Cloud Technologies

Cloud Paging: The Technology Behind Cloud Game Streaming And Live Streaming

Grazed from CloudTweaks. Author: Salman Ul Haq.

Cloud initially started off as a cost-effect and convenient way to get small and medium business up and running on the web but with the exponential growth both within SME and large enterprises, other domains within computing have also started to integrate Cloud within their own equations. First it was PaaS and IaaS then SaaS and now we’ve seen phenomenal growth and adoption of GaaS which is short for Gaming as a Service. It is one of the most useful and powerful Cloud services which are being used for online Cloud based interactive gaming and there are numerous consoles that are being launched based on this technology.

For the gaming console leaders in the computing industry, it’s practically impossible to resist the augmented usability of the Cloud managed libraries of content with stream-anywhere capability. ‘Any device gaming’ and ‘click to play’ experiences have equipped the users to stream and play the games anywhere using the Cloud just like they stream the HD media on different web outlets like Netflix, YouTube, Pandora and Spotify...

Top 5 Innovative Cloud Startups


<b>1. CipherCloud</b><br><br>San Jose, Calif.-based CipherCloud wants to help more enterprise companies say yes to the cloud by providing security solutions. The cloud native offers encryption and tokenization gateways that address concerns about data privacy, residency, security and compliance.<br><br>The CipherCloud Platform, which addresses public and private cloud applications, secures a range of cloud applications, including Salesforce.com, Force.com, Chatter, Gmail, Office 365 and Amazon Web Services.<br><br>Visit <a href=http://www.ciphercloud.com target=_blank>CipherCloud</a>        1. CipherCloud

San Jose, Calif.-based CipherCloud wants to help more enterprise companies say yes to the cloud by providing security solutions. The cloud native offers encryption and tokenization gateways that address concerns about data privacy, residency, security and compliance.

The CipherCloud Platform, which addresses public and private cloud applications, secures a range of cloud applications, including Salesforce.com, Force.com, Chatter, Gmail, Office 365 and Amazon Web Services.

Visit CipherCloud


<b>2. SnowShoe</b><br><br>Wisconsin may not be the first place that jumps into your mind when you think about technology startups, but Madison, Wis.-based SnowShoe has developed a small device used for authenticating cloud-based mobile transactions.<br><br>The company has opened its APIs to the developer community, which has already begun experimenting with the device to execute a variety of functions, using Java and PHP. One application, which was demonstrated at a conference in San Francisco earlier this year, involved use of the device to authenticate authorization to pass through electronically locked doors.<br><br>Visit <a href=http://beta.snowshoestamp.com target=_blank>SnowShoe</a>        2. SnowShoe

Wisconsin may not be the first place that jumps into your mind when you think about technology startups, but Madison, Wis.-based SnowShoe has developed a small device used for authenticating cloud-based mobile transactions.

The company has opened its APIs to the developer community, which has already begun experimenting with the device to execute a variety of functions, using Java and PHP. One application, which was demonstrated at a conference in San Francisco earlier this year, involved use of the device to authenticate authorization to pass through electronically locked doors.

Visit SnowShoe


<b>3. Nebula</b><br><br>Nebula has developed a new Open Stack hardware appliance for the deployment and management of private clouds, and to better accommodate the rigors of big data, web and mobile applications, using an open source architecture geared toward preventing vendor lock-in. The company places an emphasis on simplifying the management of infrastructure in order to enable more time to be invested in the development and optimization of applications. The system can be scaled to multirack deployments, if needed.<br><br>At this year's OpenStack Summit, Nebula unveiled a partnership with LSI, in which the two would accelerate the sharing and storage of data in OpenStack environments for big data, web and mobile applications.<br><br>Visit <a href=http://www.nebula.com target=_blank>Nebula</a>        3. Nebula

Nebula has developed a new Open Stack hardware appliance for the deployment and management of private clouds, and to better accommodate the rigors of big data, web and mobile applications, using an open source architecture geared toward preventing vendor lock-in. The company places an emphasis on simplifying the management of infrastructure in order to enable more time to be invested in the development and optimization of applications. The system can be scaled to multirack deployments, if needed.

At this year's OpenStack Summit, Nebula unveiled a partnership with LSI, in which the two would accelerate the sharing and storage of data in OpenStack environments for big data, web and mobile applications.

Visit Nebula


<b>4. SaaSMarkets</b><br><br>This San Mateo, Calif.-based company develops app stores that open the Software-as-a-Service (SaaS) market to a much broader base of companies that would otherwise lack the skill sets to develop such platforms on their own.<br><br>The company's MarketMaker platform is designed to support any proprietary apps developed by the customer, as well as a list of more than 1,500 prequalified third-party applications. Deployment time is described as a "matter of weeks." The company is specifically targeting finance, technology and retail customers.<br><br>Visit <a href=http://www.saasmarkets.com target=_blank>SaaSMarkets</a>        4. SaaSMarkets

This San Mateo, Calif.-based company develops app stores that open the Software-as-a-Service (SaaS) market to a much broader base of companies that would otherwise lack the skill sets to develop such platforms on their own.

The company's MarketMaker platform is designed to support any proprietary apps developed by the customer, as well as a list of more than 1,500 prequalified third-party applications. Deployment time is described as a "matter of weeks." The company is specifically targeting finance, technology and retail customers.

Visit SaaSMarkets


<b>5. Cumulus Networks</b><br><br>Cumulus Networks has been shaking up networking with a Linux-based network operating system unveiled in June. The technology brings the flexibility and low-cost benefits of open source to data center networks that Cisco and other vendors have dominated.<br><br>The Sunnyvale, Calif.-based company wants to break their dominance and is testing Cumulux Linux for use in corporate data centers and by cloud service providers.<br><br>Visit <a href=http://www.cumulusnetworks.com target=_blank>Cumulus Networks</a>        5. Cumulus Networks

Cumulus Networks has been shaking up networking with a Linux-based network operating system unveiled in June. The technology brings the flexibility and low-cost benefits of open source to data center networks that Cisco and other vendors have dominated.

The Sunnyvale, Calif.-based company wants to break their dominance and is testing Cumulux Linux for use in corporate data centers and by cloud service providers.

Visit Cumulus Networks

Previous Slide 1/5 Next

CERN's Hadron Collider Research Fueled By OpenStack

Grazed from InformationWeek.  Author: Charles Babcock.

CERN, the birthplace of the World Wide Web, is rebuilding its Large Hadron Collider and re-architecting its data center infrastructure on OpenStack Grizzly as it continues its pursuit of the Higgs Boson particle and other advanced physics.  
At the end of the process, it will be able to collect twice as much data from a research experiment in the collider as before, and that data will be uploaded to a "federated" Grizzly OpenStack cloud. Grizzly is the name of the OpenStack project's seventh and latest release, which came out in April.

CERN's federated cloud will encompass 15,000 servers in two locations, Budapest, Hungary, and Geneva, Switzerland.  The collider is being rewired and rebuilt with stronger magnets to run at twice the power level at which it ran before, and that means, says Tim Bell, CERN infrastructure manager, it will generate twice as much data as it did when it was taken offline earlier this year, after a breakthrough in particle physics on March 14...

Top 5 Emerging Cloud Technologies


<b>1. SaaS Device Management</b><br><br>The mobile device management market is predicted to come to an end, according to Gartner analyst John Girard. But, the MDM market is experiencing growth mainly from vendors that sell cloud-based MDM. It's more cost-effective, according to Gartner.<br><br>A few vendors that deserve a look, according to analysts at the show, are <a href=http://www.fiberlink.com target=_blank>Fiberlink</a>, <a href=http://www.airwatch.com target=_blank>AirWatch</a>, <a href=http://www.boxtone.com target=_blank>BoxTone</a> and <a href=http://www.citrix.com/products/xenmobile/overview.html target=_blank>Citrix XenMobile</a>. Gartner recommends that organizations evaluating MDM vendors look to whether they provide mobile application management capabilities or application containers.        1. SaaS Device Management

The mobile device management market is predicted to come to an end, according to Gartner analyst John Girard. But, the MDM market is experiencing growth mainly from vendors that sell cloud-based MDM. It's more cost-effective, according to Gartner.

A few vendors that deserve a look, according to analysts at the show, are Fiberlink, AirWatch, BoxTone and Citrix XenMobile. Gartner recommends that organizations evaluating MDM vendors look to whether they provide mobile application management capabilities or application containers.


<b>2. Multifactor Authentication</b><br><br>Account credentials have become more expensive on the black market than credit card numbers, according to security researchers. Employees use weak and duplicate passwords for online services and access to corporate systems. The scourge of password breaches has renewed interest in two-factor authentication.<br><br><a href=http://www.emc.com/domains/rsa/index.htm target=_blank>RSA</a>, the security division of EMC Corp., sells hardware tokens used by a range of organizations, from large defense contractors and government agencies to biotechnology firms and pharmaceutical manufacturers. Other popular vendors include Amsterdam-based <a href=http://www.gemalto.com target=_blank>Gemalto</a> and Belcamp, Md.-based <a href=http://www.safenet.com target=_blank>SafeNet</a>, according to Gartner.        2. Multifactor Authentication

Account credentials have become more expensive on the black market than credit card numbers, according to security researchers. Employees use weak and duplicate passwords for online services and access to corporate systems. The scourge of password breaches has renewed interest in two-factor authentication.

RSA, the security division of EMC Corp., sells hardware tokens used by a range of organizations, from large defense contractors and government agencies to biotechnology firms and pharmaceutical manufacturers. Other popular vendors include Amsterdam-based Gemalto and Belcamp, Md.-based SafeNet, according to Gartner.


<b>3. Virtual Desktop Containers</b><br><br>Browser components are getting their own sandbox, so why shouldn't browsers or commonly used applications? Fairfax, Va.-based <a href=http://www.invincea.com>Invincea</a> uses virtualization and a lightweight Windows app to move Web browsers, PDF readers, Office suite and executable files into a secure virtual container. Attacks are contained and uploaded to either an on-premise appliance or Invincea's cloud-based service.<br><br>Cupertino, Calif.-based <a href=http://www.bromium.com>Bromium</a> is also gaining interest with its hardware isolation, providing a microvisor that isolates system processes. Although it currently only supports systems running the Intel i3, i5, i7 processor, analysts at the summit were praising the product.        3. Virtual Desktop Containers

Browser components are getting their own sandbox, so why shouldn't browsers or commonly used applications? Fairfax, Va.-based Invincea uses virtualization and a lightweight Windows app to move Web browsers, PDF readers, Office suite and executable files into a secure virtual container. Attacks are contained and uploaded to either an on-premise appliance or Invincea's cloud-based service.

Cupertino, Calif.-based Bromium is also gaining interest with its hardware isolation, providing a microvisor that isolates system processes. Although it currently only supports systems running the Intel i3, i5, i7 processor, analysts at the summit were praising the product.


<b>4. SaaS Software Testing</b><br><br>The Verizon Data Breach Investigations Report points out that vulnerability management and configuration weaknesses are common targets of attackers. Security software vendors are now offering cloud-based software security scanning services in hopes the message will sink in among small and midsize businesses.<br><br>To meet those needs, Santa Clara, Calif.-based <a href=https://www.whitehatsec.com target=_blank>WhiteHat</a> offers Sentinel for SaaS-based Web application scanning. Meanwhile, Burlington, Mass.-based <a href=http://www.veracode.com target=_blank>Veracode</a> sells a SaaS-based application code analysis service and is seeking channel partners. Industry analysts say the cloud-based services are increasingly used by businesses that don't have the deep pockets to invest heavily in a software security program.        4. SaaS Software Testing

The Verizon Data Breach Investigations Report points out that vulnerability management and configuration weaknesses are common targets of attackers. Security software vendors are now offering cloud-based software security scanning services in hopes the message will sink in among small and midsize businesses.

To meet those needs, Santa Clara, Calif.-based WhiteHat offers Sentinel for SaaS-based Web application scanning. Meanwhile, Burlington, Mass.-based Veracode sells a SaaS-based application code analysis service and is seeking channel partners. Industry analysts say the cloud-based services are increasingly used by businesses that don't have the deep pockets to invest heavily in a software security program.


<b>5. Crowdsourcing Threat Protection</b><br><br>Crowdsourcing has proven successful for organizations or individuals seeking assistance on a project from a larger group of people. Some technology vendors are applying it to security. Santa Clara, Calif.-based <a href=https://test-www.paloaltonetworks.com target=_blank>Palo Alto Networks</a> has been gaining attention with the crowdsourcing capabilities associated with its network security appliances.<br><br>The company's Wildfire platform uses a cloud-based malware analysis environment that shares threat information with all subscribers to the service. Columbia, Md.-based <a href=http://www.sourcefire.com target=_blank>Sourcefire</a> sells its FireAmp appliance line with crowdsourcing antimalware capabilities.        5. Crowdsourcing Threat Protection

Crowdsourcing has proven successful for organizations or individuals seeking assistance on a project from a larger group of people. Some technology vendors are applying it to security. Santa Clara, Calif.-based Palo Alto Networks has been gaining attention with the crowdsourcing capabilities associated with its network security appliances.

The company's Wildfire platform uses a cloud-based malware analysis environment that shares threat information with all subscribers to the service. Columbia, Md.-based Sourcefire sells its FireAmp appliance line with crowdsourcing antimalware capabilities.

Previous Slide 1/5 Next