Generally, cloud computing customers do not own the physical infrastructure, instead avoiding by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity) are consumed, whereas others bill on a subscription basis. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates, as servers are not unnecessarily left idle (which can reduce costs significantly while increasing the speed of application development). A side-effect of this approach is that overall computer usage rises dramatically, as customers do not have to engineer for peak load limits. In addition, "increased high-speed bandwidth" makes it possible to receive the same. The cloud is becoming increasingly associated with small and medium enterprises (SMEs) as in many cases they cannot justify or afford the large capital expenditure of traditional IT. SMEs also typically have less existing infrastructure, less bureaucracy, more flexibility, and smaller capital budgets for purchasing in-house technology. Similarly, SMEs in are typically unburdened by established legacy infrastructures, thus reducing the complexity of deploying cloud solutions.Cloud computing users avoid (CapEx) on hardware, software, and services when they pay a provider only for what they use. Consumption is usually billed on a utility (resources consumed, like electricity) or subscription (time-based, like a newspaper) basis with little or no upfront cost. Other benefits of this approach are low barriers to entry, shared infrastructure and costs, low management overhead, and imediate access to a broad range of applications. In general, users can terminate the contract at any time (thereby avoiding return on investment risk and uncertainty), and the services are often covered by service level agreements (SLAs) with financial penalties.According to the strategic importance of information technology is diminishing as it becomes standardized and less expensive. He argues that the cloud computing paradigm shift is similar to the displacement of frozen water trade by electricity generators early in the 20th century.Although companies might be able to save on upfront capital expenditures, they might not save much and might actually pay more for operating expenses. In situations where the capital expense would be relatively small, or where the organization has more flexibility in their capital budget than their operating budget, the cloud model might not make great fiscal sense. Other factors having an impact on the scale of potential cost savings include the efficiency of a company's data center as compared to the cloud vendor's, the company's existing operating costs, the level of adoption of cloud computing, and the type of functionality being hosted in the cloud.Among the items that some cloud hosts charge for are (often with extra charges for high-memory or high-CPU instances), data transfer in and out, storage (measured by the GB-month), I/O requests, . In some cases, users can bid on instances, with pricing dependent on demand for available instances.
AddThis
Friday, December 3, 2010
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid.Cloud computing is a natural evolution of the widespread adoption of virtualization, Service-oriented architecture and utility computing. Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet provision of dynamically and often is a byproduct and consequence of the ease-of-access to remote computing sites provided by the Internet. frequently takes the form of web-based tools or applications that users can access and use through a web browser as if it were a program installed locally on their own computer. NIST provides a somewhat more objective and specific definition here The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network, later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. cloud computing providers deliver common business applications online that are accessed from another Web service or software like a Web browser, while the software and\ are stored on servers.Most cloud computing infrastructures consist of services delivered through common centers and built on servers. Clouds often appear as single points of access for consumers' computing needs. Commercial offerings are generally expected to meet quality of service (QoS) requirements of customers, and typically include (SLAs). major cloud service providers include \ and Google Some of the larger IT firms that are actively involved in cloud computing.
+Reseller hosting is a form of web hosting wherein the account owner has the ability to use his/her allotted hard drive space and bandwidth to host websites on behalf of third parties. The reseller purchases the host's services wholesale and then sells them to customers, possibly for a profit. A certain portion of hard drive and bandwidth is allocated to the reseller account. The reseller may rent a dedicated server from a hosting company, or resell shared hosting services. In the latter case, the reseller is simply given the permission to sell a certain amount of disk space and bandwidth to his own customers without renting a server from a web hosting company he signed for a reseller account with.The typical web hosting reseller might be a web design firm, web developer or systems integrator who offers web hosting as an add-on service. Reseller hosting is also an inexpensive way for web hosting entrepreneurs to start a company. Most reseller hosting plans allow resellers to create their own service plans and choose their own pricing structure. In many cases, resellers are able to establish their own branding via customized control panels and name servers.Reseller hosting does not require extensive knowledge of the technical aspects of web hosting. Usually, the data center operator is responsible for maintaining network infrastructure and hardware, and the dedicated server owner configures, secures, and updates the server. A reseller is responsible for interfacing with his/her own customer base, but any hardware, software and connectivity problems are typically forwarded to the server provider from whom the reseller plan was purchased. Being a profitable reseller firm usually involves extensive advertising to get customers. While the monthly fees with major hosts are only a few dollars a month, it's a low margin business, and resellers must devote large advertising budgets to compete with established competitors. However, web hosting is one of the biggest online businesses, because every website needs hosting.
Many free web hosting services discourage the use of their free web hosting services for file or image hosting only in which no web page is established or setup resulting in the use of bandwidth due to hot linking of files with no revenue gain to the service provider in the case of advertising supported services. As a result, hot linking or remote linking or inclusion of many image, media and download file formats is disabled or not permitted on many free web hosting services.Other common limitations on file hosting limits on free hosts are limits on file size, for example no files over 5 MB or file types such as programs or large media files such as MP3.This has resulted in the growth of free hosting services dedicated to image hosting, video hosting and general file hosting which permit remote hotlinking of files and larger file formats.
Internet hosting services can run Web servers; see Internet hosting services.Many large companies who are not internet service providers also need a computer permanently connected to the web so they can send email, files, etc. to other sites. They may also use the computer as a website host so they can provide details of their goods and services to anyone interested. Additionally these people may decide to place online orders.Free web hosting service: offered by different companies with limited services, sometimes supported by advertisements, and often limited when compared to paid hosting.Shared web hosting service: one's website is placed on the same server as many other sites, ranging from a few to hundreds or thousands. Typically, all domains may share a common pool of server resources, such as RAM and the CPU. The features available with this type of service can be quite extensive. A shared website may be hosted with a reseller.Reseller web hosting: allows clients to become web hosts themselves. Resellers could function, for individual domains, under any combination of these listed types of hosting, depending on who they are affiliated with as a reseller. Resellers' accounts may vary tremendously in size: they may have their own virtual dedicated server to a collocated server. Many resellers provide a nearly identical service to their provider's shared hosting plan and provide the technical support themselves.Virtual Dedicated Server: also known as a Virtual Private Server (VPS), divides server resources into virtual servers, where resources can be allocated in a way that does not directly reflect the underlying hardware. VPS will often be allocated resources based on a one server to many VPSs relationship, however virtualisation may be done for a number of reasons, including the ability to move a VPS container between servers. The users may have root access to their own virtual space. Customers are sometimes responsible for patching and maintaining the server.Dedicated hosting service: the user gets his or her own Web server and gains full control over it (root access for Linux/administrator access for Windows); however, the user typically does not own the server. Another type of Dedicated hosting is Self-Managed or Unmanaged. This is usually the least expensive for Dedicated plans. The user has full administrative access to the box, which means the client is responsible for the security and maintenance of his own dedicated box.Managed hosting service: the user gets his or her own Web server but is not allowed full control over it (root access for Linux/administrator access for Windows); however, they are allowed to manage their data via FTP or other remote management tools. The user is disallowed full control so that the provider can guarantee quality of service by not allowing the user to modify the server or potentially create configuration problems. The user typically does not own the server. The server is leased to the client.Colocation web hosting service: similar to the dedicated web hosting service, but the user owns the colo server; the hosting company provides physical space that the server takes up and takes care of the server. This is the most powerful and expensive type of web hosting service. In most cases, the colocation provider may provide little to no support directly for their client's machine, providing only the electrical, Internet access, and storage facilities for the server. In most cases for colo, the client would have his own administrator visit the data center on site to do any hardware upgrades or changes.Cloud Hosting: is a new type of hosting platform that allows customers powerful, scalable and reliable hosting based on clustered load-balanced servers and utility billing. Removing single-point of failures and allowing customers to pay for only what they use versus what they could use.Clustered hosting: having multiple servers hosting the same content for better resource utilization. Clustered Servers are a perfect solution for high-availability dedicated hosting, or creating a scalable web hosting solution. A cluster may separate web serving from database hosting capability.Grid hosting: this form of distributed hosting is when a server cluster acts like a grid and is composed of multiple nodes.Home server: usually a single machine placed in a private residence can be used to host one or more web sites from a usually consumer-grade broadband connection. These can be purpose-built machines or more commonly old PCs. Some ISPs actively attempt to block home servers by disallowing incoming requests to TCP port 80 of the user's connection and by refusing to provide static IP addresses. A common way to attain a reliable DNS hostname is by creating an account with a dynamic DNS service. A dynamic DNS service will automatically change the IP address that a URL.
Friday, November 5, 2010
MAX Corporation to participate in the Piper Jaffray Technology, Media & Telecommunications
IMAX Corporation, a statement today in Quebec, Richard L. Gelfond, CEO of IMAX Corporation Speak at Technology, Piper Jaffray, Media & Telecommunications Conference on Tuesday, November 9, 2010 at 01:00 ET. The conference will look at the Westin Times Square in New York City, the.
The presentation will be webcast live sera Can a visitor believes the object of investor relations Web site: son, www.imax.com. The presentation sera archived for 30 days.
Sunday, October 24, 2010
Google 'spied' on British emails and computer passwords
London: In what might be called a breakthrough Internet search engine "Google" has admitted spying on computer and email passwords of all families in Britain.
California company, but apologized for the removal of personal data from wireless networks when their fleet vehicles drove down residential streets taking pictures for its Street View project, reported the Sunday Telegraph.
The Information Commissioner's Office, the privacy watchdog, said it would be looking into Google's admission.
Images for Street View were gathered by vehicle-mounted panoramic cameras starting in 2008.
In May this year, Google confessed the vehicles had also been gathering information about the location of wireless networks, the devices which connect computers to the tele-communications network via radio waves.
"It's clear from those inspections that while most of the data is fragmentary, in some instances entire emails and URLs (web addresses) were captured, as well as passwords. We want to delete this data as soon as possible, and I would like to apologise again for the fact that we collected it in the first place," Alan Eustace, Google's Vice-President of engineering and research, was quoted as saying.
Millions of Internet users have potentially been affected.
Thursday, August 12, 2010
computer recycling "missed opportunity"
The study, entitled "Why reuse is better than recycling, based in London organization, argues that computers work is reused 20 times more energy efficient than their recycling and reuse is the lowest" cost depletion resources than recycling.
According to the report, and recycling is often the preferred option for waste management of electronic waste is not always best - especially in cases of unwanted computers.
Computer Aid, however, used his report to further emphasize the benefits of reuse, including social and economic benefits, he said that could lead to overcoming the division "digital".
"Cheap purchase refurbished equipment can make it available to those who can not afford new," she said.
"Compared with some other electronic waste for PC environment" redemption "of recycling is relatively small," the report states. "This is because the concentration of energy intensity in production of computers and generally short life spans of their current use, fueled by rapid product innovation and high levels of return.
Recycling of IT equipment such as computers is 'missed opportunity' due to energy saving and environment that can be done by extending the operational life instead, according to a report published by the International Charity Computer Aid reuse yesterday (August 10).
The report, computer support, compared with a refrigerator, where it 88% of energy comes from movement of equipment, which means designing a fuel-efficient cars it makes sense for the environment, and a computer 20% of energy comes from running, and the rest is of production.
"This means that any activity that prolongs the life of a computer, to avoid overproduction is an important strategy for mitigating environmental impacts," added the report.
She said that increasing the life cycle of ICT equipment such as computers and mobile phones, is useful when the depletion of resources involved in the production of new equipment are considered.
While the hierarchy of waste, reuse should be a priority before recycling, as well as the EU Waste Electrical Electronic Equipment (WEEE) Directive is not a priority re-use language, computer aid said that absence of specific targets reuse means that often recycling "practical reality".
Benefits
The report says that in order to implement the "many benefits" for reuse must be actions taken by manufacturers to design reuse in our products, customers and press to replace equipment until it has reached a "real" end "productive of his life.
He called for the introduction of targets and standards for reuse, and more for public education on the waste hierarchy and distribution of reusable equipment necessary site CA.
UK bank account customers hit by most dangerous computer virus ever
Victims of online banking fraud like this usually have the missing money refunded but it can cause misery for those who need the money to pay monthly bills and other outgoings and they risk being overdrawn without realising it.
Among the victims are British bank account customers living abroad who tend to use online banking more frequently.
Financial Fraud Action UK, which co-ordinates the banking sector’s fight against fraud, confirmed that it had contacted the Metropolitan Police e-crimes unit about the attack. A spokeswoman said the bank had not been named because it did not want to worry customers, all of whom would be reimbursed as long as they had not been negligent.
Thousands of customers of a large UK bank have had their accounts emptied by what is being described as the most dangerous computer virus to date.
Criminals working from Easter Europe have stolen about £675,000 from customers at a top high street bank, which has not been named. About 3,000 accounts were entered between July 5 and August 4 and the theft is said to be still going on.
The accounts were raided after people had their computers infected by a new Trojan virus, known as Zeus v3, as they surfed the net, according to Internet protection firm M86 Security.
Trojans hide in websites, emails or downloads. Once installed on a computer they can record every type of the keyboard, steal confidential information or even open up a PC’s security so that it can be controlled remotely from another country.
‘This has the potential to worry a lot of people, which is not founded. The bank wants to make sure everything is being done behind the scenes to protect customers. It wants to make sure customers aren't unnecessarily alarmed,’ she added.
M86 said that the cyber criminals had modified the Zeus virus, which is one of the most popular type of Trojan used by fraudsters. ‘According to our research, these cybercriminals used a combination of the new Zeus v3 Trojan and exploit toolkits to successfully avoid anti-fraud systems while robbing bank accounts,’ a spokesman said.
He added that the development takes online hacking to a ‘new level of technical sophistication’ and it was the most dangerous virus found to date.
Boffins hack a car computer at high speed
After two days of tests, checking the electronic control unit for the belt should be replaced.
Technologies for testing cut costs about $ 1,500. μ
BOFFINS, that life, as in the fast lane was working way to hack into the system for warning the vehicle of wireless sensors.
According Jalonik, researchers at the University of South Carolina and has a wireless tire pressure sensors Rutgers, which are used by the monitoring systems to spoof wheels.
This technology is required for all new cars in the U.S. since 2008. Hacking was not easy as they had to work a secret code to go through computer control of the car. But after they could not send fake alert messages from 40 meters.
In one case a Test Drive was announced that a tire has lost all pressure signals beamed from another car while the two drove 68 mph.