Cloud

Cloud technologies are gaining momentum everyday in the largest data centers and the smallest businesses, offering services that encompass everything from the infrastructure down to the software level. There are many potential benefits as well as risks, but market leaders like Amazon, Rackspace, IBM, and Microsoft are bringing the cloud from the bleeding edge to the center of the IT landscape.

  • White Papers // Jul 2010

    Towards Smart Storage for Repository Preservation Services

    The move to digital is being accompanied by a huge rise in volumes of (born-digital) content and data. As a result the curation lifecycle has to be redrawn. Processes such as selection and evaluation for preservation have to be driven by automation. Manual processes will not scale, and the traditional...

    Provided By Creative Commons

  • White Papers // Dec 2013

    Data Security and Privacy Issues in Cloud Computing: A Survey

    Cloud computing is a new business model that have generated revolution in Information Technology (IT) industry. Distributed computation and storage are two main features of cloud computing. The applications and data pertaining to different clients are placed in the cloud, where the management of data is under the direct control...

    Provided By Guru Nanak Dev University

  • White Papers // Mar 2014

    Mobile Cloud Middleware: A New Service for Mobile Users

    Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Enhancing Privacy-Preserving Cloud Database Querying by Preventing Brute Force Attacks

    Considering the complexities involved in cloud computing, there are still plenty of issues that affect the privacy of data in cloud environment. Unless these problems get solved, the authors think that the problem of preserving privacy in cloud databases is still open. In tokenization and homomorphic cryptography based solutions for...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Secured Transaction Mechanism over Cloud Computing SaaS layer

    In the recent era, cloud computing has evolved as a net centric, service oriented computing model. As defined by National Institute of Standards and Technology (NIST), cloud computing is model which enables the convenient, on-demand network access to a shared pool of configurable computing resources (e.g., servers, services, applications, networks,...

    Provided By IJMEMR

  • White Papers // Dec 2013

    Security Threats in Cloud Computing

    Cloud computing is a network-based environment that focuses on sharing computations or resources. Actually, clouds are Internet-based and it tries to disguise complexity for clients. Cloud computing refers to both the applications delivered as services over the Internet and the hardware and software in the data centers that provide those...

    Provided By IJMEMR

  • White Papers // Oct 2013

    A Survey over Virtualization and Hypervisor

    In this paper the authors simply contain the recent developments in the field of cloud computing. Cloud computing is an adoption and diffusion which are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In particular they carried out a survey over Virtualization and...

    Provided By IJMEMR

  • White Papers // Jul 2013

    Cloud Rendering System

    Cloud rendering system depicts rendering of multimedia contents like dicom, virtual reality, augmented reality, and high resolution images. Cloud rendering system provides the cost effective, flexible, scalable and extensible solution for high resolution multimedia contents. There are varieties of software available in the market. The chromium is one such software...

    Provided By IJMEMR

  • White Papers // Apr 2014

    Cloud Computing Security Challenges and Their Compromised Attributes

    Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Mar 2014

    CloudPowerCap: Integrating Power Budget and Resource Management Across a Virtualized Server Cluster

    In many datacenters, server racks are highly underutilized. Rack slots are left empty to keep the sum of the server nameplate maximum power below the power provisioned to the rack. And the servers that are placed in the rack cannot make full use of available rack power. The root cause...

    Provided By Washington Trust Bank

  • White Papers // Feb 2013

    Evaluating Auto Scalable Application on Cloud

    Cloud computing enables dynamic scaling out of system resources, depending on workloads and data volume. In addition to the conventional scaling-out mechanisms for Web servers, KVS-based scaling-out mechanisms for database servers are drawing attention. However, there are not many discussions about approaches for automatically scaling out Web servers and database...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2012

    QoS Guarantees and Service Differentiation for Dynamic Cloud Applications

    Cloud elasticity allows dynamic resource provisioning in concert with actual application demands. Feedback control approaches have been applied with success to resource allocation in physical servers. However, cloud dynamics make the design of an accurate and stable resource controller challenging, especially when application-level performance is considered as the measured output....

    Provided By Wayne Stansfield

  • White Papers // Dec 2012

    The New Normal

    Use of more mobile devices and more mobile applications at work creates an ever-changing set of challenges for wireless network administrators and engineers. A wide variety of laptops, smartphones and tablets now access the network, almost always using Wi-Fi as the preferred - and sometimes the only - way to...

    Provided By Aruba Networks

  • White Papers // Sep 2009

    Cloud-Based Content Security Service (CSS)

    By some measures, as many as 90% of the workforce is now situated away from headquarters sites, often telecommuting from home or working from small branch locations. IT teams have been making this possible by evolving the distributed enterprise network, the communications fabric that drives the productivity of far-flung global...

    Provided By Aruba Networks

  • White Papers // Apr 2010

    Virtual Branch Networking (VBN) 2.0 and the Emergence of Cloud-Based Branch Offices

    There has been a significant shift during the past 10 years in the way people work, and this has created an extraordinary impact on corporate IT organizations. The first game-changer was mobility. With mobility, the end user gained the freedom to work anywhere at any time, which increased productivity. In...

    Provided By Aruba Networks

  • White Papers // Jan 2014

    Server Data is the Main Target for Advanced Persistent Threats -  The Case For A Data-Centric Security Model

    This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats. Read this paper to learn more about: The benefits of a data-centric...

    Provided By Vormetric

  • White Papers // Jan 2014

    Securing Sensitive Data within Amazon Web Services EC2 and EBS - Challenges and Solutions to Protecting Data within the AWS Cloud

    In this white paper, learn about the specific problems around data protection when using servers within Amazon Web Services (AWS) environments. This includes both problems specific to the environment, the motivations that drive the need for this data protection, and recent changes in cyber threats that highlight the need for...

    Provided By Vormetric

  • eBooks // Aug 2013

    Building Great Digital Experiences with Acquia Cloud Site Factory

    Today’s marketplace couldn’t be more competitive. Staying ahead of the competition means being able to respond to a changing market instantly. Launching a marketing campaign, a new brand, or even a new family of brands can mean the difference between success…or trailing the pack. Acquia Cloud Site Factory offers a...

    Provided By Acquia

  • eBooks // Oct 2013

    Surviving the Mobile Tsunami

    No longer can we think about mobile as an afterthought . Digital mobile experiences—on smartphones, tablets, digital glasses, digital watches, and more—are what we should be thinking about first. Responsive design is crucial. In addition, a consumer must be able to switch from laptop to tablet to smartphone while engaging...

    Provided By Acquia

  • White Papers // Dec 2013

    Building the Business Case for Cloud SSO

    There are many compelling reasons to add Single Sign-On (SSO) to the cloud applications their business uses. Maybe the user want to get better control over the cloud-based applications employees and contractors are using for their business. Perhaps the user are worried about insecure or shared passwords. People might be...

    Provided By Gemalto

  • White Papers // Nov 2013

    Two-Factor Authentication for Cloud Applications

    The One-Time Password (OTP) can be a special case. It's a pin or password generated at the time of the connection - hence something the user know. It has a very short life, so even if a keylogger steals it, they cannot use it. But if the user have the...

    Provided By Gemalto

  • White Papers // Nov 2013

    Identity and Access Management in the Cloud: A Primer

    Enter cloud-based applications. Businesses using cloud applications have a whole new set of challenges around managing identity for applications that are inherently outside their control. Their users may not even be within their own networks when connecting to cloud-based applications on the business' behalf. Whether people are accessing hosted email,...

    Provided By Gemalto

  • White Papers // Jan 2013

    Transforming Government Services with a Secure, Compliant Private Cloud Environment

    As a result, governments are under pressure to provide more efficient, secure, and effective citizen-centric applications and services, as well as improve inter-departmental and cross-agency collaboration. To better serve their constituencies, government IT leaders are being asked to transform costly and inflexible legacy infrastructures, increase the productivity of existing workforces,...

    Provided By Cisco Systems

  • White Papers // Aug 2009

    Cisco Cloud Computing - Data Center Strategy, Architecture, and Solutions

    Public sector and federal government agencies are looking for better vehicles to tame IT budgets, and at the same time provide agile IT services to organizations, citizens and constituents. The paradigm of cloud computing, which has been recently introduced and developed, offers means for public managers and government executives to...

    Provided By Cisco Systems

  • Webcasts // Sep 2008

    Innovation Network Lecture Series: Project Daoli: Behavior Conformity for Cloud Computing

    Research is delivering new insights that will help to improve trust and assurance in the cloud computing environment. One such project is Daoli (www.daoliproject.org), a research project led by EMC Research China collaborating with four of China's top university teams to explore new methods for providing trust and assurance in...

    Provided By EMC

  • Case Studies // Aug 2009

    F5 Drops 60 Percent of Spam From IT Infrastructure With BIG-IP Message Security Module

    Increasing spam levels put a persistent and growing strain on those resources. By implementing F5 BIG-IP Message Security Module (MSM), F5's IT department has been able to drop 60 percent of unwanted inbound email before it reaches the IT infrastructure. This has resulted in a significant cost savings, a more...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Global Distributed Service in the Cloud With F5 and VMware

    The term "Cloud computing" has been a prevalent, forward-thinking component of IT for the past year, fueled by new technologies in the local data center such as virtualization. Like most new terms in technology, cloud computing means different things to different people. On one end of the spectrum, it's nothing...

    Provided By F5 Networks

  • White Papers // Jan 2010

    Controlling the Cloud: Requirements for Cloud Computing

    Cloud computing represents not a revolution but an evolution of existing enterprise computing architectures, dating back to the first instance of networked computing. The difference is that today there are vast advances in virtualization in nearly every aspect of the data center. There has also been an emergence of a...

    Provided By F5 Networks

  • White Papers // Apr 2010

    Availability and the Cloud

    Cloud computing, while still evolving in all its iterations, can offer IT a powerful alternative for efficient application, infrastructure, and platform delivery. As businesses continue to embrace the cloud as an advantageous application delivery option, the basics are still the same: scalability, flexibility, and availability to enable a more agile...

    Provided By F5 Networks

  • White Papers // Mar 2010

    Cloud Balancing: The Evolution of Global Server Load Balancing

    While cloud balancing sounds like a futuristic concept, it is actually based on proven, well-understood global application delivery technology. Today, large organizations already use global application delivery to enhance application performance, ensure availability, and control the costs associated with application delivery. Cloud balancing provides the means by which organizations with...

    Provided By F5 Networks

  • White Papers // Mar 2010

    The Optimized and Accelerated Cloud

    Cloud computing is an interesting change in the data center because it simultaneously offers huge benefits and brings huge risks to enterprise IT. The benefits come from providing a much more dynamic and agile computing environment for any application, as well as helping IT move expensive assets outside its own...

    Provided By F5 Networks

  • White Papers // Feb 2010

    Creating a Hybrid ADN Architecture With Both Virtual and Physical ADCs

    Virtualization has long since moved from an emerging data center technology into a standard deployment tool across organizations of all sizes, regardless of industry. A virtualization survey from Rackspace in August 2007 indicated a strong trust in virtualization, with 72 percent of respondents noting a willingness to deploy virtualized applications...

    Provided By F5 Networks

  • White Papers // Apr 2010

    Securing the Cloud

    While companies certainly see a business benefit to a pay-as - go model for computing resources, security concerns seem always to appear at the top of surveys regarding cloud computing. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and...

    Provided By F5 Networks

  • White Papers // Aug 2010

    Hybrid Cloud Application Architecture for Elastic Java-Based Web Applications

    Welcome to the Hybrid Cloud Application Architecture guide for F5 and VMware vCloud systems. This paper has been prepared as an illustration of an architecture that can be adapted to suit the needs of the particular application. Using F5, VMware, GemStone and other freely available components, the authors have prepared...

    Provided By F5 Networks

  • White Papers // Jul 2009

    Cloud Computing: Survey Results

    As organizations cope with a dynamically changing business environment, IT managers look to cloud computing as a means to maintain a flexible and scalable IT infrastructure that enables business agility. In June 2009, F5 Networks conducted a study examining the adoption of cloud computing by enterprise IT managers. The study...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Improving Business Continuity With VMware Cloud Computing and F5

    Implementing plans to ensure business continuity for key IT services and business critical applications is an essential requirement for organizations today. Downtime of important applications is a costly proposition and extended downtime can even be fatal - industry research finds that a significant number of companies that experience extended interruption...

    Provided By F5 Networks

  • White Papers // Aug 2009

    Connecting to the Cloud With F5 BIG-IP Solutions and VMware VMotion

    Cloud Computing has become an important technology to consider for organizations that are looking to optimize their IT operations and reduce operating costs. Until now, leveraging the cloud involved either setting up and running applications in the cloud and managing them long-term off-premise, or running services as a one-time event....

    Provided By F5 Networks

  • White Papers // Apr 2010

    The F5 Powered Cloud

    Cloud Computing continues to gain in mindshare and adoption rates as organizations begin to investigate how to best leverage these new deployment models. Whether building out a private cloud, using or building a public cloud, or taking advantage of platform and software as a service, F5 solutions can improve the...

    Provided By F5 Networks

  • White Papers // Jan 2010

    File Virtualization a Bridge to the Cloud

    Cloud storage is an attractive option for a growing number of organizations. The potential benefits from outsourcing storage infrastructure are pretty clear, ranging from incremental storage expenditures to near-limitless capacity and reduced overhead. The issue for many, however, is implementation. How to get the appropriate data identified and physically moved...

    Provided By F5 Networks

  • White Papers // May 2010

    Unleashing the True Potential of On-Demand IT

    If one imagines the flow of anything, be it people, cars, water, electricity or commerce, there are specific points within those flows that provide intelligent processing and control. Typically, these control points exist at strategic points within the flow; discrete boundaries or junctures where multiple flows coalesce for re‑distribution. Their...

    Provided By F5 Networks