Skip to main content

Home/ Cloud Computing/ Group items tagged cloud control services

Rss Feed Group items tagged

Eric Swanstrom

Cloud Connectivity Using High-Speed Fiber Internet Services - 0 views

  •  
    Cloud Connectivity solutions control the meetings of network and cloud, enabling them to access the cloud from anywhere around the globe via high performance private network connections. Businesses are utilizing Fiber Internet Connections to connect them to their private cloud and public cloud. It allows your information to travel at speeds in the gigabyte per second range. Get the free instant price quotes from our top service providers with many interesting customizable features. http://fastbluenetworks.com/
Rich Hintz

Cloud Computing Poses E-Discovery, Legal Risks - 0 views

  • Cloud Computing Poses E-Discovery, Legal Risks April 10, 2009By Marty Foltyn ORLANDO, Fla. — Cloud computing was a hot topic at this week's Storage Networking World show, but one attorney sounded a warning note about the rush to the cloud. In a presentation titled "Computing (strike that — Litigation) in the Cloud," Steven Teppler, senior counsel at KamberEdelson in New York, said cloud computing and services are a corporate counsel's nightmare. The 2006 e-discovery amendments to the Federal Rules of Civil Procedure (FRCP) changed the legal and corporate information landscape, putting custody and control at top of mind. "Cloud computing means that data may always be in transit," said Teppler, "never anywhere, always somewhere." And that creates a big challenge for corporate counsel. How can they identify "who, when and where" in the cloud? How can organizations handle document retention? And to add another layer of worry, information targeted for the cloud may also be subject to laws requiring privacy and persistent data integrity, and other requirements that the storage manager may not even be aware of. Teppler spelled out the top cloud computing shortcomings: no native security attributes; inadequate or no security provisioning by providers; the lack of understanding of cloud legal issues (a real problem for not only cloud computing providers, but also corporate counsel and IT consultants); and the failure to recognize potential liability from either legal issues or a lack of security. Teppler told the audience that litigation in the cloud is already here. Users of cloud services will need to insist on service level agreement (SLA) terms with their providers to ensure legal and regulatory compliance, searchability, demonstrable customer care (security), provably persistent data integrity and reliability, and demonstrable storage security and integrity for electronically stored information in the cloud.
DJHell .

OpenSocial in the Cloud - OpenSocial - 0 views

  • Apps can grow especially fast on social networks, so before you launch your next social app, you should think about how to scale up quickly if your app takes off.
  • Unfortunately, scaling is a complex problem that's hard to solve quickly and expensive to implement.
  • If this app grows to serve millions of users and photos, shared hosting or even a dedicated server won't have the bandwidth or CPU cycles to handle all of the requests. We could invest in more servers and network infrastructure, shard the database, and load-balance requests, but that takes time, money, and expertise. If you'd rather work on the new features of the app, it's time to move into the cloud.
  • ...9 more annotations...
  • It's important to focus on the interactions between the app and your server when designing an application that will run in the cloud. If we standardize the communication protocol and data format, we can easily change the server side implementation without modifying the OpenSocial app.
  • You can configure the makeRequest method to digitally sign the requests your app makes to your server using OAuth's algorithm for parameter signing. This means that when your server receives a request, it can verify that the request came from your application hosted in a specific container. To implement this, the calls to makeRequest in the OpenSocial app spec XML specify that the request should be signed, and the code that handles requests on the server side verifies that a signature is included and valid
  • When our server receives a request, we can verify that it came from our application by checking that the digital signature was signed by a valid container and that the application ID is correct.
  • Since our server isn't storing any relationship data, the app will need to send us a list of user IDs so we can fetch the appropriate photos.
  • Although it's outside the scope of this article, we could provide a mechanism for our OpenSocial app to request a one-time-use token that it would include in the request to upload a photo.
  • Note that the post data is URL-encoded in the request so the post method uses urllib.unquote before splitting the comma-separated list of person IDs.
  • Since the server doesn't store any relationship data, the PhotosHandler class checks the post data of the request for a list of IDs from the container.
  • A common misconception when coding in the cloud is that storage space, CPU cycles, and bandwidth are unlimited. While the cloud hosting provider can, in theory, provide all the resources your app needs, hosting in the cloud ain't free so these resources are limited by your budget. Luckily, OpenSocial provides several mechanisms to cache images and data that will reduce the load on your server.
  • In addition to reducing traffic to our server, this technique has the added benefit of being fast—requesting data from the Persistence API is much faster than making the round trip to your server.
  •  
    Some OpenSocial apps can be written entirely with client-side JavaScript and HTML, leveraging the container to serve the page and store application data. In this case, the app can scale effortlessly because the only request hitting your server is for the gadget specification which is typically cached by the container anyway. However, there are lots of reasons to consider using your own server: * Allows you to write code in the programing language of your choice. * Puts you in control of how much application data you can store. * Lets you combine data from users on multiple social networks. * Enables interaction with the OpenSocial REST API. Setting up an OpenSocial app that uses a third party server is fairly simple. There are a few gotchas and caveats, but the real issues come up when your app becomes successful - serving millions of users and sending thousands of requests per second. Apps can grow especially fast on social networks, so before you launch your next social app, you should think about how to scale up quickly if your app takes off. Unfortunately, scaling is a complex problem that's hard to solve quickly and expensive to implement. Luckily, there are several companies that provide cloud computing resources-places you can store data or run processes on virtual machines. These computing solutions manage huge infrastructures so you can focus on your applications and let the "cloud" handle all the requests and data at scale. This tutorial focuses on a simple photo-sharing app that uses a third-party server to host photos and associated metadata. If this app is going to host millions of images and support many requests per second, we won't be able to run it on a single dedicated host. We'll break the app down and analyze the interactions between the OpenSocial App and the back end server. Then we'll implement the app in the cloud, first using Google App Engine, then leveraging Amazon's S3 data storage service. Finally, we'll look at s
digitalhydcsg

Cloud backup solutions by Cloud solutions group in Australia - 0 views

  •  
    Cloud solutions offers cloud control backup solutions for small, medium and large business enterprises. Get the best cloud control backup solutions from cloud group.
digitalhydcsg

Cloud computing security in Melbourne - 0 views

  •  
    Three types of Network Services WAN Optimisation, VoIP, Security
digitalhydcsg

Cloud computing tips to enterprise CIOs by NetApp India director Rajesh post by Infotec... - 0 views

  •  
    Rajesh Awasthi, director - Telecom and Cloud Service Provide, NetApp India, says its cloud strategy is to provide enterprise customers with seamless data management and control.
Adron Hall

Windows Azure Platform. Inside the Cloud. Microsoft's Cloud World Explained Part 2. - A... - 0 views

  • Windows Azure provides three core components, Compute, Storage and the Fabric, along with the Fabric controller. Compute is effectively the Windows operating system, this is an instance. These instances contain a copy of your application. Instances also come in two flavours, a Web Role or a Worker Role. Web roles accept and process HTTP requests using IIS. Not everything you may want to run in Windows Azure is a Web application, so Windows Azure also provides Worker roles. A Worker role instance is quite similar to a Web role instance. The key difference is that a Worker role does not have IIS preconfigured to run in each instance. Web and Worker roles can communicate with each other via technologies like WCF, or using Windows Azure Storage queues.
  • Windows Azure platform Appfabric Windows Azure platform AppFabric is made up of two components, Service Bus and Access Control. Before going into these two components it’s worth noting that there is also a product called Windows Server platform Appfabric, currently these two “Appfabric” products are different, however they are the same product teams within Microsoft and their product roadmap includes closer synergy over time.
  •  
    hmmm, material snagged from the white paper I worked on.  :O I'm not too surprised, and it is on MS's blog, who technically owns the material anyway.  Great reuse!!
digitalhydcsg

Midsize Insider: Cloud Computing Lessons from Federal Agencies - 0 views

  •  
    Cloud computing is growing in use at federal agencies, according to a new survey that found that military, intelligence and civilian groups are rapidly adopting the cloud.
digitalhydcsg

Cloud computing and security by Cloud Solutions - 0 views

  •  
    From Virtualisation to Cloud Based Environments
Stian Danenbarger

Cavoukian: "Privacy in the Clouds - a White Paper on Privacy and Digital Identity: Impl... - 0 views

  •  
    Informational self-determination refers to the ability of individuals to exercise personal control over the collection, use and disclosure of their personal information by others. It forms the basis of modern privacy laws and practices around the world. [...] At the Office of the Information and Privacy Commissioner of Ontario (IPC), we have long advocated a strong role for individuals in managing their personal information, not just by exercising their privacy rights under Ontario law, but also by becoming better informed and using privacy-enhancing technologies (PETs). [...] This paper explores what will be possible if proper digital identity services are deployed and the full power of Cloud computing is realized.
digitalhydcsg

Richard Nass, Brand Director's cloud computing opinion is It takes you back to the future - 0 views

  •  
    The very early days of computers consisted of big mainframes in some back room somewhere with terminals connected to that mainframe.
1 - 11 of 11
Showing 20 items per page