Understanding Cloud Computing Vulnerabilities This article first appeared in Security & Privacy IEEE magazine and is brought to you by InfoQ & IEEE Computer Society. Discussions about cloud computing security often fail to distinguish general issues from cloud-specific issues. To clarify the discussions regarding vulnerabilities, the authors define indicators based on sound definitions of risk factors and cloud computing. Each day, a fresh news item, blog entry, or other publication warns us about cloud computing’s security risks and threats; in most cases, security is cited as the most substantial roadblock for cloud computing uptake. But this discourse about cloud computing security issues makes it difficult to formulate a well-founded assessment of the actual security impact for two key reasons.
dellcloudedge's Profile - GitHub
Benchmarking Cassandra Scalability on AWS - Over a million writes per second by Adrian Cockcroft and Denis Sheahan Netflix has been rolling out the Apache Cassandra NoSQL data store for production use over the last six months. As part of our benchmarking we recently decided to run a test designed to validate our tooling and automation scalability as well as the performance characteristics of Cassandra. Adrian presented these results at the High Performance Transaction Systems workshop last week.
Open Cloud Initiative (OCI) | A non-profit advocate of open cloud computing
This is my first Cloudonomics.com post in a while, as I’ve been engaged in developing a number of Monte Carlo simulations and detailed proofs of The 10 Laws of Cloudonomics. Here’s an overview of the results, with summaries of conclusions for those that don’t want to read through over 200 pages of proofs and analyses spanning economics, behavioral economics, calculus, probability, statistics, trigonometry, system dynamics, and computational complexity theory. Links to the papers and supporting simulations at ComplexModels.com are included. Here are the 10 Laws and a few bonus insights: Overview of Cloudonomics « Cloudonomics.com
Cloud Computing Roundtable This article first appeared in IEEE Security & Privacy magazine and is brought to you by InfoQ & IEEE Computer Society. Guest editors Iván Arce and Anup Ghosh put together a roundtable discussion so readers can hear about cloud computing security from those who are on the front lines, providing services and looking at the real-world threats and requirements from the market. Anup Ghosh: Thank you all for joining us.
Considering using an infrastructure as a service (IaaS) or platform as a service (PaaS) to host your web applications? Are you concerned about performance and availability? Using the Global Provider View, compare cloud performance of PaaS and IaaS providers as we continuously monitor a sample application running in each of the top cloud computing service providers from around the world. See firsthand, in real time, how well the sample application performs over time from the various Internet backbone locations you see here. Methodology Overview Global Provider View
cloudControl » Cloud hosting platform
Cloud Patterns from VMware Over the last few months WMware's Steve Jin has published several design patterns around working with virtual machines in the cloud, especially vCloud. He follows a common dialogue in each published pattern which makes it easy to read and consume. Steve's current list of patterns:
Executive Summary With Cloud Computing becoming more widely utilized, it is important for organizations to understand ways to maximize benefits and minimize risks of a move to the cloud. This paper details the significant benefits that Cloud Computing brings and provides guidance to IT decision makers to help their decision making process. This is especially important given the plethora of vendors in the marketplace today. Moving your Infrastructure to the Cloud: How to Maximize Benefits and Avoid Pitfalls
Dr Dobbs - Cloud Computing on Rich Data