1. Cloud computing
There are at least 20 definitions about cloud computing so far. Here is a relatively common definition:
Cloud computing is a type of distributed computing technology. Its most basic concept is to automatically split the huge computing processor into countless smaller subprograms through the network, and then hand it over to the huge system composed of multiple servers for searching, computing and analysis. Through this technology, network service providers can achieve network services that process tens of millions or even billions of information within seconds, achieving the same powerful performance as "supercomputers".
Cloud computing is a resource delivery and use model, which refers to obtaining the resources (hardware, platform, software) required for applications through the network. The network that provides resources is called the "cloud". In the eyes of users, the resources in the "cloud" can be infinitely expanded and can be obtained at any time. This feature is often compared to using hardware resources like hydropower, purchased and used on demand.
2. Software as a Service (SaaS)
This type of cloud computing passes programs to thousands of users through a browser. In the eyes of users, this will save money on server and software licensing; from the supplier's perspective, it only needs to maintain one program, which can reduce costs.
3. Platform as a Service (PaaS)
Platform as a Service (PaaS) is a model that can send operating systems and related services over the Internet without downloading or installing. Because the platform as a service can transfer resources from a private computer to the network cloud, it is sometimes called "cloudware". Platform as a service is an extension of Software as a Service. Software as a service is to deploy software as a hosted service and provide it to customers over the Internet.
4. Infrastructure as a Service (IaaS)
Cloud computing infrastructure as a Service provides customers with rental processing capabilities, storage, networks and other basic computing resources. Users can deploy and run any software, including operating systems and applications. Customers do not manage or control the underlying cloud computing infrastructure, but can control the operating system, storage, and deployment applications, and may also choose network components (such as firewalls, load balancers). It was first Amazon that created this market and established AWS's leading position in this market. And latecomers such as Rackspace, Gogrid, Flexiscale, and Gridlayer are also in good development momentum.
5. Cloud Storage (Cloud Storage)
Cloud storage is a network computer data storage model. The data is stored on multiple virtual hosts and is generally held by a third party, rather than stored on a dedicated server. Keep data in place companies operating this huge data center; and users in need can purchase or rent storage capacity as needed. The data center operation and maintenance personnel behind it virtualize resources according to customer needs and present them to users as virtual servers. Users can manage virtual servers themselves. And physically, these resources may span multiple servers.
6. Private cloud (Private cloud)
Private cloud is built for a customer to use alone, thus providing the most effective control over data, security and service quality. The company has the infrastructure and can control how applications are deployed on this infrastructure. Private clouds can be deployed within the firewall of the enterprise data center or they can be deployed in a secure hosting site.
Private cloud can be built by the company's own IT organization or by cloud providers. In this "hosted dedicated" model, cloud computing providers like Alibaba and Huawei can install, configure and operate infrastructure to support dedicated clouds within a company's enterprise data center. 1. Cloud computing
There are at least 20 definitions about cloud computing so far. Here is a relatively common definition:
Cloud computing is a type of distributed computing technology. Its most basic concept is to automatically split the huge computing processor into countless smaller subprograms through the network, and then hand it over to the huge system composed of multiple servers for searching, computing and analysis. Through this technology, network service providers can achieve network services that process tens of millions or even billions of information within seconds, achieving the same powerful performance as "supercomputers".
Cloud computing is a resource delivery and use model, which refers to obtaining the resources (hardware, platform, software) required for applications through the network. The network that provides resources is called the "cloud". In the eyes of users, the resources in the "cloud" can be infinitely expanded and can be obtained at any time. This feature is often compared to using hardware resources like hydropower, purchased and used on demand.
2. Software as a Service (SaaS)
This type of cloud computing passes programs to thousands of users through a browser. In the eyes of users, this will save money on server and software licensing; from the supplier's perspective, it only needs to maintain one program, which can reduce costs.
3. Platform as a Service (PaaS)
Platform as a Service (PaaS) is a model that can send operating systems and related services over the Internet without downloading or installing. Because the platform as a service can transfer resources from a private computer to the network cloud, it is sometimes called "cloudware". Platform as a service is an extension of Software as a Service. Software as a service is to deploy software as a hosted service and provide it to customers over the Internet.
4. Infrastructure as a Service (IaaS)
Cloud computing infrastructure as a Service provides customers with rental processing capabilities, storage, networks and other basic computing resources. Users can deploy and run any software, including operating systems and applications. Customers do not manage or control the underlying cloud computing infrastructure, but can control the operating system, storage, and deployment applications, and may also choose network components (such as firewalls, load balancers). It was first Amazon that created this market and established AWS's leading position in this market. And latecomers such as Rackspace, Gogrid, Flexiscale, and Gridlayer are also in good development momentum.
5. Cloud Storage (Cloud Storage)
Cloud storage is a network computer data storage model. The data is stored on multiple virtual hosts and is generally held by a third party, rather than stored on a dedicated server. Keep data in place companies operating this huge data center; and users in need can purchase or rent storage capacity as needed. The data center operation and maintenance personnel behind it virtualize resources according to customer needs and present them to users as virtual servers. Users can manage virtual servers themselves. And physically, these resources may span multiple servers.
6. Private cloud (Private cloud)
Private cloud is built for a customer to use alone, thus providing the most effective control over data, security and service quality. The company has the infrastructure and can control how applications are deployed on this infrastructure. Private clouds can be deployed within the firewall of the enterprise data center or they can be deployed in a secure hosting site.
Private cloud can be built by the company's own IT organization or by cloud providers. In this "hosted dedicated" model, cloud computing providers like Alibaba and Huawei can install, configure and operate infrastructure to support dedicated clouds within a company's enterprise data center.This model gives companies an extremely high level of control over cloud resource usage, while bringing the expertise needed to build and operate the environment.
7. Public cloud (Public cloud)
Public cloud, also known as external cloud, refers to obtaining resources dynamically and flexibly through the Internet in a self-service manner.
8. Hybrid cloud (Hybrid cloud)
The hybrid cloud environment includes a variety of internal and/or external clouds, and "will be suitable for most enterprises" because, by integrating multiple cloud services users can reduce the problems faced when migrating to public clouds, such as PCI compliance, etc.
9. Community cloud (Community cloud)
Community cloud refers to some clouds co-founded by organizations with similar needs and intend to share infrastructure. The purpose of community cloud is to realize some of the advantages of cloud computing. Since the number of users with shared fees is less than that of public clouds, this choice is often more expensive than that of public clouds, but the privacy, security, and policy compliance are higher than that of public clouds.
10. The Intercloud
The concept of cloud cloud was first proposed by Kevin Kelly in 2007. He believed that there will be a cloud in the end, that is, cloud cloud. The concept of Yunji Cloud is an extension of the concept of "Internet of the Internet". In 2009, the concept of Yunji Cloud began to become popular and was also used to describe future data centers.
The concept of cloud cloud is based on the view that a single cloud cannot include wireless resources. Just imagine that if a cloud includes all virtual infrastructure resources, including computing and storage resources, it will not be able to meet the needs of further allocation of services sent by customers. Yunji Cloud is used to solve this kind of problem. In fact, every cloud can use virtual infrastructure on other clouds, including computing and storage resources. This “pay for use” form brings new business opportunities for cloud vendors. Of course, Yunji Cloud also has many challenges, such as cloud alliance, security, interoperability, QoS, supervision and billing.
11. Privacy (Privacy)
The cloud model is criticized by privacy advocates because in the cloud computing model, the company has control over the cloud service , so it can legally or illegally monitor the communication and data between the user and the host at will.
12. Compliance (regulatory compliance)
To meet regulatory requirements, including the US FISMA, HIPAA and SOX and EU data protection directive (Data Protection Directive) and PCI DSS in the banking and card industry, users have to use community or hybrid models to deploy cloud computing, which are usually more expensive and provide limited benefits.
13. Legal (Legality)
March 2007 , Dell applied for the registration of trademark "cloud computing" in the United States (U.S. Trademark 77,139,082). The company received the allowance subsidy in July 2008 was cancelled in August and received a formal trademark rejection in less than a week. Since 2007, trademarks including cloud computing brands, products and services have grown exponentially. In order to better demonstrate its cloud computing brand and market influence, the number of cloud computing trademarks increased by 483% from 2008 to 2009.
14. Open source (open source)
Open source software provides the foundation for many cloud computing vendors. In November 2007, Free Software Foundation released Affero General Public License, a version of GPLv3, with the aim of making up for a legal loophole in the understanding that free software is used to run on the Internet.
15. Open standards (Open standards)
Open standards are very critical to the development of cloud computing. Most cloud vendors have good documentation on the APIs exposed, but are unique and non-interoperable. Some vendors have adopted other APIs, but there are too many open standards now, including OGF's Open Cloud Computing Interface.The Open Cloud Consortium (OCC) is committed to developing unified standards in early stages of cloud computing standards and practices.
16. Security (Security)
The relative security of cloud computing services is a question that is easy to cause controversy, and it may also hinder the use of cloud computing. Some believe that user data is safer when managed internally, but some believe that there is reason to believe that cloud providers can provide higher security. The Cloud Security Alliance (CSA) is a non-profit organization. It was established to improve the security of cloud computing and promote the practice of cloud computing.
17. Availability and Performance
In addition to security considerations, enterprises are also worried about the cloud's availability level and the performance of applications hosted in the cloud.
18. Sustainability(sustainability)
Although cloud computing is generally considered a form of "green computing", there is no public research supporting this view.
19. Super large-scale
"Cloud" has a considerable scale. Google E cloud computing has more than 1 million servers, and Amazon, IBM, Microsoft , Yahoo and other "cloud" all have hundreds of thousands of servers. Enterprise private clouds generally have hundreds or thousands of servers. "Cloud" can give users unprecedented computing power.
20. on-demand (on-demand)
On-demand is a concept that is opposite to enterprise reservation (on-premise). It means that users can choose services and applications according to their needs, without pre-customizing their own services, and then suppliers can implement applications according to the company's customized needs.
21. Extensive network access (Broad Network Access)
Can be transmitted through multiple platforms, including mobile platforms.
22. Resource pooling (resource pool)
Resources such as storage, processing, memory, network bandwidth and virtual machines use the multi-rental model to serve a variety of consumers.
23. Rapid Elasticity (rapid elasticity)
Can provide various functions quickly and elasticly, and in some cases it automatically and quickly expands, then releases quickly, and then shrinks quickly.
24. Measured Service (custom service)
Measurement resources and services, that is, storage, processing, bandwidth and active user accounts. Assays can also monitor, control and report user usage status, providing transparency to providers and consumers using the service.
25. Autonomic computing (Autonomic computing)
Refers to the computing system that can self-manage
26. Client/server model (Client–server model)
The customer/server model refers to all distributed applications that separate service providers (servers) and service consumers (client).
27. Grid computing (Grid computing)
Grid computing is a form of distributed computing and parallel computing. It forms a cluster of computers on a loosely coupled network to form a super virtual computer to complete large-scale work tasks.
28.Box calculation (Mainframe)
Magic computers are used by large organizations to complete key applications, typically including batch data processing, such as census, industrial and consumer data, enterprise resource planning and financial transaction processing, etc.
29. Utility computing (Utility computing)
Utility computing refers to packaging computing resources, such as computing and storage, into a service that uses instrument measurement, similar to traditional public utilities such as electricity.
30. Peer-to-peer computing (Peer-to-peer)
Peer-to-peer is a centrally coordinated distributed architecture, where participants, including the providers of resources and consumers, must exist at the same time (as opposed to the traditional client server model).
31. Cloud operating system
Cloud operating system is a new software category that aims to fully manage large-scale infrastructure collections (CPU, storage, network) as a seamless, flexible and dynamic operating environment. Similar to the complexity of managing individual computers in a normal operating system, cloud operating systems manage data centers in a complexity.
32. Cloud Computing Center
The Cloud Computing Center refers to an institution or unit that provides computing resources, storage resources and other services based on the supercomputer system, and provides high-performance computing services to all sectors based on high-performance computers. At present, cloud computing centers are mainly aimed at large-scale scientific computing and engineering computing applications, and have huge development potential in commercial computing, Internet, e-government, e-commerce and other fields.
33. Cloud Security Alliance (Cloud Security Alliance)
The Cloud Security Alliance CSA was announced at the RSA conference in 2009. Since its establishment, CSA has quickly gained wide recognition from the industry. Now, CSA has established cooperative relationships with industry organizations such as ISACA, OWASP, and many international leaders have become members of their companies.
Since its establishment, the cloud security guide and its development released by the Cloud Security Alliance have become an impressive security event in the field of cloud computing. On December 17, 2009, the Cloud Security Alliance released a new version of the Cloud Security Guide v2.1, representing an important upgrade in the cloud computing and security industry's understanding of cloud computing and its security protection.
34. Amazon Web Service (AWS)
Amazon's AWS is a typical IaaS service. It provides a set of services, including storage (S3), computing power (EC2), messaging (SQS), data set (SDB), etc. With Amazon's AWS, enterprise users can quickly obtain a virtual infrastructure based on Amazon infrastructure in a matter of minutes, and this infrastructure is resilient and can scale and shrink as needed. Companies around the world can use this flexible computing infrastructure.
35. Amazon Elastic Compute Cloud (EC2)
Amazon Elastic Compute Cloud (EC2) can expand or shrink computing resources as needed, providing new server instances very conveniently.
36. Amazon Simple Storage Service (Amazon Simple Storage Service, S3)
Amazon Elastic Compute Cloud (EC2) can expand or shrink computing resources as needed, providing new server instances very conveniently.
37. Google Application Engine Google App Engine (GAE)
Google App Engine, it is a typical representative of PaaS applications and is also for developers. Allow developers to write applications and then build applications on the Google infrastructure. App Engine facilitates users to develop new service logic and run these new services on cloud computing platforms.
38. IBM "Blue Cloud" computing platform
Simply put, IBM "Blue Cloud" solution is an advanced infrastructure management platform. This solution can integrate the existing infrastructure of the enterprise. Through virtualization technology and automation technology, a cloud computing center owned by the enterprise can be built, and the unified management, unified allocation, unified deployment and unified backup of enterprise hardware resources and software resources is realized, breaking the application's exclusiveness of resources.
39. Microsoft Windows Azure operating system
Windows Azure This operating system. It provides three main functions: Compute, Storage, and Manage. In addition, there is Fabric, which is transparent to users.Fabric includes load balancing, hardware abstraction, and many other functions. However, in general, users do not need to understand how Fabric works internally to take advantage of the various features of Windows Azure.
40. Century Internet Cloud Host
CloudEx Cloud Host is an Internet server rental service launched by Cloud Express Company, a member of Century Internet Group, which integrates computing, storage and network resources. It solves the shortcomings of traditional physical rental and VPS, which is difficult to manage and weak business scalability, reducing the cost of traditional physical host rental and no deposit is required. CloudEX cloud hosts have customer service management methods, which can independently realize remote management and maintenance of hosts, reducing the cost of customers obtaining computing power, simplifying the server management process, and can also be elastically expanded according to changes in customer configuration needs, thereby achieving rapid expansion of host configuration.
41. Music Cloud
Simply put, the so-called "music cloud computing" means that users can play and share the music content stored in the cloud on various devices such as mobile phones, PCs and TVs through music software, without the need for users to copy from computer memory to other terminal devices.
42. Unicom Yunlianyun
Fundamentally speaking, the Internet, as a virtual architecture separated from physics, has always been called giant clouds, and cloud computing is a virtual distributed network computing on the Internet (or cloud). However, cloud computing does not include island clouds (single IDC clouds that are not connected to other IDCs). Cloud computing must be interconnected by a single node (local cloud) and similar nodes (cloud-connected cloud) and heterogeneous nodes (interconnected cloud). Moreover, it does not rely on the implementation of grassroots hardware products. Therefore, whether cloud computing can be commercially available depends on whether the virtual machine has the capabilities of cloud, cloud-connected cloud, and interconnected cloud computing.
43. China Mobile Big Cloud (Big Cloud)
China Mobile Research Institute began to research and development of cloud computing in 2007 and is one of the earliest companies to intervene in the research and development and practice of cloud computing. In early 2007, China Mobile used 15 idle PC servers to build a massive data processing test platform based on open source software, and successfully ran the search engine software. At the end of 2008, China Mobile further built the " big cloud " test platform composed of 256 PC servers, 1,000 CPU Cores, and 256TB storage. It conducted application pilot projects in combination with the needs of on-site data mining, user behavior analysis, and achieved remarkable results in improving efficiency, reducing costs, energy conservation and emission reduction. (Click to view IT168 cloud computing channel: China Mobile's "Big Cloud" 1.0 system functions and product interpretation)
After more than three years of hard work, in 2009, China Mobile Research Institute officially announced the platform "BigCloud - Big Cloud" that is being developed and tested. The platform scale has been further expanded to reach the storage scale of 1,000 servers, 5,000 CPU Cores, and 3,000TB, and to improve China Mobile's future information service capabilities in mobile Internet. In September 2009, the Big Cloud (Big Cloud 0.5) version was released within the China Mobile Research Institute for internal trial.
The latest 1.0 version is scheduled to be released on May 21, 2010, and can realize key functions such as distributed file systems, distributed massive data warehouses, distributed computing frameworks, cluster management, cloud storage systems, elastic computing systems, parallel data mining tools, etc.
44. China Telecom E cloud
The file storage service launched by China Telecom can have 2G space for free. With e-cloud online backup, you can protect your chat and transaction history, home photos and videos, music files and other important computer documents.You can get 2GB of free space, or pay for more storage space...
45. Cloud Antivirus
Cloud Antivirus is actually based on feature code antivirus, but the virus database of the anti-soft is not all local, but is in a large number of servers, interacting with the server when scanning, so as to determine whether there is a virus. Cloud antivirus can reduce the frequency of upgrades, reduce the occupation of detection and killing, and reduce the capacity of the local library.
46. Cloud Backup
As a brand new backup service based on broadband Internet and large-capacity storage space, cloud backup was born out of the cocoon. In short, it is to use cluster applications, grid technology or distributed file systems and other functions to gather a large number of different types of storage devices in the network to work together through application software to jointly provide functional services for data storage backup and business access.
The cost of building a cloud backup infrastructure will be millions and requires a lot of technical support. Therefore, the threshold for cloud backup services has always been high. In foreign countries, due to the early Internet and the rapid development of network broadband, the era of cloud backup has entered a mature stage. Even so, only a few IT giants can provide this service, Amazon , EMCh, Carbonite, Symantec , Symantec , etc. Among them, Amazon has achieved recognized market success in this field.
Looking at the domestic market, the rapid development of network broadband and the popularization of Internet applications, the demand for data disaster backup exploded like a blowout. With the advancement of a few innovative technologies and enterprises, the domestic cloud backup market has begun to show its scale. However, due to the high threshold in this field, currently ranks first in the industry and can compete with the same industry in foreign countries. Only the leading communications company China Telecom, a well-known Internet infrastructure service provider, Century Internet, and a well-known domestic computer manufacturer, Lenovo , etc.
47. Cloud migration
Cloud migration refers to the migration of enterprises from traditional platforms to cloud platforms, because compared with traditional application platforms, the advantages of cloud computing platforms lie in their powerful computing power, storage capabilities, diversified services and high cost performance.
48. Cloud input method
The traditional input method is limited by memory and CPU capabilities, and uses a smaller vocabulary and language model, and the input accuracy is limited;
The cloud input method utilizes the server's unlimited storage and computing power to greatly improve the input accuracy.
cloud input method cross-platform and installation-free. For users of operating systems such as Linux, Mac OS, or temporary use environments such as Internet cafes, you can enjoy the smooth input experience of input method while surfing the Internet.
cloud input method is an input method based on cloud computing technology. The most obvious difference between it and general input method is that there is no local input method file and it is completely supported by the server. In addition, the cloud input method is the culmination of search engines and natural language processing. It has the characteristics of cloud computing and represents the direction of future technological development. The cloud input method has achieved unprecedentedly large, comprehensive and accurate Chinese input field. Compared with traditional input methods, cloud input method is more accurate, increasing the semantic accuracy of Chinese input to 90%, and increasing the coverage and preferred rate of user short sentences to more than 96%. The cloud input methods that have been officially launched include Sogou Cloud Input Method, qq cloud input method , Baidu online input method, etc.
49. SOA
Service-Oriented Architecture (SOA) is a component model that connects different functional units of an application (called services) through well-defined interfaces and contracts between these services. Interfaces are defined in a neutral way and should be independent of the hardware platform, operating system and programming language that implements the service. This allows services built in various such systems to interact in a unified and common way.
50. Load Balancing
Outbound Load Balancing (Outbound Load Balancing) Load balancing is built on the existing network structure. It provides an inexpensive, effective and transparent way to expand the bandwidth of network devices and servers, increase throughput, strengthen network data processing capabilities, and improve network flexibility and availability. As the traffic volume increases, the number of visits and data traffic increases rapidly, and the processing capacity and computing strength of each core part of the existing network also increase accordingly, making it impossible for a single server device to bear it. In this case, if the existing equipment is thrown away and a large amount of hardware upgrades are carried out, it will cause waste of existing resources. If the next increase in business volume is faced, this will lead to high cost investment in hardware upgrades again. Even the equipment with excellent performance cannot meet the current demand for business volume growth.
51. Virtualization
Virtualization refers to the operation of computer components on a virtual basis rather than on a real basis. Virtualization technology can expand the capacity of hardware and simplify the software reconfiguration process. CPU virtualization technology can simulate multiple CPUs in parallel, allowing a platform to run multiple operating systems at the same time, and applications can run in independent spaces without affecting each other, thereby significantly improving the work efficiency of the computer.
52. Storage Virtualization
Storage is like a pool, and the storage space can be allocated as needed as needed. A useful and comprehensive functional service is provided uniformly by integrating one (or more) Target services or functions with other additional functions. Typical virtualization includes the following situations: blocking the complexity of the system, adding or integrating new functions, simulating, integrating or breaking down existing service functions, etc.
53. Application Virtualization
Application virtualization decouples the application with the operating system, providing an virtual running environment for the application. In this environment, it includes not only the executable file of the application, but also the runtime environment it needs. In essence, application virtualization is to abstract the application's dependence on low-level systems and hardware, which can solve the problem of version incompatibility.
54. Desktop Virtualization
Desktop Virtualization refers to virtualizing the desktop of a computer to achieve the security and flexibility of desktop use. Our personal desktop systems on the network can be accessed through any device, anywhere, and at any time.
55. Server virtualization
Abstract the server's physical resources into logical resources, turning a server into several or even hundreds of isolated virtual servers, or turning several servers into one server for use, we are no longer limited by physical boundaries, but instead turning CPU, memory, disk, I/O and other hardware into a "resource pool" that can be dynamically managed, thereby improving resource utilization, simplifying system management, realizing server integration, and making IT more adaptable to business changes. This is the virtualization of servers.
56. Service-Level Agreement (SLA)
The service level agreement is a contract between a network service provider and a customer, which defines the terms service type , service quality and customer payment. A typical SLA includes the following items: minimum bandwidth allocated to customers; customer bandwidth limits; number of customers that can be served simultaneously; notification arrangements before network changes that may affect user behavior; dial-in access availability; application statistics; minimum network utilization performance supported by service providers, such as 99.9% effective working hours or up to 1 minute of downtime per day; traffic priority for various types of customers; customer technical support and services, etc.
57. Internet of Things
The Internet of Things is defined as a network that connects any item to the Internet according to the agreed protocol to exchange and communicate information to realize intelligent identification, positioning, tracking, monitoring and management. The concept of the Internet of Things was proposed in 1999. The Internet of Things is the "Internet connected to things". This has two meanings: First, the core and foundation of the Internet of Things are still the Internet, an extension and expansion network based on the Internet; second, its user end extends and expands to any item to exchange and communicate information.
58. Three-network fusion
Three-network fusion refers to the telecommunications network, computer network and cable TV network that can provide communication services including voice, data, images and other comprehensive multimedia through technological transformation.
59. Smart Earth
The Smart Earth is also called the Smart Earth, which embeds and equips the sensors into various objects such as power grids, railways, bridges, tunnels, highways, buildings, water supply systems, dams, oil and gas pipelines, etc., and is widely connected to form the so-called "Internet of Things", and then integrates the "Internet of Things" with the existing Internet to achieve the integration of human society and physical systems. This concept was first proposed by IBM CEO Peng Mingsheng. At the same time, the Smart Earth is also a book and an electronic magazine.
60. Mobile Internet
Mobile Internet is to combine mobile communication and the Internet to become one. In recent years, mobile communications and the Internet have become the two fastest-growing businesses in the world, with the greatest market potential and the most attractive prospects. Their growth rate has never been expected by any forecaster, so the mobile Internet can foresee what kind of economic myths will be created.
The Open Cloud Consortium (OCC) is committed to developing unified standards in early stages of cloud computing standards and practices.16. Security (Security)
The relative security of cloud computing services is a question that is easy to cause controversy, and it may also hinder the use of cloud computing. Some believe that user data is safer when managed internally, but some believe that there is reason to believe that cloud providers can provide higher security. The Cloud Security Alliance (CSA) is a non-profit organization. It was established to improve the security of cloud computing and promote the practice of cloud computing.
17. Availability and Performance
In addition to security considerations, enterprises are also worried about the cloud's availability level and the performance of applications hosted in the cloud.
18. Sustainability(sustainability)
Although cloud computing is generally considered a form of "green computing", there is no public research supporting this view.
19. Super large-scale
"Cloud" has a considerable scale. Google E cloud computing has more than 1 million servers, and Amazon, IBM, Microsoft , Yahoo and other "cloud" all have hundreds of thousands of servers. Enterprise private clouds generally have hundreds or thousands of servers. "Cloud" can give users unprecedented computing power.
20. on-demand (on-demand)
On-demand is a concept that is opposite to enterprise reservation (on-premise). It means that users can choose services and applications according to their needs, without pre-customizing their own services, and then suppliers can implement applications according to the company's customized needs.
21. Extensive network access (Broad Network Access)
Can be transmitted through multiple platforms, including mobile platforms.
22. Resource pooling (resource pool)
Resources such as storage, processing, memory, network bandwidth and virtual machines use the multi-rental model to serve a variety of consumers.
23. Rapid Elasticity (rapid elasticity)
Can provide various functions quickly and elasticly, and in some cases it automatically and quickly expands, then releases quickly, and then shrinks quickly.
24. Measured Service (custom service)
Measurement resources and services, that is, storage, processing, bandwidth and active user accounts. Assays can also monitor, control and report user usage status, providing transparency to providers and consumers using the service.
25. Autonomic computing (Autonomic computing)
Refers to the computing system that can self-manage
26. Client/server model (Client–server model)
The customer/server model refers to all distributed applications that separate service providers (servers) and service consumers (client).
27. Grid computing (Grid computing)
Grid computing is a form of distributed computing and parallel computing. It forms a cluster of computers on a loosely coupled network to form a super virtual computer to complete large-scale work tasks.
28.Box calculation (Mainframe)
Magic computers are used by large organizations to complete key applications, typically including batch data processing, such as census, industrial and consumer data, enterprise resource planning and financial transaction processing, etc.
29. Utility computing (Utility computing)
Utility computing refers to packaging computing resources, such as computing and storage, into a service that uses instrument measurement, similar to traditional public utilities such as electricity.
30. Peer-to-peer computing (Peer-to-peer)
Peer-to-peer is a centrally coordinated distributed architecture, where participants, including the providers of resources and consumers, must exist at the same time (as opposed to the traditional client server model).
31. Cloud operating system
Cloud operating system is a new software category that aims to fully manage large-scale infrastructure collections (CPU, storage, network) as a seamless, flexible and dynamic operating environment. Similar to the complexity of managing individual computers in a normal operating system, cloud operating systems manage data centers in a complexity.
32. Cloud Computing Center
The Cloud Computing Center refers to an institution or unit that provides computing resources, storage resources and other services based on the supercomputer system, and provides high-performance computing services to all sectors based on high-performance computers. At present, cloud computing centers are mainly aimed at large-scale scientific computing and engineering computing applications, and have huge development potential in commercial computing, Internet, e-government, e-commerce and other fields.
33. Cloud Security Alliance (Cloud Security Alliance)
The Cloud Security Alliance CSA was announced at the RSA conference in 2009. Since its establishment, CSA has quickly gained wide recognition from the industry. Now, CSA has established cooperative relationships with industry organizations such as ISACA, OWASP, and many international leaders have become members of their companies.
Since its establishment, the cloud security guide and its development released by the Cloud Security Alliance have become an impressive security event in the field of cloud computing. On December 17, 2009, the Cloud Security Alliance released a new version of the Cloud Security Guide v2.1, representing an important upgrade in the cloud computing and security industry's understanding of cloud computing and its security protection.
34. Amazon Web Service (AWS)
Amazon's AWS is a typical IaaS service. It provides a set of services, including storage (S3), computing power (EC2), messaging (SQS), data set (SDB), etc. With Amazon's AWS, enterprise users can quickly obtain a virtual infrastructure based on Amazon infrastructure in a matter of minutes, and this infrastructure is resilient and can scale and shrink as needed. Companies around the world can use this flexible computing infrastructure.
35. Amazon Elastic Compute Cloud (EC2)
Amazon Elastic Compute Cloud (EC2) can expand or shrink computing resources as needed, providing new server instances very conveniently.
36. Amazon Simple Storage Service (Amazon Simple Storage Service, S3)
Amazon Elastic Compute Cloud (EC2) can expand or shrink computing resources as needed, providing new server instances very conveniently.
37. Google Application Engine Google App Engine (GAE)
Google App Engine, it is a typical representative of PaaS applications and is also for developers. Allow developers to write applications and then build applications on the Google infrastructure. App Engine facilitates users to develop new service logic and run these new services on cloud computing platforms.
38. IBM "Blue Cloud" computing platform
Simply put, IBM "Blue Cloud" solution is an advanced infrastructure management platform. This solution can integrate the existing infrastructure of the enterprise. Through virtualization technology and automation technology, a cloud computing center owned by the enterprise can be built, and the unified management, unified allocation, unified deployment and unified backup of enterprise hardware resources and software resources is realized, breaking the application's exclusiveness of resources.
39. Microsoft Windows Azure operating system
Windows Azure This operating system. It provides three main functions: Compute, Storage, and Manage. In addition, there is Fabric, which is transparent to users.Fabric includes load balancing, hardware abstraction, and many other functions. However, in general, users do not need to understand how Fabric works internally to take advantage of the various features of Windows Azure.
40. Century Internet Cloud Host
CloudEx Cloud Host is an Internet server rental service launched by Cloud Express Company, a member of Century Internet Group, which integrates computing, storage and network resources. It solves the shortcomings of traditional physical rental and VPS, which is difficult to manage and weak business scalability, reducing the cost of traditional physical host rental and no deposit is required. CloudEX cloud hosts have customer service management methods, which can independently realize remote management and maintenance of hosts, reducing the cost of customers obtaining computing power, simplifying the server management process, and can also be elastically expanded according to changes in customer configuration needs, thereby achieving rapid expansion of host configuration.
41. Music Cloud
Simply put, the so-called "music cloud computing" means that users can play and share the music content stored in the cloud on various devices such as mobile phones, PCs and TVs through music software, without the need for users to copy from computer memory to other terminal devices.
42. Unicom Yunlianyun
Fundamentally speaking, the Internet, as a virtual architecture separated from physics, has always been called giant clouds, and cloud computing is a virtual distributed network computing on the Internet (or cloud). However, cloud computing does not include island clouds (single IDC clouds that are not connected to other IDCs). Cloud computing must be interconnected by a single node (local cloud) and similar nodes (cloud-connected cloud) and heterogeneous nodes (interconnected cloud). Moreover, it does not rely on the implementation of grassroots hardware products. Therefore, whether cloud computing can be commercially available depends on whether the virtual machine has the capabilities of cloud, cloud-connected cloud, and interconnected cloud computing.
43. China Mobile Big Cloud (Big Cloud)
China Mobile Research Institute began to research and development of cloud computing in 2007 and is one of the earliest companies to intervene in the research and development and practice of cloud computing. In early 2007, China Mobile used 15 idle PC servers to build a massive data processing test platform based on open source software, and successfully ran the search engine software. At the end of 2008, China Mobile further built the " big cloud " test platform composed of 256 PC servers, 1,000 CPU Cores, and 256TB storage. It conducted application pilot projects in combination with the needs of on-site data mining, user behavior analysis, and achieved remarkable results in improving efficiency, reducing costs, energy conservation and emission reduction. (Click to view IT168 cloud computing channel: China Mobile's "Big Cloud" 1.0 system functions and product interpretation)
After more than three years of hard work, in 2009, China Mobile Research Institute officially announced the platform "BigCloud - Big Cloud" that is being developed and tested. The platform scale has been further expanded to reach the storage scale of 1,000 servers, 5,000 CPU Cores, and 3,000TB, and to improve China Mobile's future information service capabilities in mobile Internet. In September 2009, the Big Cloud (Big Cloud 0.5) version was released within the China Mobile Research Institute for internal trial.
The latest 1.0 version is scheduled to be released on May 21, 2010, and can realize key functions such as distributed file systems, distributed massive data warehouses, distributed computing frameworks, cluster management, cloud storage systems, elastic computing systems, parallel data mining tools, etc.
44. China Telecom E cloud
The file storage service launched by China Telecom can have 2G space for free. With e-cloud online backup, you can protect your chat and transaction history, home photos and videos, music files and other important computer documents.You can get 2GB of free space, or pay for more storage space...
45. Cloud Antivirus
Cloud Antivirus is actually based on feature code antivirus, but the virus database of the anti-soft is not all local, but is in a large number of servers, interacting with the server when scanning, so as to determine whether there is a virus. Cloud antivirus can reduce the frequency of upgrades, reduce the occupation of detection and killing, and reduce the capacity of the local library.
46. Cloud Backup
As a brand new backup service based on broadband Internet and large-capacity storage space, cloud backup was born out of the cocoon. In short, it is to use cluster applications, grid technology or distributed file systems and other functions to gather a large number of different types of storage devices in the network to work together through application software to jointly provide functional services for data storage backup and business access.
The cost of building a cloud backup infrastructure will be millions and requires a lot of technical support. Therefore, the threshold for cloud backup services has always been high. In foreign countries, due to the early Internet and the rapid development of network broadband, the era of cloud backup has entered a mature stage. Even so, only a few IT giants can provide this service, Amazon , EMCh, Carbonite, Symantec , Symantec , etc. Among them, Amazon has achieved recognized market success in this field.
Looking at the domestic market, the rapid development of network broadband and the popularization of Internet applications, the demand for data disaster backup exploded like a blowout. With the advancement of a few innovative technologies and enterprises, the domestic cloud backup market has begun to show its scale. However, due to the high threshold in this field, currently ranks first in the industry and can compete with the same industry in foreign countries. Only the leading communications company China Telecom, a well-known Internet infrastructure service provider, Century Internet, and a well-known domestic computer manufacturer, Lenovo , etc.
47. Cloud migration
Cloud migration refers to the migration of enterprises from traditional platforms to cloud platforms, because compared with traditional application platforms, the advantages of cloud computing platforms lie in their powerful computing power, storage capabilities, diversified services and high cost performance.
48. Cloud input method
The traditional input method is limited by memory and CPU capabilities, and uses a smaller vocabulary and language model, and the input accuracy is limited;
The cloud input method utilizes the server's unlimited storage and computing power to greatly improve the input accuracy.
cloud input method cross-platform and installation-free. For users of operating systems such as Linux, Mac OS, or temporary use environments such as Internet cafes, you can enjoy the smooth input experience of input method while surfing the Internet.
cloud input method is an input method based on cloud computing technology. The most obvious difference between it and general input method is that there is no local input method file and it is completely supported by the server. In addition, the cloud input method is the culmination of search engines and natural language processing. It has the characteristics of cloud computing and represents the direction of future technological development. The cloud input method has achieved unprecedentedly large, comprehensive and accurate Chinese input field. Compared with traditional input methods, cloud input method is more accurate, increasing the semantic accuracy of Chinese input to 90%, and increasing the coverage and preferred rate of user short sentences to more than 96%. The cloud input methods that have been officially launched include Sogou Cloud Input Method, qq cloud input method , Baidu online input method, etc.
49. SOA
Service-Oriented Architecture (SOA) is a component model that connects different functional units of an application (called services) through well-defined interfaces and contracts between these services. Interfaces are defined in a neutral way and should be independent of the hardware platform, operating system and programming language that implements the service. This allows services built in various such systems to interact in a unified and common way.
50. Load Balancing
Outbound Load Balancing (Outbound Load Balancing) Load balancing is built on the existing network structure. It provides an inexpensive, effective and transparent way to expand the bandwidth of network devices and servers, increase throughput, strengthen network data processing capabilities, and improve network flexibility and availability. As the traffic volume increases, the number of visits and data traffic increases rapidly, and the processing capacity and computing strength of each core part of the existing network also increase accordingly, making it impossible for a single server device to bear it. In this case, if the existing equipment is thrown away and a large amount of hardware upgrades are carried out, it will cause waste of existing resources. If the next increase in business volume is faced, this will lead to high cost investment in hardware upgrades again. Even the equipment with excellent performance cannot meet the current demand for business volume growth.
51. Virtualization
Virtualization refers to the operation of computer components on a virtual basis rather than on a real basis. Virtualization technology can expand the capacity of hardware and simplify the software reconfiguration process. CPU virtualization technology can simulate multiple CPUs in parallel, allowing a platform to run multiple operating systems at the same time, and applications can run in independent spaces without affecting each other, thereby significantly improving the work efficiency of the computer.
52. Storage Virtualization
Storage is like a pool, and the storage space can be allocated as needed as needed. A useful and comprehensive functional service is provided uniformly by integrating one (or more) Target services or functions with other additional functions. Typical virtualization includes the following situations: blocking the complexity of the system, adding or integrating new functions, simulating, integrating or breaking down existing service functions, etc.
53. Application Virtualization
Application virtualization decouples the application with the operating system, providing an virtual running environment for the application. In this environment, it includes not only the executable file of the application, but also the runtime environment it needs. In essence, application virtualization is to abstract the application's dependence on low-level systems and hardware, which can solve the problem of version incompatibility.
54. Desktop Virtualization
Desktop Virtualization refers to virtualizing the desktop of a computer to achieve the security and flexibility of desktop use. Our personal desktop systems on the network can be accessed through any device, anywhere, and at any time.
55. Server virtualization
Abstract the server's physical resources into logical resources, turning a server into several or even hundreds of isolated virtual servers, or turning several servers into one server for use, we are no longer limited by physical boundaries, but instead turning CPU, memory, disk, I/O and other hardware into a "resource pool" that can be dynamically managed, thereby improving resource utilization, simplifying system management, realizing server integration, and making IT more adaptable to business changes. This is the virtualization of servers.
56. Service-Level Agreement (SLA)
The service level agreement is a contract between a network service provider and a customer, which defines the terms service type , service quality and customer payment. A typical SLA includes the following items: minimum bandwidth allocated to customers; customer bandwidth limits; number of customers that can be served simultaneously; notification arrangements before network changes that may affect user behavior; dial-in access availability; application statistics; minimum network utilization performance supported by service providers, such as 99.9% effective working hours or up to 1 minute of downtime per day; traffic priority for various types of customers; customer technical support and services, etc.
57. Internet of Things
The Internet of Things is defined as a network that connects any item to the Internet according to the agreed protocol to exchange and communicate information to realize intelligent identification, positioning, tracking, monitoring and management. The concept of the Internet of Things was proposed in 1999. The Internet of Things is the "Internet connected to things". This has two meanings: First, the core and foundation of the Internet of Things are still the Internet, an extension and expansion network based on the Internet; second, its user end extends and expands to any item to exchange and communicate information.
58. Three-network fusion
Three-network fusion refers to the telecommunications network, computer network and cable TV network that can provide communication services including voice, data, images and other comprehensive multimedia through technological transformation.
59. Smart Earth
The Smart Earth is also called the Smart Earth, which embeds and equips the sensors into various objects such as power grids, railways, bridges, tunnels, highways, buildings, water supply systems, dams, oil and gas pipelines, etc., and is widely connected to form the so-called "Internet of Things", and then integrates the "Internet of Things" with the existing Internet to achieve the integration of human society and physical systems. This concept was first proposed by IBM CEO Peng Mingsheng. At the same time, the Smart Earth is also a book and an electronic magazine.
60. Mobile Internet
Mobile Internet is to combine mobile communication and the Internet to become one. In recent years, mobile communications and the Internet have become the two fastest-growing businesses in the world, with the greatest market potential and the most attractive prospects. Their growth rate has never been expected by any forecaster, so the mobile Internet can foresee what kind of economic myths will be created.