Cloud
The term "cloud" comes
from early network diagrams, in which the image of a cloud was used to indicate
a large network, such as a WAN. The cloud eventually became associated with the
entire Internet, and the two terms are now used synonymously. The cloud may
also be used to describe specific online services, which are collectively
labeled "cloud computing."
Examples of popular
cloud-based services include web applications, SaaS, online backup, and other
types of online storage. Traditional Internet services like web hosting, email,
and online gaming may also be considered part of the cloud since they are
hosted on Internet servers, rather than users' local computers. Even social
networking websites such as Facebook and LinkedIn are technically cloud-based services,
since they store your information online.
While "the cloud"
is simply a buzzword for most consumers, it plays an important role for
businesses. By moving software services to the cloud, companies can share data
more efficiently and centralize their network security. Additionally,
cloud-based virtualization can help businesses reduce the number of computer
systems and software licenses they need to buy. The end result and a more
efficient and less costly way of running a business.
Access Control List (ACL)
Ø E-Mail
Ø Print
Ø A
Ø AA
Ø AAA
Ø LinkedIn
Ø Facebook
Ø Twitter
Ø Share This
Ø RSS
Ø Reprints
Ø Software Quality Resources
Ø Operating systems
An access control list
(ACL) is a table that tells a computer operating system which access rights
each user has to a particular system object, such as a file directory or
individual file. Each object has a security attribute that identifies its
access control list. The list has an entry for each system user with access
privileges. The most common privileges include the ability to read a file (or
all the files in a directory), to write to the file or files, and to execute
the file (if it is an executable file, or program). Microsoft Windows NT/2000,
Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the
operating systems that use access control lists. The list is implemented
differently by each operating system.
In Windows NT/2000, an access control list (ACL) is associated with each system object. Each ACL has one or more access control entries (ACEs) consisting of the name of a user or group of users. The user can also be a role name, such as "programmer," or "tester." For each of these users, groups, or roles, the access privileges are stated in a string of bits called an access mask. Generally, the system administrator or the object owner creates the access control list for an object.
Cloud
Computing
Cloud computing refers to
applications and services offered over the Internet. These services are offered
from data centers all over the world, which collectively are referred to as the
"cloud." This metaphor represents the intangible, yet universal
nature of the Internet.
The idea of the
"cloud" simplifies the many network connections and computer systems
involved in online services. In fact, many network diagrams use the image of a
cloud to represent the Internet. This symbolizes the Internet's broad reach,
while simplifying its complexity. Any user with an Internet connection can
access the cloud and the services it provides. Since these services are often
connected, users can share information between multiple systems and with other
users.
Examples of cloud computing include online backup services, social networking
services, and personal data services such as Apple's MobileMe. Cloud computing
also includes online applications, such as those offered through Microsoft
Online Services. Hardware services, such as redundant servers, mirrored
websites, and Internet-based clusters are also examples of cloud computing.