Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cloud security" wg kryterium: Temat


Wyświetlanie 1-3 z 3
Tytuł:
A brief survey on hybrid cloud storage and its applications
Autorzy:
Venkatesakumar, V.
Yasotha, R.
Subashini, A.
Powiązania:
https://bibliotekanauki.pl/articles/1192695.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Cloud Computing
Communication
Hybrid cloud
IT infrastructure
Security
Opis:
As the cloud computing is spreading round the world, want of inter cloud communication is turning into a growing in the organizations. It’s inflicting the researchers to specialize in first, creating it potential to communicate between two or additional clouds and second security of communication is to considered up to utmost level. Hybrid cloud storage may be a storage technique that uses internal and external cloud applications, infrastructure and storage systems to create integrated storage design. Hybrid cloud may be a classification in cloud computing atmosphere that utilizes a collaboration of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By permitting workloads to transfer between private and public clouds, the computing requirements and prices modification, hybrid cloud offers businesses larger flexibility and additional information deployment choices. Hybrid cloud is especially valuable for dynamic or extremely changeable workloads. This paper describes the needs, deployment, storage, applications and issues of hybrid cloud.
Źródło:
World Scientific News; 2016, 46; 219-232
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cloud Computing – Architecture, Platform and Security Issues: A Survey
Autorzy:
Alam, Md. Sakib Bin
Powiązania:
https://bibliotekanauki.pl/articles/1178291.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Cloud Computing
Deployment Models
Security Issues
Service Models
Opis:
Cloud computing system delivers computing resources as a service over the network. During the last few years clod computing technology has gained attention due to its autonomous and cost effective services. It is responsible for the growth of IT industry. But cloud computing has various security challenges that hinder the rapid adoption of this computing paradigm. Efficient steps should be taken to make cloud computing more secure and reliable. This paper works on overview of clod computing as well as related security issues.
Źródło:
World Scientific News; 2017, 86, 3; 253-264
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IT security risks in modern sourcing models – cloud computing. An example
Autorzy:
Rot, Artur
Sobińska, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/432314.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
IT management
IT/IS security
IT risks
sourcing models
Cloud Computing
Opis:
Information technologies have been developing nowadays at an amazing speed, affecting the functioning of organizations. Almost all of these organisations are involved in some way in sourcing activities, and each of them develops a sourcing relationship that suits its particular needs. In the article, different kinds of outsourcing models were discussed, which are applied in the contemporary management, with particular emphasis put on cloud computing. Cloud computing has become an omnipresent and an increasingly important technology and new risk areas have appeared. The main aim of this article was to present the most important risks related to the introduction of management models based on the most recent IT technologies, e.g. cloud computing, and emphasize the role of appropriate IT security management.
Źródło:
Informatyka Ekonomiczna; 2013, 2(28); 112-123
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies