Skip to main content

Home/ Cloud Computing/ Group items tagged is.

Rss Feed Group items tagged

Stian Danenbarger

Katz (ed.): "The Tower and The Cloud" (EDUCAUSE "ebook" in PDF and HTML, 2008) - 0 views

  •  
    The emergence of the networked information economy is unleashing two powerful forces. On one hand, easy access to high-speed networks is empowering individuals. People can now discover and consume information resources and services globally from their homes. Further, new social computing approaches are inviting people to share in the creation and edification of information on the Internet. Empowerment of the individual-or consumerization-is reducing the individual's reliance on traditional brick-and-mortar institutions in favor of new and emerging virtual ones. Second, ubiquitous access to high-speed networks along with network standards, open standards and content, and techniques for virtualizing hardware, software, and services is making it possible to leverage scale economies in unprecedented ways. What appears to be emerging is industrial-scale computing-a standardized infrastructure for delivering computing power, network bandwidth, data storage and protection, and services. Consumerization and industrialization beg the question "Is this the end of the middle?"; that is, what will be the role of "enterprise" IT in the future? Indeed, the bigger question is what will become of all of our intermediating institutions? This volume examines the impact of IT on higher education and on the IT organization in higher education.
DJHell .

OpenSocial in the Cloud - OpenSocial - 0 views

  • Apps can grow especially fast on social networks, so before you launch your next social app, you should think about how to scale up quickly if your app takes off.
  • Unfortunately, scaling is a complex problem that's hard to solve quickly and expensive to implement.
  • If this app grows to serve millions of users and photos, shared hosting or even a dedicated server won't have the bandwidth or CPU cycles to handle all of the requests. We could invest in more servers and network infrastructure, shard the database, and load-balance requests, but that takes time, money, and expertise. If you'd rather work on the new features of the app, it's time to move into the cloud.
  • ...9 more annotations...
  • It's important to focus on the interactions between the app and your server when designing an application that will run in the cloud. If we standardize the communication protocol and data format, we can easily change the server side implementation without modifying the OpenSocial app.
  • You can configure the makeRequest method to digitally sign the requests your app makes to your server using OAuth's algorithm for parameter signing. This means that when your server receives a request, it can verify that the request came from your application hosted in a specific container. To implement this, the calls to makeRequest in the OpenSocial app spec XML specify that the request should be signed, and the code that handles requests on the server side verifies that a signature is included and valid
  • When our server receives a request, we can verify that it came from our application by checking that the digital signature was signed by a valid container and that the application ID is correct.
  • Since our server isn't storing any relationship data, the app will need to send us a list of user IDs so we can fetch the appropriate photos.
  • Although it's outside the scope of this article, we could provide a mechanism for our OpenSocial app to request a one-time-use token that it would include in the request to upload a photo.
  • Note that the post data is URL-encoded in the request so the post method uses urllib.unquote before splitting the comma-separated list of person IDs.
  • Since the server doesn't store any relationship data, the PhotosHandler class checks the post data of the request for a list of IDs from the container.
  • A common misconception when coding in the cloud is that storage space, CPU cycles, and bandwidth are unlimited. While the cloud hosting provider can, in theory, provide all the resources your app needs, hosting in the cloud ain't free so these resources are limited by your budget. Luckily, OpenSocial provides several mechanisms to cache images and data that will reduce the load on your server.
  • In addition to reducing traffic to our server, this technique has the added benefit of being fast—requesting data from the Persistence API is much faster than making the round trip to your server.
  •  
    Some OpenSocial apps can be written entirely with client-side JavaScript and HTML, leveraging the container to serve the page and store application data. In this case, the app can scale effortlessly because the only request hitting your server is for the gadget specification which is typically cached by the container anyway. However, there are lots of reasons to consider using your own server: * Allows you to write code in the programing language of your choice. * Puts you in control of how much application data you can store. * Lets you combine data from users on multiple social networks. * Enables interaction with the OpenSocial REST API. Setting up an OpenSocial app that uses a third party server is fairly simple. There are a few gotchas and caveats, but the real issues come up when your app becomes successful - serving millions of users and sending thousands of requests per second. Apps can grow especially fast on social networks, so before you launch your next social app, you should think about how to scale up quickly if your app takes off. Unfortunately, scaling is a complex problem that's hard to solve quickly and expensive to implement. Luckily, there are several companies that provide cloud computing resources-places you can store data or run processes on virtual machines. These computing solutions manage huge infrastructures so you can focus on your applications and let the "cloud" handle all the requests and data at scale. This tutorial focuses on a simple photo-sharing app that uses a third-party server to host photos and associated metadata. If this app is going to host millions of images and support many requests per second, we won't be able to run it on a single dedicated host. We'll break the app down and analyze the interactions between the OpenSocial App and the back end server. Then we'll implement the app in the cloud, first using Google App Engine, then leveraging Amazon's S3 data storage service. Finally, we'll look at s
John Li

Learn about could computing | Eucalyptus Community - 0 views

shared by John Li on 30 Aug 10 - Cached
    • John Li
       
      like eucalyptus for the cloud computing
  •  
    What is cloud computing? Cloud computing is the access to computers and their functionality via the Internet or a local area network. Users of a cloud request this access from a set of web services that manage a pool of computing resources (i.e., machines, network, storage, operating systems, application development environments, application programs). When granted, a fraction of the resources in the pool is dedicated to the requesting user until he or she releases them. It is called "cloud computing" because the user cannot actually see or specify the physical location and organization of the equipment hosting the resources they are ultimately allowed to use. That is, the resources are drawn from a "cloud" of resources when they are granted to a user and returned to the cloud when they are released. A "cloud" is a set of machines and web services that implement cloud computing.
Adron Hall

Windows Azure Platform. Inside the Cloud. Microsoft's Cloud World Explained Part 2. - A... - 0 views

  • Windows Azure provides three core components, Compute, Storage and the Fabric, along with the Fabric controller. Compute is effectively the Windows operating system, this is an instance. These instances contain a copy of your application. Instances also come in two flavours, a Web Role or a Worker Role. Web roles accept and process HTTP requests using IIS. Not everything you may want to run in Windows Azure is a Web application, so Windows Azure also provides Worker roles. A Worker role instance is quite similar to a Web role instance. The key difference is that a Worker role does not have IIS preconfigured to run in each instance. Web and Worker roles can communicate with each other via technologies like WCF, or using Windows Azure Storage queues.
  • Windows Azure platform Appfabric Windows Azure platform AppFabric is made up of two components, Service Bus and Access Control. Before going into these two components it’s worth noting that there is also a product called Windows Server platform Appfabric, currently these two “Appfabric” products are different, however they are the same product teams within Microsoft and their product roadmap includes closer synergy over time.
  •  
    hmmm, material snagged from the white paper I worked on.  :O I'm not too surprised, and it is on MS's blog, who technically owns the material anyway.  Great reuse!!
Ankit Jain

Cloud Computing - How to Deploy to Cloud and How Much - 0 views

  •  
    Cloud computing is one of the most trending subjects in IT today. However, a lot of people are still unable to clearly identify what is the "Cloud"? How to use it? What are its benefits? And why is it gaining popularity? Learn how to make optimal and correct usage of cloud deployment technology. Cutting-edge advice from Atlogys IT consultants panel comprising of Ex-Googlers and Carnegie Mellon Computer Scientists. For cloud deployment architecture, visit http://www.atlogys.com/cloud-deployment-architecture
  •  
    Cloud computing is one of the most trending subjects in IT today. However, a lot of people are still unable to clearly identify what is the "Cloud"? How to use it? What are its benefits? And why is it gaining popularity? Learn how to make optimal and correct usage of cloud deployment technology. Cutting-edge advice from Atlogys IT consultants panel comprising of Ex-Googlers and Carnegie Mellon Computer Scientists. For cloud deployment architecture, visit http://www.atlogys.com/cloud-deployment-architecture
Casey Wedge

Get Well-Designed Cloud Based Data Recovery Plans to Increase Security of your Business - 0 views

  •  
    Cloud based data recovery is about preparing to recover business-critical data or technology infrastructure after disaster strikes. With a well-designed data recovery plan in place, your business could save money, time and valuable customers. Data recovery plans get your business back on track as quickly as possible. With data recovery within the cloud, implementation of service is almost immediate and scalability is rapidly adjustable. So implement this service now and improve your business efficiency.
  •  
    Cloud based data recovery is about preparing to recover business-critical data or technology infrastructure after disaster strikes. With a well-designed data recovery plan in place, your business could save money, time and valuable customers. Data recovery plans get your business back on track as quickly as possible. With data recovery within the cloud, implementation of service is almost immediate and scalability is rapidly adjustable. So implement this service now and improve your business efficiency.
anonymous

Jivespace: Jive Talks: XMPP (a.k.a. Jabber) is the future for cloud services - 0 views

  •  
    Cloud services are being talked up as a fundamental shift in web architecture that promises to move us from interconnected silos to a collaborative network of services whose sum is greater than its parts. The problem is that the protocols powering current cloud services; SOAP and a few other assorted HTTP-based protocols are all one way information exchanges. Therefore cloud services aren't real-time, won't scale, and often can't clear the firewall. So, it's time we blow up those barriers and come to Jesus about the protocol that will fuel the SaaS models of tomorrow--that solution is XMPP (also called Jabber) .
Rich Hintz

The Impact of Virtualization on Wide Area Networks-Part 1 - Data Center Networks - 0 views

  •  
    Imagine that a Singapore-based sales manager is accessing a CRM application which was once local, but is now based in the Hong Kong data center. But it's end of quarter and the peak load on the Hong Kong CRM application is over the specified capacity limit, so the transaction (running on a virtual machine) is transferred via VMotion to the data center in San Francisco, completed and sent back to the Singapore sales office.
enterprise cloud

Know what Practical Purposes Zimbra Hosting Fulfill - 0 views

  •  
    What is Zimbra Hosting? Then, Zimbra hosting is the name of such an enterprise- class hosted email solution designed for viewing various business needed solutions together. So how it helps in business? Interested to learn its purposes?
  •  
    What is Zimbra Hosting? Then, Zimbra hosting is the name of such an enterprise- class hosted email solution designed for viewing various business needed solutions together. So how it helps in business? Interested to learn its purposes?
Casey Wedge

Verizon Business - A Leading Provider of Advanced Communications Solutions - 0 views

  •  
    Verizon Business is a leading provider of advanced global network, deep IP expertise and one of the broadest sets of next-generation offerings to its broadband, wireless and voice capabilities. Verizon Business is enabling enterprises to take advantage of the transforming communications landscape. It is accelerating the deployment of advanced services, including: Private IP, Seamless Mobility, Applications Hosting, Customer Service Management and Security.
  •  
    Verizon Business is a leading provider of advanced global network, deep IP expertise and one of the broadest sets of next-generation offerings to its broadband, wireless and voice capabilities. Verizon Business is enabling enterprises to take advantage of the transforming communications landscape. It is accelerating the deployment of advanced services, including: Private IP, Seamless Mobility, Applications Hosting, Customer Service Management and Security.
Casey Wedge

Get T1 Internet Services to Enhance your Business Daily Operations - 0 views

  •  
    T1 Internet service is one of the most commonly employed connections used by small and medium-sized businesses today. T1 Internet lines provide a dedicated connection that is superior to shared services, such as Cable or Digital Subscriber Lines (DSL). But during peak hours, bottlenecking occurs when too many subscribers attempt to use the same circuit at the same time. While a T1 line, on the other hand, is a dedicated connection and is used solely by you and your business and no one else. If no traffic is running over the circuit, it will remain idle until it is used by you again.
digitalhydcsg

In Public Cloud Computing Fight, the Gloves Come Off post by CIO.com - 0 views

  •  
    Price cuts from Amazon, Google and Microsoft support predictions that the public cloud computing market is a race to the bottom -- for pricing, that is. Customers will no doubt benefit, but cloud providers who aren't one of those three companies should be prepared for a long, hard war of attrition.
Casey Wedge

Limelight Content Storages Services for Faster Website's Content Delivery - 0 views

  •  
    Limelight Content Storage is a tool that is employed to speed the delivery of your rich content to the end user and hosts it in the Cloud. Customers today are drawn to media rich websites but these same customers also have very high expectations of websites and do not have the patience to wait for slow video buffering or error messages. With so much business competition out there you need to ensure that your delivery is not detracting clients. If you use Limelight Content Storage your data will have a shorter distance to travel to reach your potential customer.
Kelly Hair

Cloud security: Feds on cusp of change -- Federal Computer Week - 0 views

  • Virtualization has been setting the stage for many of these issues for years, he said, but “what cloud computing is forcing us to look at is the survivability of systems…and protecting the data,” Hoff said. “While I hear the perimeter is going away [as a security approach], I disagree; it’s multiplying and the diameter is contracting,” Hoff said. “You’re going to outsource responsibility, but not accountability. So we need open standards and better visibility.”
  •  
    Interesting view on depermeterisation. Hoff's view is that the protected assets are in smaller clumps and still have a perimeter.
anonymous

Getting Used to Help and Support - 0 views

I have never been used to getting help and support with all my problems. But when it comes to computer problems, I am glad Computer Tech Help And Support is helping me out. Whenever my PC is in tr...

help and support

started by anonymous on 12 May 11 no follow-up yet
enterprise cloud

Finest VPS Server Hosting Company India - 0 views

  •  
    What is VPS? VPS is Virtual Private Server which offers flexible, scalable, and economical hosting solution that can fit the needs of almost any kind of website. Looking for a hosting company? Contact us now.
  •  
    What is VPS? VPS is Virtual Private Server which offers flexible, scalable, and economical hosting solution that can fit the needs of almost any kind of website. Looking for a hosting company? Contact us now.
Orchestrate Technologies, LLC

SMAC-Social-Mobile-Analytics-Cloud.pdf - 0 views

  •  
    SMAC is upsetting the domain. No CIO dialogue is accomplished devoid of considering influence of SMAC on industry and business. Rapid developments in this technology pile are accumulating value to complete breadth of businesses and industries. Rewards are several and appear very captivating, with assurances being made as big as - forecasting future (Analytics), accessible everywhere (Mobile), everything is so easy and networked (Social), and at a very low cost (Cloud). This fresh technology pile has begun changing tomorrow's organization and has influence on every part of a business, therefore consequently on the every software applications being utilize inside the company and by the company.
Stian Danenbarger

Susan Brenner: "Privacy and the Cloud" - 1 views

  • the 4th Amendment was developed at a time when the only privacy was spatial privacy; for something to be private, I had to keep it IN my home or office (and maybe in a locked chest), which both made it difficult for law enforcement officers to gain access to it and symbolically invoked my right to assume they wouldn’t gain access to it. (In other words, I could assume privacy.)
  • our lives have already moved far beyond spatial privacy; I talked about the 4th Amendment’s application to the contents of emails and what we do online -- arguing that it should apply to both, but noting that courts so far do not tend to agree. I think cloud computing will take this analysis to the next level.
  • My point is that even under current 4th Amendment law, I can make what I think are valid arguments as to why the 4th Amendment should apply to data stored in a cloud (as long as the appropriate conditions exist). I really think, though, that we shouldn’t be using cases that were decided thirty years ago or a hundred and thirty years ago to set the standard for 4th Amendment privacy in an era of advancing technology. As I argued in that law review article, I think we need to move beyond a purely spatial approach to privacy to approaches that encompass both spatial and non-spatial privacy.
  •  
    What about privacy in an era of cloud computing? If I store my data in a cloud, is the data in a "closed container" and therefore private under the 4th Amendment? Or is putting data in a cloud analogous to giving the numbers I dial on my phone to the phone company?
Stian Danenbarger

Marc Andreessen: "The three kinds of platforms you meet on the Internet" (2007, retriev... - 1 views

  • Ning within our platform provides a whole suite of APIs for easily building social networking applications; Salesforce within its platform provides a whole suite of APIs for easily building enterprise applications; Second Life within its platform provides a whole suite of APIs for easy building objects that live and interact within Second Life. EC2, at least for now, has no such ambitions, and is content to be more of a generic hosting environment.
  • Akamai, coming from a completely different angle, is tackling a lot of the technical requirements of a Level 3 Internet platform in their "EdgeComputing" service -- which lets their customers upload Java code into Akamai's systems.
  • Amazon's FPS -- Flexible Payments Service -- is itself a Level 3 Internet platform.
  • ...1 more annotation...
  • I think that kids coming out of college over the next several years are going to wonder why anyone ever built apps for anything other than "the cloud" -- the Internet -- and, ultimately, why they did so with anything other than the kinds of Level 3 platforms that we as an industry are going to build over the next several years -- just like they already wonder why anyone runs any software that you can't get to through a browser.
  •  
    "This post is my attempt to disentangle and examine the topic of "Internet platform" in detail. I will go at it by identifying three distinct approaches to providing an Internet platform, and project forward on where I think each of the three approaches will go. At best, I might be able to help make a new landscape clear. At worst, hopefully I can at least provide one framework for future discussion."
Rich Hintz

Questions to Ask When Adding a Cloud Computing Component - 0 views

  • Young said IT managers considering a move to the cloud should ask the following questions, for starters: --How portable is the technology and data across international borders? --Who is backing the service provider? --Is the provider certified, and by whom? --Where does the data originate? --How is the identity management process set up? --Who manages physical security at the provider's facilities? --How is change management handled? --What happens to your partnering model?
1 - 20 of 230 Next › Last »
Showing 20 items per page