Archives for : May2012

Different Types of Cloud Computing Topologies Explained (Public, Private, Hybrid Cloud)

OK. So you’ve decided to move your servers to this magical place called “the cloud”.

But wait! Have you thought about where your cloud will be hosted? Choosing the right cloud topology is one of the most important decisions you can make, because it will impact the costs, security, and control of your cloud server deployment.

That’s why I’ve decided to lay out a few of the most common options you may run into:

Public Cloud

This is the most common and most cost-effective form of cloud server hosting.

In a public cloud, all of the hardware and infrastructure is owned and managed by a third-party. With this approach, you only pay for computing resources without worrying about any of the behind-the-scenes hardware.

Dedicated Private Cloud

With a dedicated private cloud, you host all of your servers on virtual machines that reside on hardware which is owned and controlled by you. And this hardware is stored inside of a datacenter which resides within your internal network.

This is the most expensive type of cloud-computing infrastructure. Because of the costs involved, it’s usually more suitable for large organizations, or companies with special security and privacy requirements. (Although the costs have been falling, and virtualization hardware is becoming much more accessible)

Managed Private Cloud

With a managed private cloud, you own and control all of the hardware, which is usually hosted at an external site where it is managed by a third party. This way, you get most of the security and control benefits of a dedicated private cloud, but without having to build a new datacenter or hire any new staff.

Hybrid Cloud

Hybrid clouds give you access to the cost-saving benefits of public cloud computing, while also offering the security and control of a private cloud.

How does it accomplish this?

Within every company, there are large amounts of information with varying amounts of sensitivity. So you can achieve cost-savings by only using the private cloud for highly confidential computing tasks, while sending non-sensitive or non-critical tasks out to the more cost-effective public cloud.

A good example would be a medical research company that removes personally identifiable information from their records before sending it off to a supercomputer for advanced analysis.

Of course, there are other variations on the cloud topology theme, but most of them can broadly fit into one or more of the topologies I’ve outlined above.

Has your organization implemented a public or hybrid cloud topology? Leave a comment below and share your experience.

Ubuntu Linux is Great for Privacy

Ubuntu Linux 12.04 “Precise Pangolin” is due out in late April, and presently the second and final beta edition is out now. There are a lot of things that make this new version of Ubuntu Linux even better than the previous version, and many of these notable features are creating a lot of buzz with people who are into technology. One of the greatest enhancements that Ubuntu Linux 12.04 “Precise Pangolin” offers is related to privacy.

Operating systems and privacy

Most people tend to forget that web browsers and certain websites aren’t the only things that tend to collect information about computer users; operating systems also record things such as what activities are performed and what files are used. Often, this is something that is helpful because it lets users quickly access recently worked on documents. Unfortunately, this can also be an issue because anyone who accesses the system can get access to these things the browser stores.

This all changes with Canonical’s new release. Ubuntu Linux 12.04 “Precise Pangolin” is designed to put browser-style privacy and security settings so that users get more control over privacy at the operating system level.

The Activity Log

Ubuntu Linux 12.04 “Precise Pangolin” will break ground with an operating system wide privacy setting that lets users delete their activity log. Users can delete all of their activity log or only a portion. Users can also disable logging altogether, or they could disable logging activities for only some files or applications.

This new security and privacy setting can get very specific, letting users have ultimate privacy control. Users will be able to delete all activity, but they will also have the option to delete data in certain ranges; a user could delete stored data in a specific date range or for only a certain time.

Using these settings are made to be easy to do with a simple switch. To make accessing this new control easy, the folks developing Ubuntu Linux 12.04 “Precise Pangolin” has integrated an “Activity Log Manager” in the Ubuntu system settings.

Benefits

While your system may take another second or two to call up a recently accessed file, this can be incredibly beneficial, and the Electronic Frontier Foundation is quite excited about this new development.

This new feature offers additional privacy support for operating systems. This can protect against local attackers or anyone who can access your computer. While many users may not have very sensitive data on their computer, using this feature along with data encryption and other safety precautions can lead to further safety, security, and privacy.

Conclusion

This privacy and security upgrade is just one of the many ways in which Ubuntu Linux 12.04 “Precise Pangolin” is an upgrade over previous versions. With all of the new innovations in Canonical’s new release, it is no surprise that many technology enthusiasts are excited for the final version release of the newest Linux version. Even for those who aren’t Linux fans, this new privacy feature gives those into tech a lot of hope that more operating systems will start to offer similar features for greater privacy and security for all.

About The Author: This article is written by Sara Carter (representing cyberdefender), who likes social networks, google android and psychology.