing the advantages and disadvantages of existing schemes, combining cryptography theory, an improved scheme is proposed for a data retrieval scheme based on all-homomorphic encryption, which can not only guarantee the user's data not to be leaked, but also ensure the privacy of the user's query process. ...

The basic problems of security management and enterprise risk control in cloud computing

In cloud computing, effective security management and enterprise risk control are obtained from the process of good development of information security and safety management, which is the attention of the Organization's overall enterprise security management responsibility.   A well developed information security and safety management process enables information security management processes to be scalable, repeatable, measurable, sustainable, defensible, sustainable, and cost-effective in the organization. The basic issues of security management and enterprise risk control in cloud computing are related to identifying and implementing appropriate organizational structures, processes and controls to maintain effective information security and safety management, risk management and compliance.

Protection of trade secret in cloud computing environment

The protection of trade secret under cloud computing environment Zhou Minghuan in cloud computing environment, the protection of trade secret is confronted with some special problems related to cloud computing mode and network technology, such as the existence form of trade secret, tort manifestation, tort characteristic, security hidden danger and so on, for this reason, It is necessary to adopt some security secrecy technology and system measures, and there are many misunderstandings about the protection of cloud computing trade secret. Protection of trade secret in cloud computing environment

Heartbeat detection and fault assessment in cloud data center

The level of heartbeat detection and fault assessment in cloud data center Li Youxen child-like Zhang Fengchen in order to improve the ability of cloud data center to destroy, in order to increase the complexity of software and hardware problems, based on the traditional server heartbeat detection mechanism, combined with the characteristics of cloud computing, In this paper, a new method of heartbeat detection and fault assessment is proposed to ensure the effective operation of cloud data center. The experiment results show that the scheme can detect node faults in time, and use fuzzy synthesis method to evaluate the management and operation of cloud data center according to the predetermined standard of fault grade evaluation.

New mode of information service platform of industrial cluster in cloud environment

The new mode of the information service platform of industrial cluster in cloud environment Wang Chun; Zhaohaijun This article analyzes the current industrial cluster information Service platform's government-led, the Industry Association Alliance leading and the information technology company leading 3 kinds of service content and the service condition, according to its existence limitation, This paper constructs a new model of information service platform of industry cluster under cloud environment, and analyzes the information service content and operation mode of the new mode. New mode of information service platform of industrial cluster in cloud environment

Agent Based Framework for scalability in Cloud Computing

Agent Based Framework for scalability into Cloud Computing Aarti Singh, Manisha Malhotra This work proposes a agent Based Framewo RK for providing scalability in cloud computing environ ...

Research on ciphertext search technology in cloud environment

Research on ciphertext search technology in cloud environment Beijing, Beijing, China posts a new and efficient method for searching public key Cryptography (Nscf-peck) is proposed in this paper. The scheme is based on bilinear pair structure and uses public channel to transmit ciphertext. In the design of the whole algorithm, only two times bilinear pair operation is used, which greatly reduces the computational expenditure of the searchable public key cryptography. Meanwhile, using public channel to transmit encrypted data between client and cloud server reduces the cost of constructing secure channel. Finally, this paper proves that nscf-pec ...

Ant colony Optimization: Load Balancing solution in cloud computing

Ant Colony Optimization:a Solution of Load balancing in Cloud Ratan-Mishra and Anant Jaiswal in-monitors we are proposing A m Ethod based on Ant Colony optimization to resolve the p ...

Research on data access control method in cloud computing

Research on data access control method in cloud computing Nanjing University of Posts and telecommunications This paper proposes an attribute-based access control model (DACC) for cloud computing environment using CP-ABE encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing Service Provider ...

Research on carbon emission management based on information resource allocation in cloud environment

Research on carbon emission management based on information resource allocation in cloud environment she Li Feifei Shu first outlines the concept of carbon footprint, compares the development and practice of carbon footprint in various countries, and builds a carbon management system by building capacity maturity models embedded in carbon administration. Then, the simulation case of Amazon cloud service is used to analyze the allocation efficiency of information resources, and to calculate the reduced carbon emissions by optimizing the allocation of information resources. Finally, according to the information resources under the cloud environment, the paper puts forward some suggestions to promote Low-carbon green management. Research on carbon emission management based on information resource allocation in cloud environment.

[Document] Fast real-time migration of virtual machines in cloud computing environment

A fast real-time migration method for virtual machines in cloud computing environment Pegasus, Feng, Li Zhui. In this paper, a fast real time migration method of virtual machine is proposed for the long time migration of virtual machines in cloud computing data center. By formulaic description and performance analysis of the pre copy model, the page bitmap used to mark the changed pages of memory is added in the pre-copy method. During the migration process, the frequently changed memory pages are judged, and the pages that have changed frequently are marked in the new page bitmap and transmitted only in the last iteration. Experimental results show that with the traditional pre-handcuff ...

Research on service delivery problem of multilayer application in cloud

Research on service delivery problem of multi-layered application in cloud Shandong Zhang Sweet This paper presents the challenges faced by multi-tier application service delivery in the cloud, this paper mainly studies: 1, constructs the on-line monitoring structure, carries on the monitoring to the Multi-layer application each layer load distribution, and proposes the forecast method based on the autoregressive model to forecast the application load, It solves the problem of dependency complexity between layers of multi-layer application, and monitors the service characteristics of each layer, which solves the complexity of service characteristics between layers of multilayer application. 2, the application of queuing theory to deploy multi-layer application of the resources of each layer to model, to solve the resources of ...

Total Pages: 15 1 .... 5 6 7 8 9 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us
not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.