Skip to main content

Home/ Cloud Computing/ Group items tagged of

Rss Feed Group items tagged

DJHell .

OpenSocial in the Cloud - OpenSocial - 0 views

  • Apps can grow especially fast on social networks, so before you launch your next social app, you should think about how to scale up quickly if your app takes off.
  • Unfortunately, scaling is a complex problem that's hard to solve quickly and expensive to implement.
  • If this app grows to serve millions of users and photos, shared hosting or even a dedicated server won't have the bandwidth or CPU cycles to handle all of the requests. We could invest in more servers and network infrastructure, shard the database, and load-balance requests, but that takes time, money, and expertise. If you'd rather work on the new features of the app, it's time to move into the cloud.
  • ...9 more annotations...
  • It's important to focus on the interactions between the app and your server when designing an application that will run in the cloud. If we standardize the communication protocol and data format, we can easily change the server side implementation without modifying the OpenSocial app.
  • You can configure the makeRequest method to digitally sign the requests your app makes to your server using OAuth's algorithm for parameter signing. This means that when your server receives a request, it can verify that the request came from your application hosted in a specific container. To implement this, the calls to makeRequest in the OpenSocial app spec XML specify that the request should be signed, and the code that handles requests on the server side verifies that a signature is included and valid
  • When our server receives a request, we can verify that it came from our application by checking that the digital signature was signed by a valid container and that the application ID is correct.
  • Since our server isn't storing any relationship data, the app will need to send us a list of user IDs so we can fetch the appropriate photos.
  • Although it's outside the scope of this article, we could provide a mechanism for our OpenSocial app to request a one-time-use token that it would include in the request to upload a photo.
  • Note that the post data is URL-encoded in the request so the post method uses urllib.unquote before splitting the comma-separated list of person IDs.
  • Since the server doesn't store any relationship data, the PhotosHandler class checks the post data of the request for a list of IDs from the container.
  • A common misconception when coding in the cloud is that storage space, CPU cycles, and bandwidth are unlimited. While the cloud hosting provider can, in theory, provide all the resources your app needs, hosting in the cloud ain't free so these resources are limited by your budget. Luckily, OpenSocial provides several mechanisms to cache images and data that will reduce the load on your server.
  • In addition to reducing traffic to our server, this technique has the added benefit of being fast—requesting data from the Persistence API is much faster than making the round trip to your server.
  •  
    Some OpenSocial apps can be written entirely with client-side JavaScript and HTML, leveraging the container to serve the page and store application data. In this case, the app can scale effortlessly because the only request hitting your server is for the gadget specification which is typically cached by the container anyway. However, there are lots of reasons to consider using your own server: * Allows you to write code in the programing language of your choice. * Puts you in control of how much application data you can store. * Lets you combine data from users on multiple social networks. * Enables interaction with the OpenSocial REST API. Setting up an OpenSocial app that uses a third party server is fairly simple. There are a few gotchas and caveats, but the real issues come up when your app becomes successful - serving millions of users and sending thousands of requests per second. Apps can grow especially fast on social networks, so before you launch your next social app, you should think about how to scale up quickly if your app takes off. Unfortunately, scaling is a complex problem that's hard to solve quickly and expensive to implement. Luckily, there are several companies that provide cloud computing resources-places you can store data or run processes on virtual machines. These computing solutions manage huge infrastructures so you can focus on your applications and let the "cloud" handle all the requests and data at scale. This tutorial focuses on a simple photo-sharing app that uses a third-party server to host photos and associated metadata. If this app is going to host millions of images and support many requests per second, we won't be able to run it on a single dedicated host. We'll break the app down and analyze the interactions between the OpenSocial App and the back end server. Then we'll implement the app in the cloud, first using Google App Engine, then leveraging Amazon's S3 data storage service. Finally, we'll look at s
Stian Danenbarger

Katz (ed.): "The Tower and The Cloud" (EDUCAUSE "ebook" in PDF and HTML, 2008) - 0 views

  •  
    The emergence of the networked information economy is unleashing two powerful forces. On one hand, easy access to high-speed networks is empowering individuals. People can now discover and consume information resources and services globally from their homes. Further, new social computing approaches are inviting people to share in the creation and edification of information on the Internet. Empowerment of the individual-or consumerization-is reducing the individual's reliance on traditional brick-and-mortar institutions in favor of new and emerging virtual ones. Second, ubiquitous access to high-speed networks along with network standards, open standards and content, and techniques for virtualizing hardware, software, and services is making it possible to leverage scale economies in unprecedented ways. What appears to be emerging is industrial-scale computing-a standardized infrastructure for delivering computing power, network bandwidth, data storage and protection, and services. Consumerization and industrialization beg the question "Is this the end of the middle?"; that is, what will be the role of "enterprise" IT in the future? Indeed, the bigger question is what will become of all of our intermediating institutions? This volume examines the impact of IT on higher education and on the IT organization in higher education.
Stian Danenbarger

Youseff et al: "Toward a Unified Ontology of Cloud Computing" (PDF, 2009) - 0 views

  •  
    Towards the end-goal of a thorough comprehension of the field of cloud computing, and a more rapid adoption from the scientific community, we propose in this paper an ontology of this area which demonstrates a dissection of the cloud into five main layers, and illustrates their interrelations as well as their inter-dependency on preceding technologies. The contribution of this paper lies in being one of the first attempts to establish a detailed ontology of the cloud.
Alex MIkhalev

Pig Training Available Online (Hadoop and Distributed Computing at Yahoo!) - 0 views

  •  
    Yahoo! and Cloudera have worked together to produce a couple of training videos for Pig. There is Introduction to Pig, a 50 minute talk on Pig, including copious examples of writing Pig Latin scripts, an overview of how Pig works, and a discussion of the advantages of Pig versus other Hadoop interfaces
  •  
    Pig Training Available Online Yahoo! and Cloudera have worked together to produce a couple of training videos for Pig. There is Introduction to Pig, a 50 minute talk on Pig, including copious examples of writing Pig Latin scripts, an overview of how Pig works, and a discussion of the advantages of Pig versus other Hadoop interfaces
John Li

Learn about could computing | Eucalyptus Community - 0 views

shared by John Li on 30 Aug 10 - Cached
    • John Li
       
      like eucalyptus for the cloud computing
  •  
    What is cloud computing? Cloud computing is the access to computers and their functionality via the Internet or a local area network. Users of a cloud request this access from a set of web services that manage a pool of computing resources (i.e., machines, network, storage, operating systems, application development environments, application programs). When granted, a fraction of the resources in the pool is dedicated to the requesting user until he or she releases them. It is called "cloud computing" because the user cannot actually see or specify the physical location and organization of the equipment hosting the resources they are ultimately allowed to use. That is, the resources are drawn from a "cloud" of resources when they are granted to a user and returned to the cloud when they are released. A "cloud" is a set of machines and web services that implement cloud computing.
Stian Danenbarger

Marc Andreessen: "The three kinds of platforms you meet on the Internet" (2007, retriev... - 1 views

  • Ning within our platform provides a whole suite of APIs for easily building social networking applications; Salesforce within its platform provides a whole suite of APIs for easily building enterprise applications; Second Life within its platform provides a whole suite of APIs for easy building objects that live and interact within Second Life. EC2, at least for now, has no such ambitions, and is content to be more of a generic hosting environment.
  • Akamai, coming from a completely different angle, is tackling a lot of the technical requirements of a Level 3 Internet platform in their "EdgeComputing" service -- which lets their customers upload Java code into Akamai's systems.
  • Amazon's FPS -- Flexible Payments Service -- is itself a Level 3 Internet platform.
  • ...1 more annotation...
  • I think that kids coming out of college over the next several years are going to wonder why anyone ever built apps for anything other than "the cloud" -- the Internet -- and, ultimately, why they did so with anything other than the kinds of Level 3 platforms that we as an industry are going to build over the next several years -- just like they already wonder why anyone runs any software that you can't get to through a browser.
  •  
    "This post is my attempt to disentangle and examine the topic of "Internet platform" in detail. I will go at it by identifying three distinct approaches to providing an Internet platform, and project forward on where I think each of the three approaches will go. At best, I might be able to help make a new landscape clear. At worst, hopefully I can at least provide one framework for future discussion."
Stian Danenbarger

Cavoukian: "Privacy in the Clouds - a White Paper on Privacy and Digital Identity: Impl... - 0 views

  •  
    Informational self-determination refers to the ability of individuals to exercise personal control over the collection, use and disclosure of their personal information by others. It forms the basis of modern privacy laws and practices around the world. [...] At the Office of the Information and Privacy Commissioner of Ontario (IPC), we have long advocated a strong role for individuals in managing their personal information, not just by exercising their privacy rights under Ontario law, but also by becoming better informed and using privacy-enhancing technologies (PETs). [...] This paper explores what will be possible if proper digital identity services are deployed and the full power of Cloud computing is realized.
Ankit Jain

Cloud Computing - How to Deploy to Cloud and How Much - 0 views

  •  
    Cloud computing is one of the most trending subjects in IT today. However, a lot of people are still unable to clearly identify what is the "Cloud"? How to use it? What are its benefits? And why is it gaining popularity? Learn how to make optimal and correct usage of cloud deployment technology. Cutting-edge advice from Atlogys IT consultants panel comprising of Ex-Googlers and Carnegie Mellon Computer Scientists. For cloud deployment architecture, visit http://www.atlogys.com/cloud-deployment-architecture
  •  
    Cloud computing is one of the most trending subjects in IT today. However, a lot of people are still unable to clearly identify what is the "Cloud"? How to use it? What are its benefits? And why is it gaining popularity? Learn how to make optimal and correct usage of cloud deployment technology. Cutting-edge advice from Atlogys IT consultants panel comprising of Ex-Googlers and Carnegie Mellon Computer Scientists. For cloud deployment architecture, visit http://www.atlogys.com/cloud-deployment-architecture
Casey Wedge

Verizon Business - A Leading Provider of Advanced Communications Solutions - 0 views

  •  
    Verizon Business is a leading provider of advanced global network, deep IP expertise and one of the broadest sets of next-generation offerings to its broadband, wireless and voice capabilities. Verizon Business is enabling enterprises to take advantage of the transforming communications landscape. It is accelerating the deployment of advanced services, including: Private IP, Seamless Mobility, Applications Hosting, Customer Service Management and Security.
  •  
    Verizon Business is a leading provider of advanced global network, deep IP expertise and one of the broadest sets of next-generation offerings to its broadband, wireless and voice capabilities. Verizon Business is enabling enterprises to take advantage of the transforming communications landscape. It is accelerating the deployment of advanced services, including: Private IP, Seamless Mobility, Applications Hosting, Customer Service Management and Security.
Aspire SoftServ

How to Develop AI Medical Transcription Software: Costs, Process, and Benefits - 0 views

The process of creating medical transcriptions has traditionally been manual, time-consuming, and prone to errors. With increasing volumes of patient data, this approach often results in misinterpr...

#aidevelopmentcompany #aidevelopmentservices

started by Aspire SoftServ on 26 Nov 24 no follow-up yet
Eric Swanstrom

Denial of Service Detection Ensures Top-Notch Availability of Your Business - 0 views

  •  
    Denial of Service detection, protection, and mitigation services provide optimal availability of your site and help you better identify the sources of incoming traffic following each attack. Denial of Service Detection solutions from top providers ensures that your network and site remain as fully operational as possible even during the high traffic times of an attack.
Casey Wedge

Cloud-based Data Center Services for More Advanced Security and Reliability - 0 views

  •  
    Cloud Data Center Services offer many similar benefits of in-house data centers by saving your time, space and money. With Cloud-based solution your data is always accessible and you no longer need to worry about troubleshooting and expensive utilities. Millions of companies are making the move to it without having second thought. Now host your server with data center service and enjoy the services of this remarkable technology.
  •  
    Cloud Data Center Services offer many similar benefits of in-house data centers by saving your time, space and money. With Cloud-based solution your data is always accessible and you no longer need to worry about troubleshooting and expensive utilities. Millions of companies are making the move to it without having second thought. Now host your server with data center service and enjoy the services of this remarkable technology.
Stian Danenbarger

Susan W. Brenner: "The Fourth Amendment in an Era of Ubiquitous Technology" (PDF, 2005) - 0 views

  •  
    The physical and informational barriers we once used to differentiate between our "private" and "public" selves are being eroded by technology, and the erosion is accelerating. If we persist in utilizing a zero-sum, spatial conception of privacy to implement the Fourth Amendment, we will render it ineffective as a guarantor of privacy in the face of arbitrary government action. If we continue along this path, the Fourth Amendment will become, in effect, an artifact - a device that protects against a limited class of real-world intrusions (which will become increasingly unnecessary given the other alternatives).
Vasanthan Veerasingham

Advancements Of PHP In Cloud Computing - 0 views

  •  
    Advancements Of PHP In Cloud Computing : Many PHP programmer have shown their concern in cloud computing, as it slackens the web development process. PHP on Cloud is one of the best solutions to take care of all the PHP related applications to migrate on the cloud server.
Louis Martin

Long Term Cash Loans Funds Without Any Assurance For Security - 0 views

  •  
    A variety of purposes from individual to family unit can be comprehended with the assistance of the cash gave to the person through this plan of Long term cash loans. It helps in give a brisk answer for the general population to manage the surprising need of the person.
Louis Martin

Important Points To Consider Before Taking Long Term Cash Loans! - 0 views

  •  
    Of course it is quicker to get the short term online loans when your expenses go out of the budget. But meeting the lump sum repayment of these finances doesn't fall under the budget of many individuals.
Eric Swanstrom

Prolexic DDoS Services Offer Mitigation Network to Deny Largest Attacks - 0 views

  •  
    Prolexic has the quickest response times to detect and mitigate attacks. It identifies and handles attacks before you even know your network is being attacked. It successfully fight tens of thousands of Distributed Denial of Service attacks each and every year. Not only is Prolexic the most experienced Denial of Service protection provider, they also bring unparalleled expertise and support to the table making your decision that much easier. With some of the most experienced engineers and support teams you get a greater peace of mind knowing your network is protected around the clock, every day of the week.
Richard Boss

Top 5 cloud based data hosting options for mobile applications - 0 views

  •  
    Cloud computing is nothing but a system that allows you to access your files and documents from anywhere in the world. Mobile applications have been a part of the revolution, and their presence on the cloud is of significant help to the developers. In this post you will see top 5 cloud based data hosting companies that assist developers in effectively extracting the benefits of cloud based hosting of mobile applications.
Jackie Fields

IT Management Conference & Expo in NYC Oct.14-16 - 0 views

  •  
    http://www.manageit.me ---The greatest minds in IT in 50+ presentations : top industry-leaders: Creator of MySQL Michael "Monty" Widenius, Internet Celebrity Gary Vaynerchuk, Co-Creator of PHP & Zend CTO Zeev Suraski, Richard Sheridan, CEO of Menlo Innovations & Pioneer of Agile eXtreme Programmi...
Rich Hintz

Cloud Computing Poses E-Discovery, Legal Risks - 0 views

  • Cloud Computing Poses E-Discovery, Legal Risks April 10, 2009By Marty Foltyn ORLANDO, Fla. — Cloud computing was a hot topic at this week's Storage Networking World show, but one attorney sounded a warning note about the rush to the cloud. In a presentation titled "Computing (strike that — Litigation) in the Cloud," Steven Teppler, senior counsel at KamberEdelson in New York, said cloud computing and services are a corporate counsel's nightmare. The 2006 e-discovery amendments to the Federal Rules of Civil Procedure (FRCP) changed the legal and corporate information landscape, putting custody and control at top of mind. "Cloud computing means that data may always be in transit," said Teppler, "never anywhere, always somewhere." And that creates a big challenge for corporate counsel. How can they identify "who, when and where" in the cloud? How can organizations handle document retention? And to add another layer of worry, information targeted for the cloud may also be subject to laws requiring privacy and persistent data integrity, and other requirements that the storage manager may not even be aware of. Teppler spelled out the top cloud computing shortcomings: no native security attributes; inadequate or no security provisioning by providers; the lack of understanding of cloud legal issues (a real problem for not only cloud computing providers, but also corporate counsel and IT consultants); and the failure to recognize potential liability from either legal issues or a lack of security. Teppler told the audience that litigation in the cloud is already here. Users of cloud services will need to insist on service level agreement (SLA) terms with their providers to ensure legal and regulatory compliance, searchability, demonstrable customer care (security), provably persistent data integrity and reliability, and demonstrable storage security and integrity for electronically stored information in the cloud.
1 - 20 of 341 Next › Last »
Showing 20 items per page