Category Archives: Cloud Servers
Google Announces Cloud-computing Service Compute Engine
Google on Thursday announced Compute Engine, a cloud-computing service that allows businesses to run their applications on servers in the tech giant's data center.
"We're introducing Google Compute Engine, an infrastructure-as- a- service product that lets you run Linux Virtual Machines (VMs) on the same infrastructure that powers Google," said Google in its official blog.
According to the company, the economy of scale and efficiency of its data centers can provide users 50 percent more computing power than other leading cloud providers.
Industry watchers said Google Compute Engine will compete and challenge the leading position of Amazon Web Services, which was launched in July, 2002.
Google has been building a huge amount of data centers to support its own services and applications over the last decade. In 2008, it started to open up its infrastructure to outside developers and businesses, launching services like Google App Engine to allow users to build applications and websites, and store and analyze data on its servers.
The announcement of Compute Engine came during the second day of the annual Google I/O developers conference. Also on Thursday, Google introduced Chrome web browser for Apple's iOS platform, offline editing for Google Docs and retail selling of Chromebooks at Best Buy.
View original post here:
Google Announces Cloud-computing Service Compute Engine
Friday’s storms raise questions about safety of cloud computing
Storm-related outages at an Amazon data center in Ashburn prompted some congressional officials on Monday to question whether the federal government is moving too swiftly to put important data on private-sector cloud computing servers.
The outages affected companies such as Netflix and Pinterest, not the government. But several federal agencies have moved e-mail and other services to cloud servers, which are housed at remote data centers and typically managed by technology companies such as Amazon or Google.
The House subcommittee on commerce, manufacturing and trade is studying the risks of such moves and hopes to schedule a hearing on the matter ahead of the August congressional recess.
Last weeks powerful thunderstorms, along with the massive disruptions they caused, exposed some of the vulnerabilities of cloud computing, said the panels chairman, Rep. Mary Bono Mack (R-Calif.), in a statement. But I also believe the problems extend way beyond consumer convenience and customer service. There are some serious privacy issues which we need to look at as well.
The federal government has been aggressively embracing more extensive use of cloud servers since 2010 and closing government data centers. Cloud services allow for massive volumes of information to be stored remotely, generally on several different servers, so that it can be accessed from anywhere with an Internet connection. The data often is encrypted.
Government e-mail and Web sites were among the first to move away from government servers. More sensitive data is likely to follow, federal officials say, as cloud providers demonstrate they can provide the security and continuous access that agencies require.
Federal officials predict that the most sensitive information from the White House or CIA, for example may be moved eventually to cloud servers maintained by the government itself, allowing for maximum control and security.
The General Services Administration switched its e-mail to a Google cloud service last year, cutting its estimated costs from $30million to $15million over five years, said agency spokeswoman Casey Coleman. Outages, which used to come about once a month, have disappeared, she said.
The violent storm that blasted through the region Friday night disrupted power to several data centers at Amazons Web service facility in Ashburn. One of them lost both its primary and backup sources of power, causing outages that stretched into Saturday. No data was lost, Amazon has said. In April, the same facility also caused outages for Reddit, HootSuite, Quora and FourSquare.
Security is the highest priority for any business that deals with customer data and it remains the top priority for AWS, said Amazon spokesman Drew Herdener. Our scale enables us to invest in more security policing and countermeasures than almost any company can afford themselves.
The rest is here:
Friday’s storms raise questions about safety of cloud computing
Lawmakers voice concern over cloud-computing outages from storm
Originally published July 2, 2012 at 6:51 PM | Page modified July 2, 2012 at 6:52 PM
Storm-related outages at an Amazon.com data center in Ashburn, Va., prompted some congressional officials on Monday to question whether the federal government is moving too swiftly to put important data on private-sector cloud computing servers.
The outages affected companies such as Netflix and Pinterest, not the government. But several federal agencies have moved email and other services to cloud servers, which are housed at remote data centers and typically managed by technology companies such as Amazon or Google.
The House Energy and Commerce subcommittee on commerce, manufacturing and trade is studying the risks of such moves and hopes to schedule a hearing on the matter ahead of the August congressional recess.
"Last week's powerful thunderstorms, along with the massive disruptions they caused, exposed some of the vulnerabilities of cloud computing," the panel's chairman, Rep. Mary Bono Mack, R-Calif., said in a statement. "But I also believe the problems extend way beyond consumer convenience and customer service. There are some serious privacy issues which we need to look at as well."
The federal government has been aggressively embracing more extensive use of cloud servers since 2010 and closing government data centers. Cloud services allow for large volumes of information to be stored remotely, generally on several different servers, so that it can be accessed from anywhere with an Internet connection. The data often is encrypted.
Government email and Web sites were among the first to move away from government servers. More sensitive data is likely to follow, federal officials say, as cloud providers demonstrate they can provide the security and continuous access that agencies require.
Federal officials predict that the most sensitive information from the White House or CIA, for example may be moved eventually to cloud servers maintained by the government itself, allowing for maximum control and security.
The General Services Administration switched its email to a Google cloud service last year, cutting its estimated costs from $30 million to $15 million over five years, said agency spokeswoman Casey Coleman. Outages, which used to come about once a month, have disappeared, she said.
The violent storm that blasted through the region Friday night disrupted power to several data centers at Amazon's Web service facility in Ashburn. One of them lost both its primary and backup sources of power, causing outages that stretched into Saturday. No data was lost, Amazon has said. In April, the same facility also caused outages for Reddit, HootSuite, Quora and FourSquare.
More here:
Lawmakers voice concern over cloud-computing outages from storm
Small-business Q&A: The cloud isn't just pie in the sky
Q: I'm not quite sure I understand the concept of cloud computing. What exactly is it, and is it a good idea to use it for my small business?
A: With cloud computing, instead of running applications and storing data on your own computer system, you rent space on a remote server where your applications and data reside. Access to this remote system - the cloud - is through the Internet.
If you use Hotmail or Gmail or another web-based email program, you already use cloud computing. The software for these programs is not on your personal computer or office server - it's hosted elsewhere and you access it online.
There are several benefits to using the cloud for your computing needs.
First, it's all about the data. Reputable cloud computing providers have processes in place to protect the security of data and provide instant and easy access. Data is encrypted, and multiple servers and backup systems are in place to make sure data is not stolen or lost.
And as long as you have access to the Internet, you and your employees don't have to be at your desks or connected to your company's network. This also opens up access via smartphones and other mobile devices.
Equipment needs and associated costs typically decrease. You don't need the latest hardware because processing and storage is done remotely, and speed and capacity are no longer issues.
The way you buy software changes, too. You no longer need to buy software and software licenses for each user. Instead, you pay the cloud provider a fee based on overall usage.
Since you are basically outsourcing your computer maintenance and troubleshooting functions, it makes sense that it's not only your hardware and software needs that will decrease, but also your IT support requirements. Your cloud provider handles it all, including upgrades.
So what's the downside? Arguments against moving to the cloud revolve around security and privacy. Although a cloud provider would soon be out of business if it didn't go to great lengths to make sure it encrypts and backs up your data and provides access only to authorized users, you are no longer strictly in control of your data. And, if you're unable to access the Internet for whatever reason, you're out of luck.
Read more:
Small-business Q&A: The cloud isn't just pie in the sky
Sunday
Researchers say criminals are moving their malware heavy lifting from end user PCs to servers in the cloud. The same flexibility and freedom companies get from having their software and services hosted in the cloud is enabling cybercriminals to conduct highly automated online banking theft -- without doing much of the necessary information processing on their victims' own computers.
Security and privacy experts have long worried that criminals would launch attacks on the servers storing the data in cloud environments. But, a report released this week from McAfee and Guardian Analytics shows that criminals are now using the cloud infrastructure itself to get more capability out of their campaigns.
"They are leveraging the cloud," Brian Contos, senior director of emerging markets at McAfee, said in an interview. "This is the first time we've ever seen this."
Basically, what researchers uncovered was a series of highly sophisticated campaigns designed to siphon money out of high balance bank accounts in Europe, the U.S. and South America through automated transfers. Like most online consumer bank fraud, the attacks started off with a phishing e-mail, typically pretending to be from a victim's bank and urging the recipient to click a link to change the account password. Once the link is clicked, a Trojan -- in this case Zeus or SpyEye -- was downloaded onto the victim's computer, in early versions of the attacks. In later versions the malware is operating from a server.
When the victim goes to log into the bank site, the malware would use a so-called Web inject technique to overlay what looks like the bank Web page in the victim's browser. However, behind the scenes and totally transparent to the victim, something entirely different is happening. While the victim thinks he or she is transferring money from a savings account into a checking account, for instance, the malware is actually transferring any amount of money the criminals specify into their own account.
Traditionally, banking malware like this will handle the processing from the victim's PC. But in this case, the heavy lifting of the malware is being done on the server in the cloud, according to Contos. In the operations McAfee and Guardian Analytics uncovered the servers were located in eastern European countries, he said. The servers are located mostly at "bullet proof" ISP that have lax policies and are re-located frequently to avoid discovery.
"The servers are sitting within ISPs that are designed specifically to take part in fraud," he said, adding that the criminals in these campaigns even managed to bypass two-factor authentication systems commonly used in European consumer online banking. For instance, not only does a consumer type in a username and password to a site, but also swipes a card into a special card reader attached to the PC that provides additional data proof that the legitimate user is accessing the account.
The log-in or authentication "information is taken from the malware (on the PC) and redirected to the server in real time, Contos said. "That server takes that data and authenticates against the victim's bank account, all within seconds."
The servers -- at least 60 were used in these operations -- provided the criminals with the ability to fully automate the attacks, so less manual intervention is needed on the part of the attacker to do things like adjust the amount to steal that will be below fraud detection levels.
"The server is the brains that does all the transactions in the bank account," he said. Rather than having the malware residing on the victim's computer take charge of the attack functions, like stealing the data and sending it off somewhere, the attack itself is performed by the server.
See the article here:
Sunday
Eastern US storm hobbles servers for 3 websites
NEW YORK (AP) -- Netflix, Instagram and Pinterest are using Twitter and Facebook to update subscribers after violent storms across the eastern U.S. caused server outages for hours.
Netflix and Pinterest restored service by Saturday afternoon.
Instagram used its Facebook fan page to communicate with users of its photo-sharing service. It posted a message on Saturday morning that blamed the electrical storm for the outage and explained that its engineers were working to restore service.
Still, many Instagram's users were searching for answers. "Instagram" was the top search term on Google on Saturday, according to Google Trends.
Netflix, Pinterest and Instagram are customers of Amazon Inc.'s web services division. The unit provides web services and data storage facilities that are commonly used for "cloud computing".
Amazon spokeswoman Kay Kinton told The Associated Press in an email that the storm cut power to some of company's operations. Service has been restored for most customers, Kinton said.
Netflix, a video streaming service, said on Twitter that subscribers should reconnect if they still experienced problems.
The online scrapbook service Pinterest says employees are working to fix remaining issues that may affect performance.
The Friday evening storms are responsible for twelve deaths and knocked out power for millions of people.
View original post here:
Eastern US storm hobbles servers for 3 websites
Cybercrime moves to the cloud
Researchers say criminals are moving their malware heavy lifting from end user PCs to servers in the cloud.
The same flexibility and freedom companies get from having their software and services hosted in the cloud is enabling cybercriminals to conduct highly automated online banking theft -- without doing much of the necessary information processing on their victims' own computers.
Security and privacy experts have long worried that criminals would launch attacks on the servers storing the data in cloud environments. But, a report released this week from McAfee and Guardian Analytics shows that criminals are now using the cloud infrastructure itself to get more capability out of their campaigns.
"They are leveraging the cloud," Brian Contos, senior director of emerging markets at McAfee, said in an interview. "This is the first time we've ever seen this."
Basically, what researchers uncovered was a series of highly sophisticated campaigns designed to siphon money out of high balance bank accounts in Europe, the U.S. and South America through automated transfers. Like most online consumer bank fraud, the attacks started off with a phishing e-mail, typically pretending to be from a victim's bank and urging the recipient to click a link to change the account password. Once the link is clicked, a Trojan -- in this case Zeus or SpyEye -- was downloaded onto the victim's computer, in early versions of the attacks. In later versions the malware is operating from a server.
When the victim goes to log into the bank site, the malware would use a so-called Web inject technique to overlay what looks like the bank Web page in the victim's browser. However, behind the scenes and totally transparent to the victim, something entirely different is happening. While the victim thinks he or she is transferring money from a savings account into a checking account, for instance, the malware is actually transferring any amount of money the criminals specify into their own account.
Traditionally, banking malware like this will handle the processing from the victim's PC. But in this case, the heavy lifting of the malware is being done on the server in the cloud, according to Contos. In the operations McAfee and Guardian Analytics uncovered the servers were located in eastern European countries, he said. The servers are located mostly at "bullet proof" ISP that have lax policies and are re-located frequently to avoid discovery.
"The servers are sitting within ISPs that are designed specifically to take part in fraud," he said, adding that the criminals in these campaigns even managed to bypass two-factor authentication systems commonly used in European consumer online banking. For instance, not only does a consumer type in a username and password to a site, but also swipes a card into a special card reader attached to the PC that provides additional data proof that the legitimate user is accessing the account.
The servers -- at least 60 were used in these operations -- provided the criminals with the ability to fully automate the attacks, so less manual intervention is needed on the part of the attacker to do things like adjust the amount to steal that will be below fraud detection levels.
"The server is the brains that does all the transactions in the bank account," he said. Rather than having the malware residing on the victim's computer take charge of the attack functions, like stealing the data and sending it off somewhere, the attack itself is performed by the server.
See the article here:
Cybercrime moves to the cloud
Cloud computing for your business recorded webinar – 28 February 2012 – Video
28-06-2012 22:37 Cloud computing lets you back-up essential business data using IT systems and software that are accessible anywhere, any time, on the internet. Disaster events, in particular, highlight the importance of using IT solutions like cloud computing. Our recorded webinar will show you how cloud computing can help your business be more agile and improve your overall efficiency and profitability. Don't have time to watch the entire webinar? Use the links below to jump straight to a section. What is cloud computing 0:32 Benefits of using cloud computing 12:42 Considerations for your business 22:56 Cloud solutions for your business 25:36 Storage, backup and file sharing 40:15 Summary and questions 49:54 Download the workbook here Register for more of our free webinars here Note that this is a recording of a webinar from 28 February 2012. Some features of this presentation may have changed since this recording. Read more about cloud computing for your business Connect with us:
Go here to read the rest:
Cloud computing for your business recorded webinar - 28 February 2012 - Video
Eleven2 : Coupon for First Month for 1 Penny – Video
28-06-2012 23:38 Use This Coupon ??? penny ??? Eleven2 and Go To this Link ??? To Signup for 1 Penny Only! ----------------------------------------------------------------- Use This Coupon ??? 15off ??? Eleven2 and Go To this Link ??? Get 15% off any of eleven2's Shared or Reseller hosting packages. ----------------------------------------------------------------- Eleven2 : Web Hosting, Reseller Hosting and Cloud Servers by Eleven2 Eleven2 Winter Hosting Special Introducing, The New E2 Panel Worldwide Hosting by Eleven2 Accessible, Fast 24/7 Support Eleven2 iPhone App, Avaliable on ... Eleven2 :
Read the original post:
Eleven2 : Coupon for First Month for 1 Penny - Video
The connected car: Cloud computing hitches ride
If you're wondering why tech-savvy people seem to be talking about weather patterns a lot, rest assured the clouds they're talking about are digital.
Generally speaking, cloud computing uses an Internet connection to allow users to access Web-based music, information and a host of other services, without the need to keep that data stored on a user's device.
If you listen to Internet music streaming services such as Pandora or do your correspondence on Gmail, you're using cloud computing.
Now, thanks to the growth of mobile Internet access through smartphones, tablets and other devices, Americans can access the cloud from almost anywhere, including their cars.
"At the end of the day, the user does not want to have to give up part of their digital lifestyle when they get in the car," says Mark Boyadjis, a senior analyst for IHS Automotive.
That desire is reflected in the popularity of cloud-enabled infotainment systems, also known as telematics, in cars, he says.
"There's a lot of connected-car growth right now," Boyadjis says. "The vehicle is actually the third-fastest growing connected device behind smartphones and tablets."
At this point, most cloud-based services come courtesy of a car's connection to a smartphone such as Apple's iPhone or the Motorola Droid. That's because those devices provide the wireless data connections needed to bring information from the remote servers where it originates and into your auto, says Joachim Taiber, a research professor of electrical and computer engineering at Clemson University's International Center of Automotive Research.
"The idea is to connect the smartphone with the user interface of the car to make the interaction safer," Taiber says.
With that data stream, today's leading telematics systems from automakers such as Ford and BMW can provide a number of different functions to car passengers. Find out how you can use the cloud.
Visit link:
The connected car: Cloud computing hitches ride