Cloud computing

Facebook Twitter
Understanding Cloud Computing Vulnerabilities Understanding Cloud Computing Vulnerabilities This article first appeared in Security & Privacy IEEE magazine and is brought to you by InfoQ & IEEE Computer Society. Discussions about cloud computing security often fail to distinguish general issues from cloud-specific issues. To clarify the discussions regarding vulnerabilities, the authors define indicators based on sound definitions of risk factors and cloud computing. Each day, a fresh news item, blog entry, or other publication warns us about cloud computing’s security risks and threats; in most cases, secu­rity is cited as the most substantial roadblock for cloud computing uptake. But this discourse about cloud computing security issues makes it difficult to formulate a well-founded assessment of the actual se­curity impact for two key reasons.
Skip to content Sign up Sign in Public Private Sources dellcloudedge's Profile - GitHub dellcloudedge's Profile - GitHub

Benchmarking Cassandra Scalability on AWS - Over a million writes per second Benchmarking Cassandra Scalability on AWS - Over a million writes per second by Adrian Cockcroft and Denis Sheahan Netflix has been rolling out the Apache Cassandra NoSQL data store for production use over the last six months. As part of our benchmarking we recently decided to run a test designed to validate our tooling and automation scalability as well as the performance characteristics of Cassandra. Adrian presented these results at the High Performance Transaction Systems workshop last week.
Open Cloud Initiative (OCI) | A non-profit advocate of open cloud computing
This is my first post in a while, as I’ve been engaged in developing a number of Monte Carlo simulations and detailed proofs of The 10 Laws of Cloudonomics. Here’s an overview of the results, with summaries of conclusions for those that don’t want to read through over 200 pages of proofs and analyses spanning economics, behavioral economics, calculus, probability, statistics, trigonometry, system dynamics, and computational complexity theory. Links to the papers and supporting simulations at are included. Here are the 10 Laws and a few bonus insights: Overview of Cloudonomics « Overview of Cloudonomics «


Cloud Computing Roundtable This article first appeared in IEEE Security & Privacy magazine and is brought to you by InfoQ & IEEE Computer Society. Guest editors Iván Arce and Anup Ghosh put together a roundtable discussion so readers can hear about cloud computing security from those who are on the front lines, providing services and looking at the real-world threats and requirements from the market. Anup Ghosh: Thank you all for joining us. Cloud Computing Roundtable
cloud standards

Global Provider View Considering using an infrastructure as a service (IaaS) or platform as a service (PaaS) to host your web applications? Are you concerned about performance and availability? Using the Global Provider View, compare cloud performance of PaaS and IaaS providers as we continuously monitor a sample application running in each of the top cloud computing service providers from around the world. See firsthand, in real time, how well the sample application performs over time from the various Internet backbone locations you see here. Methodology Overview Global Provider View
cloudControl » Cloud hosting platform cloudControl » Cloud hosting platform Do What You Do Best Focus on building the next amazing application with cloudControl's powerful PaaS runtime and Add-on ecosystem. Never worry about servers or IT infrastructure again. Let cloudControl do the heavy lifting.

deployment models

Welcome to Data Center Map - your guide to the global data center market, with focus on colocation, IP transit, cloud and various hosting services. Navigate through the map below, browse through our text-based index, use our search function or request a quote via our quote service. Non-neutral DC's Carrier neutral DC's Data Center Map

Data Center Map

Cloud Patterns from VMware Over the last few months WMware's Steve Jin has published several design patterns around working with virtual machines in the cloud, especially vCloud. He follows a common dialogue in each published pattern which makes it easy to read and consume. Steve's current list of patterns: Cloud Patterns from VMware
libcloud python library - a unified interface to cloud server providers Supports more than 30 providers such as Compute Example - Create a node from libcloud.compute.types import Providerfrom libcloud.compute.providers import get_drivercls = get_driver(Provider.RACKSPACE)driver = cls('username', 'api key', region='iad')sizes = driver.list_sizes()images = driver.list_images()size = [s for s in sizes if == 'performance1-1'][0]image = [i for i in images if 'Ubuntu 12.04' in][0]node = driver.create_node(name='libcloud', size=size, image=image)print(node) For information on what the code does, click or hover over the line. For more compute examples, see documentation.

libcloud python library - a unified interface to cloud server providers

Executive Summary With Cloud Computing becoming more widely utilized, it is important for organizations to understand ways to maximize benefits and minimize risks of a move to the cloud. This paper details the significant benefits that Cloud Computing brings and provides guidance to IT decision makers to help their decision making process. This is especially important given the plethora of vendors in the marketplace today. Moving your Infrastructure to the Cloud: How to Maximize Benefits and Avoid Pitfalls
What Is Apache Hadoop? The Apache™ Hadoop® project develops open-source software for reliable, scalable, distributed computing. The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models. It is designed to scale up from single servers to thousands of machines, each offering local computation and storage. Rather than rely on hardware to deliver high-availability, the library itself is designed to detect and handle failures at the application layer, so delivering a highly-available service on top of a cluster of computers, each of which may be prone to failures.

Welcome to Apache Hadoop!

Dr Dobbs - Cloud Computing on Rich Data
cloud security