Monday, 14 April 2014

Cloud

Cloud

The term  "cloud"  comes from early network diagrams, in which the image of a cloud was used to indicate a large network, such as a WAN. The cloud eventually became associated with the entire Internet, and the two terms are now used synonymously. The cloud may also be used to describe specific online services, which are collectively labeled "cloud computing."


Examples of popular cloud-based services include web applications, SaaS, online backup, and other types of online storage. Traditional Internet services like web hosting, email, and online gaming may also be considered part of the cloud since they are hosted on Internet servers, rather than users' local computers. Even social networking websites such as Facebook and LinkedIn are technically cloud-based services, since they store your information online.

While "the cloud" is simply a buzzword for most consumers, it plays an important role for businesses. By moving software services to the cloud, companies can share data more efficiently and centralize their network security. Additionally, cloud-based virtualization can help businesses reduce the number of computer systems and software licenses they need to buy. The end result and a more efficient and less costly way of running a business.

Access Control List (ACL)
Ø  E-Mail   
Ø  Print
Ø  A
Ø  AA
Ø  AAA
Ø  LinkedIn
Ø  Facebook
Ø  Twitter
Ø  Share This
Ø  RSS
Ø  Reprints
Ø  Software Quality Resources
Ø  Operating systems


    An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system.

In Windows NT/2000, an access control list (ACL) is associated with each system object. Each ACL has one or more access control entries (ACEs) consisting of the name of a user or group of users. The user can also be a role name, such as "programmer," or "tester." For each of these users, groups, or roles, the access privileges are stated in a string of bits called an access mask. Generally, the system administrator or the object owner creates the access control list for an object.


Cloud Computing
Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet.

The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users.

Examples of cloud computing include online backup services, social networking services, and personal data services such as Apple's MobileMe. Cloud computing also includes online applications, such as those offered through Microsoft Online Services. Hardware services, such as redundant servers, mirrored websites, and Internet-based clusters are also examples of cloud computing.


No comments:

Post a Comment