CLI Reference for Oracle Cloud Infrastructure Compute Classic

Total Page:16

File Type:pdf, Size:1020Kb

CLI Reference for Oracle Cloud Infrastructure Compute Classic Oracle® Cloud CLI Reference for Oracle Cloud Infrastructure Compute Classic E79010-09 May 2020 Oracle Cloud CLI Reference for Oracle Cloud Infrastructure Compute Classic, E79010-09 Copyright © 2017, 2020, Oracle and/or its affiliates. Primary Author: Sylaja Kannan Contributors: Kumar Dhanagopal, Anamika Mukherjee, Jeff Welsch, Patrick O’Brien, Andre Scholtz, Varsha Patil, Ponrajkumar Seenivasan, Sandeep Ramesh Kalekar, Yasha Jadwani This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or “commercial computer software documentation” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms governing the U.S. Government’s use of Oracle cloud services are defined by the applicable contract for such services. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents Preface Audience xiii Related Resources xiii Conventions xiii Part I Getting Started with Compute Classic CLI 1 Preparing to Use the CLI Before You Begin with Compute Classic 1-1 System Requirements and Supported Platforms 1-2 Installing the CLI 1-2 Quick Start 1-3 2 General Syntax of opc compute Commands Global Options 2-1 Service Options 2-5 General CLI Command Actions 2-6 Accessing Context-Sensitive Help at the Command Line 2-6 3 Environment Variables and Profile Files About Environment Variables 3-1 Setting Up Environment Variables and Files 3-3 4 Workflows for Typical Use Cases Adding a Machine Image 4-1 Creating Instances Using an Orchestration 4-2 Deleting and Re-creating Instances 4-3 Cloning an Instance 4-4 iii Setting Up Firewalls Around Instances 4-5 Opening Ports on Instances 4-5 Identifying the Security Rules Applicable to an Instance 4-6 Assigning a Fixed Public IP Address to an Instance 4-7 Finding Out the Public IP Address of an Instance 4-7 Removing the Public IP Address of an Instance 4-8 Providing Block Storage Capacity for an Instance 4-10 Increasing the Size of a Storage Volume 4-10 Part II Command Line Reference 5 Account account list 5-1 account discover 5-2 account get 5-2 6 Access Control List (ACL) acl add 6-1 acl list 6-2 acl get 6-3 acl update 6-3 acl delete 6-4 7 Authentication authentication add 7-1 refresh-token get 7-4 8 Backup backup add 8-1 backup list 8-2 backup get 8-3 backup delete 8-4 9 Backup Configuration backup-configuration add 9-1 backup-configuration list 9-3 iv backup-configuration get 9-5 backup-configuration update 9-6 backup-configuration delete 9-7 10 Image List image-list add 10-1 image-list list 10-2 image-list discover 10-3 image-list get 10-3 image-list update 10-4 image-list delete 10-5 11 Image List Entry image-list-entry add 11-1 image-list-entry get 11-2 image-list-entry delete 11-3 12 Instance Console instance-console get 12-1 13 Instance instance list 13-1 instance discover 13-2 instance get 13-2 instance update 13-3 instance delete 13-6 14 Instance Snapshot snapshot add 14-1 snapshot get 14-3 snapshot list 14-3 snapshot discover 14-4 snapshot delete 14-5 v 15 IP Address Association Used in IP Network ip-address-association add 15-1 ip-address-association list 15-2 ip-address-association get 15-2 ip-address-association update 15-3 ip-address-association delete 15-4 16 IP Address Prefix Set ip-address-prefix-set add 16-1 ip-address-prefix-set get 16-2 ip-address-prefix-set update 16-2 ip-address-prefix-set delete 16-3 ip-address-prefix-set list 16-3 17 IP Address Reservation for IP Network ip-address-reservation add 17-1 ip-address-reservation list 17-2 ip-address-reservation get 17-3 ip-address-reservation update 17-3 ip-address-reservation delete 17-4 18 IP Association ip-association add 18-1 ip-association list 18-2 ip-association discover 18-3 ip-association get 18-4 ip-association delete 18-5 19 IP Network ip-network add 19-1 ip-network list 19-2 ip-network get 19-2 ip-network update 19-3 ip-network delete 19-4 vi 20 IP Network Exchange ip-network-exchange add 20-1 ip-network-exchange list 20-2 ip-network-exchange get 20-2 ip-network-exchange delete 20-3 21 IP Reservation ip-reservation add 21-1 ip-reservation list 21-2 ip-reservation discover 21-2 ip-reservation get 21-3 ip-reservation update 21-4 ip-reservation delete 21-5 22 Launch Plan launch-plan add 22-1 23 Machine Image machine-image add 23-1 machine-image list 23-2 machine-image discover 23-3 machine-image get 23-3 machine-image delete 23-4 24 Orchestration orchestration add 24-1 orchestration list 24-6 orchestration discover 24-7 orchestration get 24-7 orchestration update 24-8 orchestration delete 24-11 25 Orchestration Object orchestration-object add 25-2 orchestration-object list 25-3 orchestration-object get 25-6 vii orchestration-object discover 25-7 orchestration-object update 25-7 orchestration-object delete 25-9 26 Orchestration v2 orchestration-v2 add 26-1 orchestration-v2 list 26-3 orchestration-v2 get 26-4 orchestration-v2 discover 26-5 orchestration-v2 update 26-6 orchestration-v2 delete 26-8 27 OSS Container oss-container add 27-1 oss-container list 27-2 oss-container get 27-3 oss-container discover 27-4 oss-container update 27-4 oss-container delete 27-5 28 Private Gateway private-gateway add 28-1 private-gateway list 28-2 private-gateway get 28-3 private-gateway discover 28-4 private-gateway update 28-4 private-gateway delete 28-5 29 Reboot Instance Request reboot-instance-request add 29-1 reboot-instance-request list 29-2 reboot-instance-request get 29-3 reboot-instance-request discover 29-3 reboot-instance-request delete 29-4 viii 30 Restore restore add 30-1 restore list 30-2 restore get 30-3 restore delete 30-4 31 Route route add 31-1 route list 31-2 route get 31-3 route update 31-3 route delete 31-4 32 Security Application sec-application add 32-1 sec-application list 32-2 sec-application get 32-3 sec-application discover 32-4 sec-application delete 32-5 33 Security Association sec-association add 33-1 sec-association list 33-2 sec-association discover 33-3 sec-association get 33-3 sec-association delete 33-4 34 Security IP List sec-ip-list add 34-1 sec-ip-list list 34-2 sec-ip-list discover 34-3 sec-ip-list get 34-3 sec-ip-list update 34-4 sec-ip-list delete 34-5 ix 35 Security List sec-list add 35-1 sec-list list 35-2 sec-list
Recommended publications
  • The Effectiveness of CEO Leadership Styles in the Technology Industry
    The Effectiveness of CEO Leadership Styles in the Technology Industry Sean Dougherty, Andrew Drake Advisors: Dr. Jonathan Scott and Professor Katherine Nelson Temple University Explanation of research The purpose of this research is to determine the impact of leadership style on financial success. A great deal of research has been done on the factors that affect the financial success of a company, but leadership is one factor that tends to be overlooked. That is due to the nature of leadership; like other aspects of human resources management such as company culture, leadership is not easily quantifiable. In order to study leadership’s effect on company success, we needed to make leadership less abstract and more concrete. We needed a means of distinguishing the way one person leads in comparison to another person, and the solution was presented to us upon reading Primal Leadership. Authors Daniel Goleman, Richard Boyatzis, and Annie McKee make the detailed claim that the way a person leads can always be categorized into at least one of six distinct emotional leadership styles. We seek to build on the research of Goleman, Boyatzis, and McKee by analyzing the effectiveness of each of these styles in terms of driving financial success. To measure financial success, we looked at the behavior of stock price in the time following an initial public offering. For our data set, we chose to study 60 companies in the technology industry that have gone public since the year 2000. With each company, we researched the CEO who led the company during the IPO and assigned him or her one to two leadership styles that he or she exhibits.
    [Show full text]
  • FUJITSU Software Uforge Appcenter Datasheet
    Datasheet FUJITSU Software UForge AppCenter 3.7 Datasheet FUJITSU Software UForge AppCenter 3.7 Hybrid IT Application Delivery and Migration Hybrid IT Application Delivery UForge AppCenter Hybrid IT adoption continues to grow at a rapid pace. Enterprises are UForge AppCenter enables enterprises to deliver, migrate and govern looking to take advantage of the agility benefits of new fast IT applications for hybrid IT environments, including virtual and cloud environments without sacrificing the governance, control and security infrastructures. they have come to expect from traditional robust IT data centers. Bridging the gap between old and new is the key to headache-free It includes a suite of simple, self-service tools for automatically hybrid IT, but that process inevitably presents a number of significant building and maintaining cloud application stacks, migrating existing challenges. application workloads to cloud or between clouds, and collaborating across teams during application development and deployment. One of those challenges is how to repeatably and consistently onboard and manage applications in a hybrid environment. Getting With UForge AppCenter, enterprises benefit from: applications up and running where you need them, whether you’re ■ Increased business agility, with the ability to run applications in using a robust or fast IT platform, without getting overwhelmed by the the “best execution venue”, whether that’s in the cloud or a number of operating systems and infrastructures you need to support, traditional data center
    [Show full text]
  • Reports Reports.Informationweek.Com February 2012 $99 Understanding Private Cloud Stacks Private Clouds Are More Than a Trendy Buzzword
    Next reports Reports.InformationWeek.com February 2012 $99 Understanding Private Cloud Stacks Private clouds are more than a trendy buzzword. They represent Virtualization 2.0, ushering in a new wave of software designed to turn a rack of commodity servers into an adaptive, scalable platform that further blurs the link between applications and the runtime operating system. For IT organizations willing to dispense with traditional application hosting models, a plethora of pure cloud software options beckons. By Kurt Marko Report ID: S4240212 Previous Next reports Private Cloud Stacks S 3 Author’s Bio ABOUT US 4 Executive Summary T 5 Private Cloud Stacks: Time to Face the InformationWeek Reports’ analysts arm Reality of Virtualization business technology decision-makers with 5 Figure 1: Planned Virtualization real-world perspective based on qualita - 6 Virtualization 2.0 tive and quantitative research, business N 6 Figure 2: Servers Hosting VMs in Production and technology assessment 7 Clouds and Hypervisors and planning tools, and adoption best 7 Figure 3: Implementation of a Private Cloud practices gleaned from experience. To con - E Strategy tact us, write to managing director Art 8 Cloud From the Start Wittmann at [email protected], T 9 Figure 4: Interest in Combined Manufacturer content director Lorna Garey at Complete Systems [email protected], editor-at-large 10 Compute, Storage, Network Integration Andrew Conry-Murray at 10 Figure 5: Private Cloud Application Use Cases [email protected], and research N 11 Clouds and Storage
    [Show full text]
  • Curriculum Vitae of Tilman Wolf
    TILMAN WOLF Phone: +1-413-545-0757 Address: Office of the Provost E-mail: [email protected] 181 Presidents Drive, Whitmore Admin. Bldg. 366 Web: http://www.ecs.umass.edu/ece/wolf/ Univ. of Massachusetts, Amherst, MA 01003, USA Tilman Wolf is Professor of Electrical and Computer Engineering and Senior Vice Provost for Academic Af- fairs at the University of Massachusetts Amherst. As Associate Dean of Engineering, he led major initiatives in the College of Engineering, including the establishment of a new Department of Biomedical Engineering and its degree programs, implementation of a new cohort-based distance education M.S. program, and development of a training program for graduate students who teach the college-wide freshman seminar. He is engaged in research and teaching in the areas of computer networks, cybersecurity, and embedded systems. He is a co-author of the book “Architecture of Network Systems” and has published extensively in peer-reviewed journals and conferences. His research has been supported by grants from NSF, DARPA, and industry. He has taught numerous courses on computer networks, embedded systems, programming, and digital design. PROFESSIONAL APPOINTMENTS University of Massachusetts Amherst, MA • Senior Vice Provost for Academic Affairs, September 2017 – present. • Professor of Electrical and Computer Engineering, September 2012 – present. • Senior Associate Dean of Engineering, January 2017 – August 2017. • Associate Dean of Engineering, January 2014 – December 2016. • Associate Professor of Electrical and Computer Engineering, September 2007 – August 2012. • Assistant Professor of Electrical and Computer Engineering, August 2002 – August 2007. Institute IMDEA Networks, Madrid, Spain • Visiting Researcher, July 2012 – December 2012. IBM T. J.
    [Show full text]
  • Apache Cloudstack Un Iaas À Notre Taille Pour Nos Besoins
    IaaS à la sauce Portails Focus sur Pierre Aubert Orange Portails OF/DMGP/Portails/DOP 1er Juillet 2013 Notre contexte § Quelques milliers de serveurs § Quelques centaines de services et d’applications § Une historique de startup: le modèle à façon > Des machines physiques choisies et dédiées à l’application > Un OS adapté pour l’application en terme de performance et de QoS > 100% open source § Mais nous sommes dans Orange donc > Pas d’externalisation des données des clients > Grosse volumétrie: on ne cherche pas à mettre un maximum de VM par host mais au contraire à disperser les VMs du même service sur plusieurs hosts pour assurer la stabilité, la haute disponibilité, la reprise sur erreur … > et en même temps, les moyens sont faibles et donc l’optimisation des coûts reste un critère principal 2 Différentes stratégies: les pools § Le modèle pool de serveurs pour applications de type LAMP par ex § N-Vhosts par Front; 1 étage de cache, 1 étage de BD LB F1 F2 Fn LB LB LB S1 S1 S2 S2 C1 C2 C3 1 2 1 2 M M 1 2 3 Les pools § Forces > Bonne mutualisation des ressources > Capacity planning simple > Supervision / Graphage simple > Séparation des CPU et des IO > Sécurité plus simple car architecture homogène > Simple § Faiblesses > Isolation des applications (cgroup) > Multi Datacenter complexe > Evolutions difficiles (comment upgrader un pool?) > Architecture relativement figée 4 Virtualisation § Choix historique de Xen (version opensource) > KVM mauvais sur les IO (il y a longtemps) § Modèle IaaS à la main: on place les VMs manuellement sur des
    [Show full text]
  • Capstone Partners Investment Banking Advisors 2014 AWARD WINNER: Capstone Partners BOUTIQUE INVESTMENT BANKING Investment Banking Advisors FIRM of the YEAR
    Capstone Partners Investment Banking Advisors 2014 AWARD WINNER: Capstone Partners BOUTIQUE INVESTMENT BANKING Investment Banking Advisors FIRM OF THE YEAR SaaS & Cloud M&A and Valuation Update Q2 2014 BOSTON CHICAGO LONDON LOS ANGELES PHILADELPHIA SAN DIEGO SILICON VALLEY TAMPA Capstone Partners CapstoneInvestment BankingPartners Advisors Over a Decade of M&A Excellence 1 Investment Banking Advisors WORLD CLASS WALL STREET EXPERTISE.1 BUILT FOR THE MIDDLE MARKET.TM Capstone Partners TableInvestment Bankingof Contents Advisors Section Page Introduction Research Coverage: SaaS & Cloud 4 Key Takeaways 5-6 M&A Activity & Multiples M&A Dollar Volume 8 M&A Transaction Volume 9-11 LTM Revenue Multiples 12-13 Revenue Multiples by Segment 14 Highest Revenue Multiple Transactions for LTM 15 Notable M&A Transactions 16 Most Active Buyers 17-18 Public Company Valuation & Operating Metrics SaaS & Cloud 130 Public Company Universe 20-21 Recent IPOs 22-31 Stock Price Performance 32 LTM Revenue, EBITDA & P/E Multiples 33-35 Revenue, EBITDA and EPS Growth 36-38 Margin Analysis 39-40 Best / Worst Performers 41-42 Notable Transaction Profiles 44-53 Public Company Trading & Operating Metrics 55-60 Technology & Telecom Team 62-64 Capstone Partners CapstoneInvestment BankingPartners Advisors Over a Decade of M&A Excellence 2 Investment Banking Advisors 2 Capstone Partners CapstoneInvestment Banking Partners Advisors Investment Banking Advisors Observations and Introduction Recommendations Capstone Partners CapstoneInvestment BankingPartners
    [Show full text]
  • Finding File Fragments in the Cloud
    Chapter 12 FINDING FILE FRAGMENTS IN THE CLOUD Dirk Ras and Martin Olivier Abstract As the use – and abuse – of cloud computing increases, it becomes nec- essary to conduct forensic analyses of cloud computing systems. This paper evaluates the feasibility of performing a digital forensic investi- gation on a cloud computing system. Specifically, experiments were conducted on the Nimbula on-site cloud operating system to determine if meaningful information can be extracted from a cloud system. The experiments involved planting known, unique files in a cloud computing infrastructure, and subsequently performing forensic captures of the vir- tual machine image that executes in the cloud. The results demonstrate that it is possible to extract key information about a cloud system and, in certain cases, even re-start a virtual machine. Keywords: Cloud forensics, evidence recovery, file fragments 1. Introduction With the rapid and near universal penetration of computers into so- ciety, the incidence of computer crime has grown accordingly [25, 28]. Computers have evolved from room-sized mainframes and desktop ma- chines with limited storage capacity to devices such as cellular telephones and tablet devices with high capacity flash memory storage [14, 24]. Meanwhile, cloud computing is becoming extremely popular because it provides outsourced storage and computing solutions at a low cost. Indeed, infrastructure as a service (IaaS) is now the fastest growing paradigm of cloud computing [32]. Cloud computing allows for the rapid provisioning of computer in- frastructure – servers, applications, storage and networking. This is accomplished by creating a pool of resources from which a user can pro- vision the desired system using virtualization technology; the resources 170 ADVANCES IN DIGITAL FORENSICS VIII can just as easily be released back into the pool for other users to pro- vision.
    [Show full text]
  • Curriculum Vitae of Tilman Wolf
    TILMAN WOLF Phone: +1-413-545-0757 Address: Department of Electrical and Computer Engineering E-mail: [email protected] 151 Holdsworth Way, Knowles 211C Web: http://www.ecs.umass.edu/ece/wolf/ Univ. of Massachusetts, Amherst, MA 01003, USA Tilman Wolf is Professor of Electrical and Computer Engineering at the University of Massachusetts Amherst. His research interests are in the areas of next-generation Internet architecture, network router design, and embedded system security. He is co-author of the book “Architecture of Network Systems” and has pub- lished extensively in peer-reviewed journals and conferences. His research has been supported by grants from NSF, DARPA, and industry. He has taught numerous courses on computer networks, embedded sys- tems, programming, and digital design. PROFESSIONAL EXPERIENCE University of Massachusetts Amherst, Department of Electrical and Computer Engineering • Professor, September 2012 – present. • Associate Professor, September 2007 – August 2012. • Assistant Professor, August 2002 – August 2007. Institute IMDEA Networks, Madrid, Spain • Visiting Researcher, July 2012 – December 2012. IBM T. J. Watson Research Center, Pervasive and Embedded Networking Department • Research Intern, Summers 2000 and 2001. Washington University in St. Louis, Department of Computer Science and School of Medicine • Graduate Research Assistant, Applied Research Laboratory, September 1998 – August 2002. • Research Intern, Electronic Radiology Laboratory, Summer 1997. EDUCATION Washington University in St. Louis, Department of Computer Science • D.Sc. in Computer Science, August 2002, Advisor: Jonathan S. Turner, Dissertation: “Design and Performance of Scalable High-Performance Programmable Routers.” • M.S. in Computer Engineering, August 2000. • M.S. in Computer Science, December 1998, Advisor: Guru M. Parulkar, Project: “Design of a Medical-Video-on-Demand System over ATM Networks,” Certificate in Networking and Communications.
    [Show full text]
  • Implementing and Developing Cloud Computing Applications [2011]
    Implementing and Developing Cloud Computing Applications K11513_C000.indd 1 10/18/10 2:47 PM Implementing and Developing Cloud Computing Applications DAVID E.Y. SARNA K11513_C000.indd 3 10/18/10 2:47 PM Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC Auerbach Publications is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number: 978-1-4398-3082-6 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
    [Show full text]
  • CLOUD COMPUTING 2014 Proceedings
    CLOUD COMPUTING 2014 The Fifth International Conference on Cloud Computing, GRIDs, and Virtualization ISBN: 978-1-61208-338-4 May 25 - 29, 2014 Venice, Italy CLOUD COMPUTING 2014 Editors Wolf Zimmermann, Martin-Luther University Halle-Wittenberg, Germany Yong Woo Lee, University of Seoul, Korea Christoph Reich, Furtwangen University, Germany 1 / 142 CLOUD COMPUTING 2014 Foreword The Fifth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2014), held between May 25-29, 2014 in Venice, Italy, was intended as an event to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols. We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2014 Technical Program Committee, as well as all of the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to CLOUD COMPUTING 2014. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the CLOUD COMPUTING 2014 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that CLOUD COMPUTING 2014 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of cloud computing, GRIDs and virtualization.
    [Show full text]
  • Cloud Separation: Stuck Inside the Cloud
    Cloud Separation: Stuck inside the cloud. Waldo Delport and Martin S. Olivier Information and Computer Security Architectures Research Group Department of Computer Science University of Pretoria South Africa [email protected] [email protected] Abstract. When something erroneous happens happens in digital envi- ronment, a Digital Forensic Investigations (DFIs) can be used to gather information about the event. When conducting a DFI, Digital Forensic Procedures (DFPs) are followed. DFPs provide steps to follow to ensure the successful completion of the DFI. One of the steps in a DFP is to isolate possible evidence in order to protect the evidence from contamina- tion and tampering. The introduction of Cloud computing complicated the isolation process because there is a shared layer between users. This means that the methods used to isolate evidence must be adapted and re- worked to work in the Cloud environment. In some cases new procedures need to be introduced to address the isolation problem. In this article we introduce the idea of Cloud separation to isolate a part of the Cloud. We argue that the separation process consists of methods to move instances, as well as methods to divide the Cloud. The paper also introduces methods to accomplish the movement of instances and the division of the Cloud. The paper reports on the finding of testing the dividing methods on different Cloud operating systems in experimental conditions. The experimental outcome was that some of the methods are not applicable to Cloud separation and the methods to be used will depend on the circumstances of the DFI.
    [Show full text]
  • Ičo: 25512285 Dič; Cz 25 51 22 85
    Scam l Číslo smlouvy objednatele: 7/2018 Číslo smlouvy dodavatele: 20170008-TSB-001 SMLOUVA O DODÁVCE ÚLožIŠTĚ A POSKYTOVÁNÍ SLUŽEB uzavřená dle zákona č. 89/2012 Sb., občanského zákoníku (dále jen „občanský zákoník“) Obchodní firma: TECHNI llllllllllllllllll DUČI D nm: 1 Ă -Im mm, Zapsána: V obchodním rejstříku vedeném u Krajského soudu v Brně, oddíl C, vložka 42557, na Straně jedné (dále jen „dodavatel“) a Obchodní firma: Technické sítě Brno, akciová společnost Se Sídlem: Barvířská 822/5, 602 00 Brno IČO: 25512285 DIČ; CZ 25 51 22 85 Společnost je Zapsána v obch. rejstříku vedeném Krajským soudem v Brně, oddíl B, vložka 2500. na Straně jedne' (dále jen „objednatel“) I. Předmět smlouvy a nabytí vlastnictví 1.1. Předmětem této Smlouvy je: ı dodávka datového úložiště Zahmujícího dva kusy cluster Storages, 1ks backup Storage, LAN a SAN infrastruktury se Souvisejícím Software. Předmětem Smlouvy je rovněž instalace dodaných Zařízení jejich Zprovoznění a Otestování na požadované parametry a dále poskytnutí souvisejících služeb jako je Zejména Servisní podpora po dobu 5 let (dále též jen ,záruční servis“ nebo „Servisní Support“). Podrobná Specifikace konkrétní nabídnuté dodávky Zařízení je uvedena v příloze č. 1 této Smlouvy (dálejen ,zařízenřl Dodavatel Současně prohlašuje, že dodávané Zařízení ve všech parametrech Splňuje požadavky technické Specifikace, která tvoří přílohu č. 2 této Smlouvy. 1.2. Dodavatel Se touto Smlouvou Zavazuje dodat, instalovat a implementovat Objednateli Zařízení uvedené Stránka 1 Z 12 Číslo smlouvy objednatele: 7/2018 Číslo smlouvy dodavatele: 20170008-TSB-001 v předchozím Odstavci a převést na něj vlastnické právo, přičemž k dodanému Zboží v rámci Smluvní ceny náleží i následná podpora v rámci Záručt i pozáručního servisu, bude-li pozáruční Servis objednatelem vyžadován, a veškeré licence na HW a SW, které jsou třeba pro provoz a případná rozšíření kapacity storage Za podmínek dle přílohy č.
    [Show full text]