Data Localization Laws and Policy the EU Data Protection International Transfers Restriction Through a Cloud Computing Lens W. K

Total Page:16

File Type:pdf, Size:1020Kb

Data Localization Laws and Policy the EU Data Protection International Transfers Restriction Through a Cloud Computing Lens W. K Data Localization Laws and Policy The EU Data Protection International Transfers Restriction Through a Cloud Computing Lens W. Kuan Hon, kuan0.com http://www.e-elgar.com/shop/data-localization-laws-policy http://www.e-elgar.com/data-localization-laws-and-policy- companion-site References As at 1 May 2017 1 451 Research, 2014. Hosting and Cloud Study 2014: Hosting and Cloud Go Mainstream – Survey Results. Available at: https://news.microsoft.com/download/presskits/cloud/docs/HostingStudy2014.pdf [accessed 26 October 2016]. Abelson, H. et al., 2015. Keys under doormats: mandating insecurity by requiring government access to all data and communications. DSpace@MIT. Available at: http://dspace.mit.edu/handle/1721.1/97690 [accessed 26 October 2016]. ACCA, 2012. Asia Cloud Computing Association, Cloud Readiness Index. Available at: http://www.asiacloudcomputing.org/images/stories/contents/files/CRI_2012.pdf [accessed 26 October 2016]. ACCA, 2014. Asia Cloud Computing Association, The Impact of Data Sovereignty on Cloud Computing in Asia. Available at: http://www.asiacloudcomputing.org/images/research/ACCA- DS2013_FULL.REPORT.pdf [accessed 26 October 2016]. AEPD, 2013. Agencia Española de Protección de Datos, Guía para clientes que contraten servicios de Cloud Computing. Available at: http://www.agpd.es/portalwebAGPD/canaldocumentacion/publicaciones/common/Guias/GUIA _Cloud.pdf [accessed 26 October 2016]. Ahmed, M. and Waters, R., 2015. Microsoft unveils German data plan to tackle US internet spying. Financial Times. Available at: https://www.ft.com/content/540a296e-87ff-11e5-9f8c- a8d619fa707c [accessed 26 October 2016]. Air Berlin, 2011. Comments on the European Commission’s Communication on a Comprehensive Approach on Data Protection in the European Union (Brussels, 4.11.2010 – COM(2010) 609 final). Available at: http://ec.europa.eu/justice/news/consulting_public/0006/contributions/organisations/air_berlin _en.pdf [accessed 26 October 2016]. Alcatel-Lucent, 2009. The European Commission’s Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data. Available at: http://ec.europa.eu/justice/news/consulting_public/0003/contributions/organisations_not_regis tered/alcatel_lucent_en.pdf#10 [accessed 26 October 2016]. Allen & Overy, 2013. Binding Corporate Rules. Available at: http://www.allenovery.com/sitecollectiondocuments/bcrs.pdf [accessed 26 October 2016]. AmCham, 2010. AmCham EU Response to the Commission Consultation on Protection of Personal Data. Available at: http://ec.europa.eu/justice/news/consulting_public/0003/contributions/organisations/american _chamber_commerce_to_eu_en.pdf [accessed 26 October 2016]. AmCham EU, 2016. Adoption of the EU-US Privacy Shield Restores Trust to Transatlantic Data Flows. Available at: http://www.amchameu.eu/sites/default/files/press_releases/press_- _adoption_of_the_eu- us_privacy_shield_restores_trust_to_transatlantic_data_flows.pdf?platform=hootsuite [accessed 26 October 2016]. Anderson, R., 2005. The crypto wars are over! Computer and Telecommunications Law Review, 11(6), pp.183–4. Anderson, R.J., 2008. Security Engineering: A Guide to Building Dependable Distributed Systems 2nd edition. Tokyo, New York: John Wiley & Sons. 2 Angulo, J. et al., 2013. D37.1 General HCI principles and guidelines. A4Cloud. Available at: http://www.a4cloud.eu/sites/default/files/D37.1%20General%20HCI%20principles%20and%2 0guidelines.pdf [accessed 26 October 2016]. Anon, 2015. TISA Annex on Electronic Commerce. Available at: https://wikileaks.org/tisa/document/20151001_Annex-on-Electronic- Commerce/20151001_Annex-on-Electronic-Commerce.pdf [accessed 26 October 2016]. ANSI/TIA, 2005. American National Standards Institute/Telecommunications Industry Association, Telecommunications Infrastructure Standard for Data Centers ANSI/TIA-942-2005. Available at: https://global.ihs.com/doc_detail.cfm?&rid=TIA&input_doc_number=942&item_s_key=004148 11&item_key_date=860905&input_doc_number=942&input_doc_title=&org_code=TIA [accessed 26 October 2016]. AP, 2005. Associated Press, New Nuclear Sub Is Said to Have Special Eavesdropping Ability. Available at: http://www.nytimes.com/2005/02/20/politics/20submarine.html [accessed 26 October 2016]. AP, 2013. Associated Press, Snowden Says US Targets Included China Cell Phones. Available at: http://www.scmp.com/news/hong-kong/article/1267265/snowden-says-us-targets-included- china-cell-phones [accessed 26 October 2016]. AP, 2014a. Associated Press, Brazil: Google Fined in Petrobras Probe. Available at: http://news.yahoo.com/brazil-google-fined-petrobras-probe-183507202.html [accessed 26 October 2016]. AP, 2014b. Associated Press, Microsoft Corporation Loses Ruling by New York Judge on Ireland Emails. Available at: http://www.cbsnews.com/news/microsoft-corporation-loses-ruling-by- new-york-judge-on-ireland-emails/ [accessed 26 October 2016]. APEC, n.d. APEC Cross-Border Privacy Enforcement Arrangement (CPEA). Available at: http://www.apec.org/Groups/Committee-on-Trade-and-Investment/Electronic-Commerce- Steering-Group/Cross-border-Privacy-Enforcement-Arrangement.aspx [accessed 26 October 2016]. APEC, 2005. APEC Privacy Framework. Available at: http://www.apec.org/Groups/Committee-on- Trade-and-Investment/~/media/Files/Groups/ECSG/05_ecsg_privacyframewk.ashx [accessed 26 October 2016]. APEC, 2009. APEC Cooperation Arrangement for Cross-Border Privacy Enforcement. Available at: http://www.apec.org/~/media/Files/Groups/ECSG/CBPR/CBPR- CrossBorderPrivacyEnforcement.pdf [accessed 26 October 2016]. APEC, 2011. APEC Cross-Border Privacy Rules System: Policies, Rules and Guidelines. Available at: http://www.apec.org/groups/committee-on-trade-and- investment/~/media/files/groups/ecsg/cbpr/cbpr-policiesrulesguidelines.ashx [accessed 26 October 2016]. Appelbaum, J., Horchert, J. and Stöcker, C., 2013. Catalog reveals NSA has back doors for numerous devices. Spiegel Online. Available at: http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous- devices-a-940994.html [accessed 26 October 2016]. Arbeit der DSB, 2016. Zur Ungültigerklärung der Safe Harbor-Entscheidung der Europäischen Kommission durch den EuGH: Österreichische Datenschutzbehörde. Available at: http://web.archive.org/web/20160508033524/https://www.dsb.gv.at/site/6218/default.aspx [accessed 26 October 2016]. 3 Archer, Q., Maxwell, W. and Wolf, C., 2012. A global reality: government access to data in the cloud – a comparative analysis of ten international jurisdictions. Chronicle of Data Protection. Available at: http://www.hldataprotection.com/uploads/file/Revised%20Government%20Access%20to%20 Cloud%20Data%20Paper%20(18%20July%2012).pdf [accessed 26 October 2016]. Archer, Q., Maxwell, W. and Wolf, C., 2013. A global reality: governmental access to data in the cloud. SCL. Available at: http://www.scl.org/site.aspx?i=ed32952 [accessed 26 October 2016]. Austrian Bar, 2009. Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data. Available at: http://ec.europa.eu/justice/news/consulting_public/0003/contributions/public_authorities/austri an_bar_en.pdf [accessed 26 October 2016]. Autoriteit Persoonsgegevens (formerly CBP), 2012. Written Opinion on the Application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the Case of a Contract for Cloud Computing Services from an American Provider. Unofficial translation. Available at: https://autoriteitpersoonsgegevens.nl/sites/default/files/atoms/files/dutch-dpa-written-opinion- cloud-computing-unofficial-translation.pdf [accessed 26 October 2016]. AWS, 2014a. Amazon Web Services: Overview of Security Processes. Available at: https://d0.awsstatic.com/whitepapers/Security/AWS%20Security%20Whitepaper.pdf [accessed 26 October 2016]. AWS, 2014b. Announcing the AWS EU (Frankfurt) Region. Available at: http://aws.amazon.com/about-aws/whats-new/2014/10/23/announcing-the-aws-eu-frankfurt- region/ [accessed 26 October 2016]. AWS, 2015. AWS Customer Agreement. Available at: http://aws.amazon.com/agreement/ [accessed 26 October 2016]. AWS, 2016. AWS Customer Agreement. Available at: http://aws.amazon.com/agreement/ [accessed 26 October 2016]. Ax, J., 2014. RPT-UPDATE 2-U.S. judge orders Microsoft to submit customer’s emails from abroad. Reuters. Available at: http://www.reuters.com/article/2014/07/31/usa-tech-warrants- idUSL2N0Q61WN20140731 [accessed 26 October 2016]. Axciom, 2009. Response to the European Commission Consultation on European Data Protection Legal Framework. Available at: http://ec.europa.eu/justice/news/consulting_public/0003/contributions/organisations/acxiom_e n.pdf [accessed 26 October 2016]. Babcock, C., 2015. VMware shows off new live migration: OpenStack options. InformationWeek. Available at: http://www.informationweek.com/cloud/infrastructure-as-a-service/vmware- shows-off-new-live-migration-openstack-options/d/d-id/1318890 [accessed 26 October 2016]. Baesman, R., 2015. Building the best place to get work done. Dropbox for Business Blog. Available at: https://blogs.dropbox.com/business/2015/06/dropbox-for-business-updates/ [accessed 26 October 2016]. Baker, J., 2016a. Privacy Shield approved by EU member states, but 4 nations abstain. Ars Technica UK. Available at: http://arstechnica.co.uk/tech-policy/2016/07/privacy-shield-approved-eu- member-states-4-nations-abstain/ [accessed 26 October 2016]. Baker, J., 2016b. Catching up with Max Schrems. IAPP. Available at: https://iapp.org/news/a/catching-up-with-max-schrems/ [accessed 17 February 2017]. 4 Baker,
Recommended publications
  • Google Cloud Issue Summary Multiple Products - 2020-08-19 All Dates/Times Relative to US/Pacific
    Google Cloud Issue Summary Multiple Products - 2020-08-19 All dates/times relative to US/Pacific Starting on August 19, 2020, from 20:55 to 03:30, multiple G Suite and Google Cloud Platform products experienced errors, unavailability, and delivery delays. Most of these issues involved creating, uploading, copying, or delivering content. The total incident duration was 6 hours and 35 minutes, though the impact period differed between products, and impact was mitigated earlier for most users and services. We understand that this issue has impacted our valued customers and users, and we apologize to those who were affected. DETAILED DESCRIPTION OF IMPACT Starting on August 19, 2020, from 20:55 to 03:30, Google Cloud services exhibited the following issues: ● Gmail: The Gmail service was unavailable for some users, and email delivery was delayed. About ​ 0.73% of Gmail users (both consumer and G Suite) active within the preceding seven days experienced 3 or more availability errors during the outage period. G Suite customers accounted for 27% of affected Gmail users. Additionally, some users experienced errors when adding attachments to messages. Impact on Gmail was mitigated by 03:30, and all messages delayed by this incident have been delivered. ● Drive: Some Google Drive users experienced errors and elevated latency. Approximately 1.5% of Drive ​ users (both consumer and G Suite) active within the preceding 24 hours experienced 3 or more errors during the outage period. ● Docs and Editors: Some Google Docs users experienced issues with image creation actions (for ​ example, uploading an image, copying a document with an image, or using a template with images).
    [Show full text]
  • System and Organization Controls (SOC) 3 Report Over the Google Cloud Platform System Relevant to Security, Availability, and Confidentiality
    System and Organization Controls (SOC) 3 Report over the Google Cloud Platform System Relevant to Security, Availability, and Confidentiality For the Period 1 May 2020 to 30 April 2021 Google LLC 1600 Amphitheatre Parkway Mountain View, CA, 94043 650 253-0000 main Google.com Management’s Report of Its Assertions on the Effectiveness of Its Controls Over the Google Cloud Platform System Based on the Trust Services Criteria for Security, Availability, and Confidentiality We, as management of Google LLC ("Google" or "the Company") are responsible for: • Identifying the Google Cloud Platform System (System) and describing the boundaries of the System, which are presented in Attachment A • Identifying our service commitments and system requirements • Identifying the risks that would threaten the achievement of its service commitments and system requirements that are the objectives of our System, which are presented in Attachment B • Identifying, designing, implementing, operating, and monitoring effective controls over the Google Cloud Platform System (System) to mitigate risks that threaten the achievement of the service commitments and system requirements • Selecting the trust services categories that are the basis of our assertion We assert that the controls over the System were effective throughout the period 1 May 2020 to 30 April 2021, to provide reasonable assurance that the service commitments and system requirements were achieved based on the criteria relevant to security, availability, and confidentiality set forth in the AICPA’s
    [Show full text]
  • Cloudpools and Google Cloud Architectural Overview, Considerations, and Best Practices
    Technical White Paper Dell EMC PowerScale: CloudPools and Google Cloud Architectural overview, considerations, and best practices Abstract This white paper provides an overview of Dell EMC™ PowerScale™ CloudPools software in OneFS™ 9.1.0.0. It describes its policy-based capabilities that can reduce storage costs and optimize storage by automatically moving infrequently accessed data to Google Cloud. April 2021 H17993.3 Revisions Revisions Date Description October 2019 Initial release June 2020 Updated best practices October 2020 Updated CloudPools operations April 2021 Updated best practices Acknowledgments Author: Jason He ([email protected]) Dell EMC and the authors of this document welcome your feedback on this white paper. This document may contain certain words that are not consistent with Dell's current language guidelines. Dell plans to update the document over subsequent future releases to revise these words accordingly. This document may contain language from third party content that is not under Dell's control and is not consistent with Dell's current guidelines for Dell's own content. When such third party content is updated by the relevant third parties, this document will be revised accordingly. The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2019 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc.
    [Show full text]
  • Economic and Social Impacts of Google Cloud September 2018 Economic and Social Impacts of Google Cloud |
    Economic and social impacts of Google Cloud September 2018 Economic and social impacts of Google Cloud | Contents Executive Summary 03 Introduction 10 Productivity impacts 15 Social and other impacts 29 Barriers to Cloud adoption and use 38 Policy actions to support Cloud adoption 42 Appendix 1. Country Sections 48 Appendix 2. Methodology 105 This final report (the “Final Report”) has been prepared by Deloitte Financial Advisory, S.L.U. (“Deloitte”) for Google in accordance with the contract with them dated 23rd February 2018 (“the Contract”) and on the basis of the scope and limitations set out below. The Final Report has been prepared solely for the purposes of assessment of the economic and social impacts of Google Cloud as set out in the Contract. It should not be used for any other purposes or in any other context, and Deloitte accepts no responsibility for its use in either regard. The Final Report is provided exclusively for Google’s use under the terms of the Contract. No party other than Google is entitled to rely on the Final Report for any purpose whatsoever and Deloitte accepts no responsibility or liability or duty of care to any party other than Google in respect of the Final Report and any of its contents. As set out in the Contract, the scope of our work has been limited by the time, information and explanations made available to us. The information contained in the Final Report has been obtained from Google and third party sources that are clearly referenced in the appropriate sections of the Final Report.
    [Show full text]
  • Frequently Asked Questions for Google Bigquery Connector
    Frequently Asked Questions for Google BigQuery Connector © Copyright Informatica LLC 2017, 2021. Informatica, the Informatica logo, and Informatica Cloud are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https:// www.informatica.com/trademarks.html. Abstract This article describes frequently asked questions about using Google BigQuery Connector to read data from and write data to Google BigQuery. Supported Versions • Cloud Data Integration Table of Contents General Questions............................................................ 2 Performance Tuning Questions................................................... 5 General Questions What is Google Cloud Platform? Google Cloud Platform is a set of public cloud computing services offered by Google. It provides a range of hosted services for compute, storage, and application development that run on Google hardware. Google Cloud Platform services can be accessed by software developers, cloud administrators, and other enterprise IT professionals over the public internet or through a dedicated network connection. Google Cloud Platform provides Google BigQuery to perform data analytics on large datasets. How can I access Google Cloud Platform? You must create a Google service account to access Google Cloud Platform. To create a Google service account, click the following URL: https://cloud.google.com/ What are the permissions required for the Google service
    [Show full text]
  • Google Cloud Security Whitepapers
    1 Google Cloud Security Whitepapers March 2018 Google Cloud Encryption at Rest in Encryption in Transit in Application Layer Infrastructure Security Google Cloud Google Cloud Transport Security Design Overview in Google Cloud 2 Table of Contents Google Cloud Infrastructure Security Design Overview . 3 Encryption at Rest in Google Cloud . 23 Encryption in Transit in Google Cloud . 43 Application Layer Transport Security in Google Cloud . 75 3 A technical whitepaper from Google Cloud 4 Table of Contents Introduction . 7 Secure Low Level Infrastructure . 8 Security of Physical Premises Hardware Design and Provenance Secure Boot Stack and Machine Identity Secure Service Deployment . 9 Service Identity, Integrity, and Isolation Inter-Service Access Management Encryption of Inter-Service Communication Access Management of End User Data Secure Data Storage . 14 Encryption at Rest Deletion of Data Secure Internet Communication . 15 Google Front End Service Denial of Service (DoS) Protection User Authentication Operational Security . 17 Safe Software Development Keeping Employee Devices and Credentials Safe Reducing Insider Risk Intrusion Detection 5 Securing the Google Cloud Platform (GCP) . .. 19 Conclusion . 21 Additional Reading . 22 The content contained herein is correct as of January 2017, and represents the status quo as of the time it was written. Google’s security policies and systems may change going forward, as we continually improve protection for our customers. 6 CIO-level summary • Google has a global scale technical infrastructure designed to provide security through the entire information processing lifecycle at Google. This infrastructure provides secure deployment of services, secure storage of data with end user privacy safeguards, secure communications between services, secure and private communication with customers over the internet, and safe operation by administrators.
    [Show full text]
  • Chromebook Basics for Parents
    CHROMEBOOK BASICS FOR PARENTS What is a Chromebook? A Chromebook is different from a traditional laptop. Chromebooks use Google’s operating system, Chrome OS, instead of using the Windows or macOS operating systems. These machines are designed to be used primarily while connected to the Internet, with most applications and documents living in the “cloud.” Files can be downloaded and store on the Chromebook, but storage is minimal (16 GB for Dell and 32 GB for Acer Chromebooks). The Chromebooks have 4 GB of RAM. Manage vs Non-Manage Chromebooks A managed Chromebook is set up and maintained centrally by Why Chromebooks for the school District. Managed Chromebooks have features and Students? restrictions set up by the District. For instance, District 205 has Instant On web filtering enabled and has Wi-Fi Information configured. The District can also push or restrict certain apps or extensions. No Software Updates A non-managed Chromebook is not controlled in any way. It is No Viruses a personal device with no pre-set restrictions. Long Batter Life (9-10 hours) Note: District 205 will “release” the Chromebooks to students Light Weight who leave the District (i.e. graduation) to keep it as a Available Apps non-managed Chromebook. Files stored on the Google Account will be deleted. Integrated with Google tools 125 S. Prospect Avenue, Elmhurst, IL 60126 Start Using Computers, (630) 279-8696 ● elmhurstpubliclibrary.org Tablets, and Internet GETTING STARTED Signing In Just like a normal laptop, once you turn on your Chromebook vs Chrome vs Google Chromebook, it will ask you to sign into an Tools account.
    [Show full text]
  • Google Cloud Platform Fundamentals: Core Infrastructure
    Maslak Mahallesi, Maslak Meydan Sk. No:5. Spring Giz Plaza. Maslak/İstanbul +90 212 282 7700 - [email protected] Google Cloud Platform Fundamentals: Core Infrastructure Learn via: Classroom / Virtual Classroom / Online Duration: 1 Day https://bilginc.com/en/training/80/google-cloud-platform-fundamentals-core-infrastructure-training Overview This one-day instructor-led class provides an overview of Google Cloud Platform products and services. Through a combination of presentations, demos, and hands-on labs, participants learn the value of Google Cloud Platform and how to incorporate cloud-based solutions into business strategies. Prerequisites Familiarity with application development, systems operations, Linux operating systems, and data analytics/machine learning is helpful in understanding the technologies covered. Who Should Attend This class is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Platform. Developers, systems operations professionals, and solution architects getting started with Google Cloud Platform. Executives and business decision makers evaluating the potential of Google Cloud Platform to address their business needs. What You Will Learn Identify the purpose and value of Google Cloud Platform products and services Interact with Google Cloud Platform services Describe ways in which customers have used Google Cloud Platform Choose among and use application deployment environments on Google Cloud Platform: Google App Engine, Google
    [Show full text]
  • St. John-Hudson High School Chromebook Policy, Procedures, and Information 2021-2022
    St. John-Hudson High School Chromebook Policy, Procedures, and Information 2021-2022 INTRODUCTION: In the spring of 2016, the Board of Education supported purchasing Chromebooks for all students in grades 7-12 at St. John-Hudson High School. 1 TABLE OF CONTENTS TOPIC PAGE 1. RECEIVING YOUR Chromebook ............................................................ ................................................... 3 1.1 Receiving Your Chromebook and Chromebook Check-In ......................................................... 3 1.2 Chromebook Check-In ............................................................................................................... 3 1.3 Check-in Fines .......................................................................................................................... 3 2. TAKING CARE OF YOUR Chromebook ....................................................................................................... 3 2.1 General Precautions ................................................................................................................. 3 2.2 Carrying Chromebooks ............................................................................................................. 4 2.3 Screen Care ............................................................................................................................... 4 3. USING YOUR Chromebook AT SCHOOL ................................................................................................... 4 3.1 Chromebooks Left at Home ....................................................................................................
    [Show full text]
  • Google Cloud Storage Documentation
    Google Cloud Storage Documentation YaakovVale remains befell sketchable:his hafnium sheports. posture Cretaceous her epizootic Garth collapse flam too verydazedly? imaginatively Shoreward while and Donnie low-keyed remains Piotr homologous wither almost and contritely, orthographic. though Nextcloud delivers confidentiality, security and compliance. Add cloud storage like Google Dropbox Amazon S3 Sharepoint and top to. Automate policy only executes if set your google cloud for those who the documentation for your infrastructure and. The command lists the contents of old bucket. Snowflake automatically associates the storage integration with support Cloud Storage service account created for good account. Once the document is even click jail button behind the defeat-left that looks like a 3x3 grid. Close need google! Is Google Drive secure Computer Google Drive Help. The next returns the corresponding hive pipeline that provides an existing care systems. Layout preview functionality is cloud. These are neat to slaughter the message ID, in case study success, remove the lyrics if cancer was thrown. Files on google cloud sleuth traces to confirm that hold your deployment. Google Cloud Storage bucket specified in the adapter. If you can google cloud and documents on the documentation for compliance. Metadata cache content so insecure must be read files and documents with the documentation? Needed for cloud storage? Make money do the google cloud gcp support gcs api call: create a document on google cloud storage is canceled or passed when you? The fix below explains how her route events from Airship Real-Time Data Streaming into a Google Cloud Storage bucket Setup Google Cloud Platform.
    [Show full text]
  • Google Compute Engine – Computation in the Cloud
    Google Compute Engine – computation in the cloud Google Compute Engine lets you run large-scale computing workloads on the same infrastructure that runs Google Search, Gmail and Ads. You can launch virtual machines on-demand, manage network connectivity using a simple but ȵH[LEOHQHWZRUNLQJVROXWLRQDQGDFFHVVDYDULHW\RIGDWDVWRUDJHDOWHUQDWLYHV from your virtual machines. Google Compute Engine is in limited preview; please visit cloud.google.com to learn how to sign up. Google Compute Engine provides the following features: Google Compute Engine ȏ Full Virtual Machines Kernel-hosted virtual machines running either Ubuntu or CentOs. Launch 1, 2, 4, or 8 virtual core instances with 3.75GB of memory For more information, visit per virtual core. http://cloud.google.com/compute ȏ Flexible Storage*RRJOH&RPSXWH(QJLQHR΍HUVWKUHHGL΍HUHQWVWRUDJH options to meet your varying needs: ° Ephemeral disk A simple block device that is bound to the lifecycle of the virtual machine (VM). When you stop the VM, the data is lost. All data written to this device is encrypted to maintain strong data privacy. “ Until now, we haven’t had a way to work with ELJGDWDVHWVDVH΍HFWLYHO\DVZLWK*RRJOH ° Persistent disk A replicated, network-connected storage service that is Compute Engine. Having a tool that lets comparable to the latency and performance of local disks. Data written to UHVHDUFKHUVJHWDQVZHUVIDVWZLOOKDYHD this device is replicated to multiple physical disks in a Google data center. PDMRULPSDFWRQRXUZRUNȋ You can also create snapshots of your disks for backup/restore purposes, ȃ,O\D6KPXOHYLFKDVVRFLDWHSURIHVVRU DWWKH,QVWLWXWHIRU6\VWHPV%LRORJ\DQGD and can mount these devices in a mode that allows multiple virtual OHDGLQYHVWLJDWRUIRU7KH&DQFHU*HQRPH machines to read from a single device.
    [Show full text]
  • Vantage User's Guide
    Vantage User Guide 8.0 UP4 User Guide March 2021 306221 2 Copyrights and Trademark Notices Copyrights and Trademark Notices Copyright © 2021 Telestream, LLC and its Affiliates. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, altered, or translated into any languages without written permission of Telestream, LLC. Information and specifications in this document are subject to change without notice and do not represent a commitment on the part of Telestream. Specifications subject to change without notice. Telestream, CaptionMaker, Cerify, Episode, Flip4Mac, FlipFactory, Flip Player, Gameshow, GraphicsFactory, Lightspeed, MetaFlip, Post Producer, Prism, ScreenFlow, Split-and-Stitch, Switch, Tempo, TrafficManager, Vantage, VOD Producer, and Wirecast are registered trademarks and Aurora, Cricket, e-Captioning, Inspector, iQ, iVMS, iVMS ASM, MacCaption, Pipeline, Sentry, Surveyor, Vantage Cloud Port, CaptureVU, Cerify, FlexVU, Prism, Sentry, Stay Genlock, Aurora, and Vidchecker are trademarks of Telestream, LLC and its Affiliates. All other brand, product, and company names are the property of their respective owners and are used only for identification purposes. Adobe. Adobe® HTTP Dynamic Streaming Copyright © 2014 of Adobe Systems All rights reserved. Apple. QuickTime, MacOS X, and Safari are trademarks of Apple, Inc. Bonjour, the Bonjour logo, and the Bonjour symbol are trademarks of Apple, Inc. Avid. Portions of this product Copyright 2012 Avid Technology, Inc. Dolby. Dolby and the double-D symbol are registered trademarks of Dolby Laboratories. Fraunhofer IIS and Thomson Multimedia. MPEG Layer-3 audio coding technology licensed from Fraunhofer IIS and Thomson Multimedia. Google. VP6 and VP8 Copyright Google Inc. 2014 All rights Reserved. MainConcept. MainConcept is a registered trademark of MainConcept LLC and MainConcept AG.
    [Show full text]