Cloud Computing
文章平均质量分 65
破小孩儿
互联网
系统分析师和软件架构师
设计模式 SOA 分布式
展开
-
[Cloud Computing]Mechanisms: Virtual Firewall
Virtual FirewallA virtual firewall is a virtual appliance (virtual software) running as a virtual server that controls and filters communication to virtual servers, from virtual servers, and bet转载 2016-07-28 08:53:46 · 376 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Malware Hash
Malware HashHashing is a process that transforms arbitrary-length data into a small, fixed-length string of characters called a digest or message digest. Malware hashes are used by virus protect转载 2016-07-19 08:42:08 · 305 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Multi-Device Broker
Multi-Device BrokerAn individual cloud service may need to be accessed by different types of cloud service consumers, some of which may be incompatible with the cloud service’s published service转载 2016-07-19 08:46:46 · 981 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Network Forensic Monitor
Network Forensic MonitorNetwork forensics identifies the source of intermittent performance issues and supports investigations to identify the source of data leaks, policy violations, or securit转载 2016-07-19 08:54:30 · 298 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Network
Virtual NetworkThe virtual network is a combination of virtual switches and their uplinks to a physical network that isolates a network environment. It requires a minimum of one physical uplink转载 2016-07-29 08:25:22 · 351 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Private Cloud
Virtual Private CloudThe virtual private cloud (VPC) is the segmentation of a public cloud service provider’s multitenant environment to support private cloud computing. The VPC provides secure转载 2016-07-29 08:30:08 · 378 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Private Network
Virtual Private NetworkThe virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide consumers with secure connections to t转载 2016-07-29 08:32:15 · 583 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual RAM
Virtual RAMIn a virtualized computing environment, physical memory is partitioned into virtualized physical memory. Virtual memory management techniques are used to allocate additional memory to转载 2016-07-29 08:39:36 · 560 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Server
Virtual ServerThe virtual server, also known as virtual machine (VM), is a form of virtualization software that emulates a physical server and is used by cloud providers to share the same physic转载 2016-07-29 08:45:01 · 562 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Server Snapshot
Virtual Server SnapshotSnapshotting a virtual server is a method of creating a full restore point for the virtual server, including the virtual server’s applications, hardware settings, and oper转载 2016-07-29 08:52:19 · 367 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Server State Manager
Virtual Server State ManagerThe virtual server state manager enables the virtual server to be paused and saved in any state. This can be performed in the middle of any action, such as copying fi转载 2016-07-29 08:56:00 · 405 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: LUN Masking
LUN MaskingThe LUN masking mechanism is used to configure required security policies to present the storage LUNs to only those systems and cloud storage devices that require access via the inter转载 2016-07-19 08:38:24 · 384 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Logical Network Perimeter
Logical Network PerimeterThe logical network perimeter establishes a virtual network boundary that can encompass and isolate a group of related cloud-based IT resources that may be physically转载 2016-07-19 08:34:03 · 686 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Infrastructure Manager
Virtual Infrastructure ManagerVirtualized IT resource management is often supported by virtualization infrastructure management (VIM) tools that collectively manage virtual IT resources and rely转载 2016-07-28 08:58:29 · 634 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Storage Data Aging Management
Cloud Storage Data Aging ManagementA data management lifecycle can be defined for different types of data or datasets, and each dataset may need to be stored on different cloud storage devices转载 2016-07-07 08:27:39 · 438 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Storage Data Placement Auditor
Cloud Storage Data Placement AuditorThe cloud storage data placement auditor mechanism is used to govern and control where datasets can be stored. This mechanism can be used to enforce policie转载 2016-07-07 08:31:25 · 426 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Storage Device
Cloud Storage DeviceThe cloud storage device mechanism represents storage devices that are designed specifically for cloud-based provisioning. Instances of these devices can be virtualized, si转载 2016-07-07 08:48:07 · 881 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Storage Device Performance Monitor
Cloud Storage Device Performance MonitorThe cloud storage device performance monitor mechanism is used to ensure pre-defined levels of performance are met using a policy-driven model of storag转载 2016-07-07 08:53:28 · 389 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Storage Management Portal
Cloud Storage Management PortalThe cloud storage management portal mechanism allows cloud consumers and cloud service consumers access to interact with and control data stored in a cloud envir转载 2016-07-07 09:00:07 · 396 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Usage Monitor
Cloud Usage MonitorThe cloud usage monitor mechanism is a lightweight and autonomous software program responsible for collecting and processing IT resource usage data. Depending on the type of转载 2016-07-08 08:36:11 · 731 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cloud Workload Scheduler
Cloud Workload SchedulerThe cloud workload scheduler automates, monitors, and controls the workflow throughout the cloud infrastructure. This automation usually manages hundreds of thousands o转载 2016-07-08 08:40:54 · 409 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Cryptographic Key Management System
Cryptographic Key Management SystemThe cryptographic key management system (CKMS) consists of policies, procedures, components and devices that are used to protect, manage, and distribute cryp转载 2016-07-08 08:45:53 · 432 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Load Balancer
Load BalancerThe load balancer mechanism is a runtime agent with logic fundamentally based on the premise of employing horizontal scaling to balance a workload across two or more IT resources to转载 2016-07-19 08:27:42 · 467 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Orchestration Engine
Orchestration EngineOrchestration is the automated coordination and management of computer resources and services. Orchestration provides for deployment and execution of interdependent workflows转载 2016-07-20 08:34:43 · 416 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Pay-Per-Use Monitor
Pay-Per-Use MonitorThe pay-per-use monitor mechanism measures cloud-based IT resource usage in accordance with predefined pricing parameters and generates usage logs for fee calculations and bil转载 2016-07-20 08:39:46 · 1278 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Resource Management System
Resource Management SystemThe resource management system mechanism helps coordinate IT resources in response to management actions performed by both cloud consumers and cloud providers (Figure 1转载 2016-07-22 08:46:49 · 521 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Resource Replication
Resource ReplicationResource replication is defined as the creation of multiple instances of the same IT resource, and is typically performed when an IT resource's availability and performance n转载 2016-07-22 08:49:51 · 1081 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Sandbox
SandboxA sandbox is a testing environment that isolates untested or unknown code. Sandboxing protects operational systems and their data from unknown code that may have arrived on the network fr转载 2016-07-22 08:54:28 · 429 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Secure Token Service
Secure Token ServiceA secure token service (STS) issues security tokens as a result of consumer requests for single sign-on (SSO) tokens. The STS authenticates the consumer and issues a security转载 2016-07-22 09:01:37 · 392 阅读 · 0 评论 -
[Cloud Computing]Patterns: Broad Access
Broad Access (Erl, Naserpour)How can cloud services be made accessible to a diverse range of cloud service consumers?ProblemCloud consumers may require access to a cloud service vi转载 2016-08-02 08:14:08 · 722 阅读 · 0 评论 -
[Cloud Computing]Patterns: Cross-Storage Device Vertical Tiering
Cross-Storage Device Vertical Tiering (Erl, Naserpour)How can the vertical scaling of data processing be carried out dynamically?ProblemIncreasing the processing capacity of data s转载 2016-08-02 08:21:30 · 922 阅读 · 0 评论 -
[Cloud Computing]Patterns: Dynamic Data Normalization
Dynamic Data Normalization (Erl, Naserpour)How can redundant data within cloud storage devices be automatically avoided?ProblemCloud consumers may store large volumes of redundant转载 2016-08-02 08:26:51 · 552 阅读 · 0 评论 -
[Cloud Computing]Patterns: Dynamic Scalability
Dynamic Scalability (Erl, Naserpour)How can IT resources be scaled automatically in response to fluctuating demand?ProblemIt is challenging to equip an IT resource to match its pro转载 2016-08-03 08:42:16 · 727 阅读 · 0 评论 -
[Cloud Computing]Patterns: Elastic Disk Provisioning
Elastic Disk Provisioning (Erl, Naserpour)How can the billing of cloud storage be based on actual, fluctuating storage consumption?ProblemWhen cloud providers charge for fixed-disk转载 2016-08-03 08:48:10 · 864 阅读 · 0 评论 -
[Cloud Computing]Patterns: Elastic Network Capacity
Elastic Network Capacity (Erl, Naserpour)How can network bandwidth be allocated to align with actual usage requirements?ProblemNetwork bandwidth is often fixed, resulting in perfor转载 2016-08-03 08:52:37 · 600 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Resource Cluster
Resource ClusterCloud-based IT resources that are geographically diverse can be logically combined into groups to improve their allocation and use. The resource cluster mechanism is used to grou转载 2016-07-22 08:39:00 · 469 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Virtual Switch
Virtual SwitchA virtual switch is a logical network switch that operates at the hypervisor level. Network interface cards (NICs) are emulated into a single virtual switch. Some virtual switches转载 2016-08-01 09:11:29 · 802 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Physical Uplink
Physical UplinkA physical uplink is used by virtual servers to communicate with the virtual and physical servers that are hosted outside of their virtual switch. This path must be guaranteed to转载 2016-07-20 08:46:34 · 392 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Platform Trust Policy
Platform Trust PolicyA platform trust policy is a security assurance policy for a platform, such as its secure launch control policy, restricting applications to only execute on platforms that m转载 2016-07-20 08:50:48 · 442 阅读 · 0 评论 -
[Cloud Computing]Mechanisms: Public Key Infrastructure
Public Key InfrastructureA common approach for managing the issuance of asymmetric keys is based on the public key infrastructure (PKI) mechanism, which exists as a system of protocols, data for转载 2016-07-20 08:54:08 · 470 阅读 · 0 评论