Google: the World's First Information Utility?

Total Page:16

File Type:pdf, Size:1020Kb

Google: the World's First Information Utility? BISE – STATE OF THE ART Google: The World’s First Information Utility? The idea of information utilities came to naught in the 70s and 80s, but the world wide web, the Internet, mobile access, and a plethora of access devices have now made information utilities within reach. Google’s business model, IT infrastructure, and innovation strategies have created the capabilities needed for Google to become the world’s first global information utility. But, the difficulty of monetizing utility services and concerns about privacy, which could bring government regulation, might stymie Google’s growth plans. DOI 10.1007/s12599-008-0011-6 a national scale (Sackmann and Nie 1970; the number of users to the point where it The Authors Sackman and Boehm 1972). Not to be left is the dominant search player in both the out, the idea was also promoted by the U.S. and the world. This IT-based strategy Rex Chen Computer Usage Development Institute has allowed Google to reach more than Prof. Kenneth L. Kraemer, PhD in Japan, the British Post Office in the UK, $16 billion in annual revenue, a stock price Prakul Sharma and Bell Canada and the Telecommunica- over $600 per share and a market capital- University of California, Irvine tions Board in Canada (Press 1974). ization of nearly $200 billion. Center for Research on Information The idea was so revolutionary at the Over the next decade, Google plans to Technology and Organization (CRITO) time that at least one critic called for a extend its existing services to the wire- 5251 California Ave., Ste. 250 moratorium on the development of infor- less world, to develop new services, and Irvine, CA 92697 mation utilities until the year 2000 so that to expand its computing infrastructure USA research could indicate what the social to support this growth. The new services, [email protected] impacts might be (Press 1974). The fateful combined with its own and partners’ com- year 2000 came and went without men- plementary products, have the potential Authors are listed alphabetically to tion of information utilities, but the year to make Google the world’s first informa- denote equal contribution. 2008 has raised the concept once again as tion utility and bring its ambitious goal of Google appears positioned to become the “organizing the world’s information” a lit- Received: 2008-04-02 first information utility in the world (Carr tle bit closer in time. Accepted: 2008-09-18 2008a) and concern about the potential The information utility was defined by Accepted after 2 revisions by Prof. Dr. social implications is raised once again its originators “as mass communications König. (Maurer 2007). systems in which the consumer interacts This article is also available in Ger- Today, however, Google is mainly directly with a central computer and its man in print and via http://www. known for its unparalleled search engine associated information files from a remote wirtschaftsinformatik.de: Chen R, technology, running on an efficient very terminal at his home, office, or school – Kraemer KL, Sharma P (2008) Google: large scale distributed computer system. in his natural environment – in a man- Das weltweit erste “Information Uti- It has become so successful that the verb ner such that he received the information lity”? WIRTSCHAFTSINFORMATIK. doi: “to Google” has ingrained itself in the at his terminal almost immediately after 10.1007/11576-008-0116-z. vernacular as a synonym for performing requesting it.” The information utility also a web search. The key to Google’s suc- includes contributing physical elements cess has been its strategic and innovative such as “television displays, communi- use of IT. Its search engine enables people cations lines, computers, data stores, and 1 Introduction to search the web for useful information support facilities” (Sackman and Boehm with Google Search, Google Maps, Google 1972, p. 17). In the early 1970s, futurists at the Rand Earth, and other applications, but places At its heart, the concept involves an Corporation and Stanford University advertising related to the user’s search analogy with public utility systems. As proposed the creation of information along side the results. By linking ads to a discussed by Nicholas Carr (2008a) in The utilities – the provision of computing and variety of search-based web applications, Big Switch, private electric systems built information service by a utility in the form and continually improving the relevance and operated by individual companies of a national network where any person of the searches and the ads, Google has were replaced by public utility networks desiring information could gain access been able to monetize its search capabil- whose economies of scale enabled them to – much like gas and electric utilities, but on ity, achieve financial success, and increase operate at a far lower cost and with greater Business & Information Systems Engineering 1 | 2009 BISE – STATE OF THE ART effectiveness. Similarly today, private com- ing sections describe these features, how 2.2 Core products and services puting and information services could be they contribute to Google’s capabilities provided better and cheaper over a com- for an information utility, and how its Google’s business consists of search-based mon computing network rather than future developments will further enable online advertising, which is comprised through the myriad computing shops that the vision. The paper concludes with an of three major components: AdWords, now exist in companies. Not only would analysis of the obstacles it faces in doing AdSense and a long list of complements to companies, governments, and other orga- so, and lessons for other firms. the first two services. AdWords is Google’s nizations benefit from economies of scale, advertising product and AdSense is an ad but so would individuals, as all customers serving program that delivers relevant would pay based only on the computing 2 Google’s business ads to Google’s partner websites. The role and information services they used from of the complements like Gmail or Google the utility. 2.1 Business strategy Earth is to draw users to Google websites The Internet is the global broadband where they can be exposed to advertis- grid network that information utilities Google’s strategy has been to capture ing. can use to deliver services to their custom- revenue from online advertising shown AdWords is the backbone of Google’s ers. Other components of an information along with web-based searches. Its advertising business. It allows advertisers utility are in operation today, although in advertising revenue accounted for 99 % of to create ads, insert them to the AdWords piecemeal fashion. Large scale comput- its total revenue of $16.59 billion in 2007. program, and choose the search keywords ing services that can be accessed over the Approximately 64 % of Google’s revenue is that determine when the ads show up next Internet are offered by IBM, HP, Micro- attributed to ads placed on its own prod- to a Google search query result. AdWords soft, Oracle, and Google. Network-based ucts and services websites (Google Search, allows the advertiser to display a variety of software services are offered to SMEs GMail, Google Earth), whereas the rest is ad formats and to target the ads to specific and even some large companies by ven- derived from its partners (e. g., CNN.com, languages and geographic locations. dors such as SAP (ERP), SalesForce.com nytimes.com, techcrunch.com). AdSense is Google’s ad serving pro- (CRM), and Workday (HR and finance). In order to remain a forefront tech- gram that delivers ads on partner websites Massive storage services are offered by nology leader and innovator, Google has by automatically crawling the content of EMC while thin clients are provided by aggressively acquired start-up companies their web pages and showing ads that are companies such as HP. whose products strengthen the range of relevant to the audience and the site con- Whereas such companies might have complements offered by Google and pro- tent. “AdSense for search” allows a website strong capabilities in one of these compo- vide increased distribution channels for publisher to provide website search to his nents, Google has amassed powerful capa- its advertising business. These acquisi- visitors and to earn money by displaying bilities in all of them, as required for an tions reinforce its expertise in online and Google ads on the search result pages. information utility. Google’s server farms traditional advertising. Going forward, Google’s business model involves mon- hold about one million computers. Its pro- Google’s strategy is to increase revenue by etizing the online advertising delivered prietary software coordinates all the serv- targeting additional customers in online to people who use the Internet everyday ers to form computing clusters in each of advertising. Out of the total $298 billion through Google Search or other services. the company’s data centers strategically spent on advertising in the U.S. in 2007, Revenue from AdWords and AdSense located around the world. Its software only $21.4 billion was spent online with are generated using two different pric- applications such as Google Apps, Google about $8.8 billion attributed to search ing schemes: cost-per-click (CPC) and Maps, and Google Earth provide software advertising (Capps and Ives 2007). Google cost-per-thousand impressions (CPM). as a service. Its Android operating system is also expanding its advertising business Under CPC, the advertisers pay Google enables cell phones, PDAs, and thin clients beyond online marketing to other media, each time a user clicks on the text-based as well as pocket PCs to access services on including radio and print media (Hoover ad that appears online. If the ad appeared the Internet. 2006).
Recommended publications
  • Google Apps Premier Edition: Easy, Collaborative Workgroup Communication with Gmail and Google Calendar
    Google Apps Premier Edition: easy, collaborative workgroup communication with Gmail and Google Calendar Messaging overview Google Apps Premier Edition messaging tools include email, calendar and instant messaging solutions that help employees communicate and stay connected, wherever and whenever they work. These web-based services can be securely accessed from any browser, work on mobile devices like BlackBerry and iPhone, and integrate with other popular email systems like Microsoft Outlook, Apple Mail, and more. What’s more, Google Apps’ SAML-based Single Sign-On (SSO) capability integrates seamlessly with existing enterprise security and authentication services. Google Apps deliver productivity and reduce IT workload with a hosted, 99.9% uptime solution that gets teams working together fast. Gmail Get control of spam Advanced filters keep spam from employees’ inboxes so they can focus on messages that matter, and IT admins can focus on other initiatives. Keep all your email 25 GB of storage per user means that inbox quotas and deletion schedules are a thing of the past. Integrated instant messaging Connect with contacts instantly without launching a separate application or leaving your inbox. No software required. Built-in voice and video chat Voice and video conversations, integrated into Gmail, make it easy to connect face-to-face with co-workers around the world. Find messages instantly Powerful Google search technology is built into Gmail, turning your inbox into your own private and secure Google search engine for email. Protect and secure sensitive information Additional spam filtering from Postini provides employees with an additional layer of protection and policy-enforced encryption between domains using standard TLS protocols.
    [Show full text]
  • The Google File System (GFS)
    The Google File System (GFS), as described by Ghemwat, Gobioff, and Leung in 2003, provided the architecture for scalable, fault-tolerant data management within the context of Google. These architectural choices, however, resulted in sub-optimal performance in regard to data trustworthiness (security) and simplicity. Additionally, the application- specific nature of GFS limits the general scalability of the system outside of the specific design considerations within the context of Google. SYSTEM DESIGN: The authors enumerate their specific considerations as: (1) commodity components with high expectation of failure, (2) a system optimized to handle relatively large files, particularly multi-GB files, (3) most writes to the system are concurrent append operations, rather than internally modifying the extant files, and (4) a high rate of sustained bandwidth (Section 1, 2.1). Utilizing these considerations, this paper analyzes the success of GFS’s design in achieving a fault-tolerant, scalable system while also considering the faults of the system with regards to data-trustworthiness and simplicity. Data-trustworthiness: In designing the GFS system, the authors made the conscious decision not prioritize data trustworthiness by allowing applications to access ‘stale’, or not up-to-date, data. In particular, although the system does inform applications of the chunk-server version number, the designers of GFS encouraged user applications to cache chunkserver information, allowing stale data accesses (Section 2.7.2, 4.5). Although possibly troubling
    [Show full text]
  • A Review on GOOGLE File System
    International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 4, Jul - Aug 2016 RESEARCH ARTICLE OPEN ACCESS A Review on Google File System Richa Pandey [1], S.P Sah [2] Department of Computer Science Graphic Era Hill University Uttarakhand – India ABSTRACT Google is an American multinational technology company specializing in Internet-related services and products. A Google file system help in managing the large amount of data which is spread in various databases. A good Google file system is that which have the capability to handle the fault, the replication of data, make the data efficient, memory storage. The large data which is big data must be in the form that it can be managed easily. Many applications like Gmail, Facebook etc. have the file systems which organize the data in relevant format. In conclusion the paper introduces new approaches in distributed file system like spreading file’s data across storage, single master and appends writes etc. Keywords:- GFS, NFS, AFS, HDFS I. INTRODUCTION III. KEY IDEAS The Google file system is designed in such a way that 3.1. Design and Architecture: GFS cluster consist the data which is spread in database must be saved in of single master and multiple chunk servers used by a arrange manner. multiple clients. Since files to be stored in GFS are The arrangement of data is in the way that it can large, processing and transferring such huge files can reduce the overhead load on the server, the consume a lot of bandwidth. To efficiently utilize availability must be increased, throughput should be bandwidth files are divided into large 64 MB size highly aggregated and much more services to make chunks which are identified by unique 64-bit chunk the available data more accurate and reliable.
    [Show full text]
  • EPIC Google FTC Complaint
    Before the Federal Trade Commission Washington, DC 20580 In the Matter of ) ) Google, Inc. and ) Cloud Computing Services ) ________________________________ ) Complaint and Request for Injunction, Request for Investigation and for Other Relief SUMMARY OF COMPLAINT 1. This complaint concerns privacy and security risks associated with the provision of “Cloud Computing Services” by Google, Inc. to American consumers, businesses, and federal agencies of the United States government. Recent reports indicate that Google does not adequately safeguard the confidential information that it obtains. Given the previous opinions of the Federal Trade Commission regarding the obligation of service providers to ensure security, EPIC hereby petitions the Federal Trade Commission to open an investigation into Google’s Cloud Computing Services, to determine the adequacy of the privacy and security safeguards, to assess the representations made by the firm regarding these services, to determine whether the firm has engaged in unfair and/or deceptive trade practices, and to take any such measures as are necessary, including to enjoin Google from offering such services until safeguards are verifiably established. Such action by the Commission is necessary to ensure the safety and security of information submitted to Google by American consumers, American businesses, and American federal agencies. PARTIES 1. The Electronic Privacy Information Center (“EPIC”) is a public interest research organization incorporated in Washington, DC. EPIC’s activities include the review of government and private sector policies and practices to determine their impact on the privacy interests of the American public. Among its other activities, EPIC initiated the complaint to the FTC regarding Microsoft Passport in which the Commission subsequently required Microsoft to implement a comprehensive information security program for 1 Passport and similar services.1 EPIC also filed the complaint with the Commission regarding databroker ChoicePoint, Inc.
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • F1 Query: Declarative Querying at Scale
    F1 Query: Declarative Querying at Scale Bart Samwel John Cieslewicz Ben Handy Jason Govig Petros Venetis Chanjun Yang Keith Peters Jeff Shute Daniel Tenedorio Himani Apte Felix Weigel David Wilhite Jiacheng Yang Jun Xu Jiexing Li Zhan Yuan Craig Chasseur Qiang Zeng Ian Rae Anurag Biyani Andrew Harn Yang Xia Andrey Gubichev Amr El-Helw Orri Erling Zhepeng Yan Mohan Yang Yiqun Wei Thanh Do Colin Zheng Goetz Graefe Somayeh Sardashti Ahmed M. Aly Divy Agrawal Ashish Gupta Shiv Venkataraman Google LLC [email protected] ABSTRACT 1. INTRODUCTION F1 Query is a stand-alone, federated query processing platform The data processing and analysis use cases in large organiza- that executes SQL queries against data stored in different file- tions like Google exhibit diverse requirements in data sizes, la- based formats as well as different storage systems at Google (e.g., tency, data sources and sinks, freshness, and the need for custom Bigtable, Spanner, Google Spreadsheets, etc.). F1 Query elimi- business logic. As a result, many data processing systems focus on nates the need to maintain the traditional distinction between dif- a particular slice of this requirements space, for instance on either ferent types of data processing workloads by simultaneously sup- transactional-style queries, medium-sized OLAP queries, or huge porting: (i) OLTP-style point queries that affect only a few records; Extract-Transform-Load (ETL) pipelines. Some systems are highly (ii) low-latency OLAP querying of large amounts of data; and (iii) extensible, while others are not. Some systems function mostly as a large ETL pipelines. F1 Query has also significantly reduced the closed silo, while others can easily pull in data from other sources.
    [Show full text]
  • A Study of Cryptographic File Systems in Userspace
    Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021), 4507-4513 Research Article A study of cryptographic file systems in userspace a b c d e f Sahil Naphade , Ajinkya Kulkarni Yash Kulkarni , Yash Patil , Kaushik Lathiya , Sachin Pande a Department of Information Technology PICT, Pune, India [email protected] b Department of Information Technology PICT, Pune, India [email protected] c Department of Information Technology PICT, Pune, India [email protected] d Department of Information Technology PICT, Pune, India [email protected] e Veritas Technologies Pune, India, [email protected] f Department of Information Technology PICT, Pune, India [email protected] Article History: Received: 10 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published online: 28 April 2021 Abstract: With the advancements in technology and digitization, the data storage needs are expanding; along with the data breaches which can expose sensitive data to the world. Thus, the security of the stored data is extremely important. Conventionally, there are two methods of storage of the data, the first being hiding the data and the second being encryption of the data. However, finding out hidden data is simple, and thus, is very unreliable. The second method, which is encryption, allows for accessing the data by only the person who encrypted the data using his passkey, thus allowing for higher security. Typically, a file system is implemented in the kernel of the operating systems. However, with an increase in the complexity of the traditional file systems like ext3 and ext4, the ones that are based in the userspace of the OS are now allowing for additional features on top of them, such as encryption-decryption and compression.
    [Show full text]
  • Overtaking Google Desktop Leveraging XSS to Raise Havoc
    Overtaking Google Desktop Leveraging XSS to Raise Havoc Yair Amit Senior Security Researcher, Watchfire [email protected] 6th OWASP +972-9-9586077 ext 4039 AppSec Conference Copyright © 2007 - The OWASP Foundation Milan - May 2007 Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit http://creativecommons.org/licenses/by-sa/2.5/ The OWASP Foundation http://www.owasp.org / Presentation Outline Background Google Desktop Overview Overtaking Google Desktop – Step by Step Impact What harm can a malicious attacker do? Attack characteristics Lessons learned Q&A 6th OWASP AppSec Conference – Milan – May 2007 2 Background XSS The most widespread web-application vulnerability WASC Web Application Security Statistics Project (http://www.webappsec.org/projects/statistics/ ) Used to be perceived as an identity theft attack XSS has so much more to offer. It has teeth! Change settings and steal data from attacked victim account Web worms (Samy) What we are about to see… Stealth attack Sensitive information theft from the local computer Command execution 6th OWASP AppSec Conference – Milan – May 2007 3 Google Desktop - Overview Purpose: provide an easily to use and powerful search capability on local and other personal content Some traits: Runs a local web-server for interaction (port 4664) Google.com like interface Uses a service to run the indexing User interface is almost purely web Preferences control what to index, and indexing can be broad Office documents, media files, web history cache, chat sessions, etc. Easily extendible Special integration with Google.com 6th OWASP AppSec Conference – Milan – May 2007 4 Google Desktop Security Mechanisms Web server only accessible from localhost Not available from network 6th OWASP AppSec Conference – Milan – May 2007 5 Google Desktop Protection Mechanism (cont.) The main threats are XSS and XSRF attacks.
    [Show full text]
  • Google Pagerank and Markov Chains
    COMP4121 Lecture Notes The PageRank, Markov chains and the Perron Frobenius theory LiC: Aleks Ignjatovic [email protected] THE UNIVERSITY OF NEW SOUTH WALES School of Computer Science and Engineering The University of New South Wales Sydney 2052, Australia Topic One: the PageRank Please read Chapter 3 of the textbook Networked Life, entitled \How does Google rank webpages?"; other references on the material covered are listed at the end of these lecture notes. 1 Problem: ordering webpages according to their importance Setup: Consider all the webpages on the entire WWW (\World Wide Web") as a directed graph whose nodes are the web pages fPi : Pi 2 WWW g, with a directed edge Pi ! Pj just in case page Pi points to page Pj, i.e. page Pi has a link to page Pj. Problem: Rank all the webpages of the WWW according to their \importance".1 Intuitively, one might feel that if many pages point to a page P0, then P0 should have a high rank, because if one includes on their webpage a link to page P0, then this can be seen as their recommendation of P0. However, this is not a good criterion for several reasons. For example, it can be easily manipulated to increase the rating of any webpage P0, simply by creating a lot of silly web pages which just point to P0; also, if a webpage \generously" points to a very large number of webpages, such \easy to get" recommendation is of dubious value. Thus, we need to refine our strategy how to rank webpages according to their \importance", by doing something which cannot be easily manipulated \locally" (i.e., by any group of people who might collude, even if such a group is sizeable).
    [Show full text]
  • Requirements for Using Hangouts Meet
    Requirements for using Hangouts Meet • Hangouts Meet access requirements • Video meeting requirements Hangouts Meet access requirements • A G Suite administrator needs to turn on Meet for your organization. If you cannot open Meet, contact your admin for help. • To create a video meeting, you need to be signed in to a G Suite account. • To join a video meeting, you need the Meet mobile app or a supported web browser. You do not need a G Suite account. For details, see Supported web browsers. • Anyone inside or outside of your organization can join by selecting the link or entering the meeting ID. Uninvited guests outside of your organization must be approved by a meeting participant in your organization, including users who aren’t signed in to a G Suite account. Video meeting requirements Before you start a video meeting, be sure you're using equipment that supports Hangouts Meet. Open all | Close all Use a supported operating system Meet supports the current version and the 2 previous major releases of these operating systems: • Apple® macOS® • Microsoft® Windows® • Chrome OS • Ubuntu® and other Debian-based Linux® distributions Use a supported web browser Meet works with the current version of the browsers listed below: • Chrome Browser. Download the latest version • Mozilla® Firefox®. Download the latest version • Microsoft® Edge®. Download the latest version • Apple® Safari®. Meet has limited support in Microsoft Internet Explorer® 11, Microsoft Edge provides a better Meet experience. If you want to use Internet Explorer for Hangouts, you need to install a plugin for Meet. Download and install the latest version of the Google Video Support plugin.
    [Show full text]
  • In the Common Pleas Court Delaware County, Ohio Civil Division
    IN THE COMMON PLEAS COURT DELAWARE COUNTY, OHIO CIVIL DIVISION STATE OF OHIO ex rel. DAVE YOST, OHIO ATTORNEY GENERAL, Case No. 21 CV H________________ 30 East Broad St. Columbus, OH 43215 Plaintiff, JUDGE ___________________ v. GOOGLE LLC 1600 Amphitheatre Parkway COMPLAINT FOR Mountain View, CA 94043 DECLARATORY JUDGMENT AND INJUNCTIVE RELIEF Also Serve: Google LLC c/o Corporation Service Co. 50 W. Broad St., Ste. 1330 Columbus OH 43215 Defendant. Plaintiff, the State of Ohio, by and through its Attorney General, Dave Yost, (hereinafter “Ohio” or “the State”), upon personal knowledge as to its own acts and beliefs, and upon information and belief as to all matters based upon the investigation by counsel, brings this action seeking declaratory and injunctive relief against Google LLC (“Google” or “Defendant”), alleges as follows: I. INTRODUCTION The vast majority of Ohioans use the internet. And nearly all of those who do use Google Search. Google is so ubiquitous that its name has become a verb. A person does not have to sign a contract, buy a specific device, or pay a fee to use Good Search. Google provides its CLERK OF COURTS - DELAWARE COUNTY, OH - COMMON PLEAS COURT 21 CV H 06 0274 - SCHUCK, JAMES P. FILED: 06/08/2021 09:05 AM search services indiscriminately to the public. To use Google Search, all you have to do is type, click and wait. Primarily, users seek “organic search results”, which, per Google’s website, “[a] free listing in Google Search that appears because it's relevant to someone’s search terms.” In lieu of charging a fee, Google collects user data, which it monetizes in various ways—primarily via selling targeted advertisements.
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]