The Personal Cloud — Design, Architecture and Matchmaking Algorithms for Resource Management

Total Page:16

File Type:pdf, Size:1020Kb

The Personal Cloud — Design, Architecture and Matchmaking Algorithms for Resource Management The Personal Cloud — Design, Architecture and Matchmaking Algorithms for Resource Management Adiseshu Hari Ramesh Viswanathan Bell Labs, USA Bell Labs, USA [email protected] [email protected] T.V. Lakshman Y. J. Chang Bell Lab, USA ITRI, Taiwan [email protected] [email protected] Abstract Planetlab [1] to exploit academic computing resources, edge computing platforms like BOINC [2] and Seat- We introduce the notion of a Personal Cloud — a collec- tle Open P2P Computing project [3] and applications tion of Virtual Machines (VMs) running on unused com- like SETI@home [4] which seek to harness unused puters at the edge. The Personal Cloud provides an ideal home computing resources. The Nano Data Centers solution for the secure sharing of compute and storage re- Project [14] is an EU FP7 project to explore the notion sources across peers in a resource and application agnos- of a distributed datacenter built out of unused edge re- tic manner, and facilitates new computational paradigms sources like settop boxes, internet gateways and Wifi ac- such as datacenter-less, distributed virtual clouds. We cess points. The Personal Cloud concept differs from all provide and implement solutions for the challenges of the above. First, the Personal Cloud takes unused x86 managing a Personal Cloud, such as IP address sharing, based computers (not settop boxes) at home and converts bandwidth sharing and isolation from local home net- the collection into a standard IaaS cloud hosting arbitrary work traffic. We also propose and implement a prov- VMs, rather than a restricted application level virtualiza- ably optimal solution to the resource management prob- tion environment. Second, unlike a Grid, or a Commu- lem, allowing peers to share VMs across their individual nity Cloud [5] which pools unused resources into a com- Personal Clouds by specifying their resource offers and mon Cloud, the user hosting the Personal Cloud does not requests, and verify its performance via detailed simula- do so to run VMs on his own Personal Cloud, though the tions. user is free to do so. The goal of the Personal Cloud is to instead host VMs of others safely in the user’s home 1 Introduction network — the motivation for hosting being either ac- cess to the Personal Clouds of others, or credit in virtual Each endpoint of the Internet represents resources such or financial form. Finally, when a user runs VMs on a as CPU, storage and bandwidth which are the exclusive remote Personal Cloud, the VMs are isolated in a Vir- property of the owner of the endpoint. There are ben- tual Private Cloud(VPC) [6] such that they share a com- efits, however, in sharing unused resources, for exam- mon address space, which allows them to communicate ple, two peers could agree to do a mutual backup, or a directly amongst themselves, but are isolated from both group could get together to create a shared repository the home network address space and the VPCs of other by using unused computers. A fundamental challenge users who are running VMs on the same Personal Cloud. in resource sharing, however, is the security and privacy We expect three distinct use cases of the Personal needed for hosting remote jobs on local resources. In Cloud. The first use case, on which we focus in this this paper, we describe an architecture which we call the paper, is for individual users to create Personal Clouds Personal Cloud, which packages unused edge resources and use them to run cloud based applications such as on- into a standard Infrastructure as a Service (IaaS) Cloud line backup and file sharing, bypassing traditional public such that arbitrary VMs and applications can be safely clouds for reasons of cost or personal preference. The run locally and accessed remotely. second use case is to federate the individual Personal Since the birth of the Internet, there have been nu- Clouds into a single distributed virtual data center cloud, merous attempts to create platforms for remote and dis- at a cost that is a small fraction of traditional clouds. The tributed computation. Today, we have Grid comput- final use case is in universities and enterprises, where de- ing which seeks to harness unused enterprise resources, partmental and lab resources can be packaged into indi- 1 Chief Mgmt VM Home Network VM3 VM4 Personal Cloud VM1 VM2 Portal Matchmaker App VMs TCP/IP TCP/IP TCP/IP TCP/IP NAT Home Broadband Service Computer Computer Computer Service TC Router Modem Provider Provider veth0 veth0 veth0 veth1 veth2 eth0 1 WifiWifi Physical Machine 1 Computer Computer Network 2 VM5 VM6 VM7 Mgmt VM VM8 Figure 1: High Level Overview of a Personal Cloud 3 TCP/IP TCP/IP TCP/IP TCP/IP TC veth0 veth0 veth0 veth1 veth2 eth0 vidual Personal Clouds, which can then be combined to meet requirements. Physical Machine 2 The Personal Cloud lifecycle follows four steps. First, the user creates a Personal Cloud by installing the Per- sonal Cloud software onto unused computers using stan- Figure 2: Virtual Networks inside the Personal Cloud dard install media like a CD or Flash Drive. Second, the user trades VMs by offering VMs from his cloud, and requesting VMs from other clouds. A key contri- management solutions such as Amazon EC2 [7] and Eu- bution of this paper is the concept of matchmaking, or calyptus [8]. We highlight that functionality needed for matching the VM requests and VM offers of each user a Personal Cloud that is missing in conventional cloud in an optimal manner such that the maximal number of management solutions. requests are satisfied. Third, the VM assignments of the Some of the principal technical challenges addressed matchmaking algorithm are used by each user to instanti- in our current implementation of the Personal Cloud are: ate and allocate local VMs to remote users, and to access Security and Privacy of the VMs running on the Per- remote VMs assigned to the user. Lastly, as participat- sonal Cloud, VM Network isolation, Bandwidth (BW) ing computers, users, requests and offers change, there sharing, IP Address sharing and NAT Traversal. is an incremental change to the VM assignment. We ex- It is important to isolate and secure the hosting user pect all steps to be simple enough for laymen to partic- from the VMs in the Personal Cloud and prevent mali- ipate in the lifecycle. The initial sections of the paper cious snooping, Denial of Service attacks or excessive present the concept of the Personal Cloud and explain its bandwidth consumption from these VMs. In this paper, architecture and implementation, while the later sections we focus on this issue, and show how we isolate users of describe the Matchmaking algorithm and its simulation. the Personal Clouds into individual VPCs with capped bandwidth limits. We rely on a key VM called the Man- 2 Architecture of the Personal Cloud agement VM (Mgmt VM) which is installed on each ma- chine in the Personal Cloud. These VMs, and their in- Assumptions A detailed view of the Personal Cloud is ternal architecture is show in Figure 2. One of the Mgmt shown in Figure 1. VMs run on the subset of home VMs becomes the Chief Management VM (Chief Mgmt computers that is dedicated to the Personal Cloud and VM) through an automatic election process. The Mgmt are assumed to be always powered on and static. All VMs are lightweight enough to impose minimal over- these home computers are connected to a home net- heads, and can be folded into the hypervisor for those work, which is in turn connected to the Internet via a hypervisors which provide the requisite interfaces, e.g., Home Router and a broadband modem. The home router the Dom0 domain in Xen or the Linux host in KVM. obtains at least one public IP address (not necessarily Management The Chief Mgmt VM acts as the gate- static), uses DHCP to distribute private IP addresses to way for Internet traffic to and from the Personal Cloud. computers in the home network, and uses NAT (Network It runs a web portal which manages the Personal Cloud Address Translation) to share the public IP address(es) VMs. Amongst its tasks are Personal Cloud automation amongst all the home computers. We assume that the including the instantiation and deletion of VMs, assign- vast majority of Personal Clouds will consist of a small ment of VMs to users, assignment of VMs to virtual net- group of computers, hence scalable intra cloud network- works, isolation and security of inter VM traffic, QoS ing is not an issue. The architecture we present is hy- restrictions on network traffic to and from the Personal pervisor agnostic and complementary to existing cloud Cloud, and IP address sharing and application proxying 2 across multiple VMs. work. VM Networking The main goal of VM networking in Address Sharing and NAT Traversal One major net- the Personal Cloud is to provide each user of the cloud working issue with Personal Clouds is the sharing of the with a separate, fully isolated virtual network, while limited public address space (usually just one) with the shielding the local user traffic from the Personal Cloud multiplicity of VMs such that each remote user can ac- traffic. Unlike existing cloud networking schemes like cess his or her VM independent of other users. Note that Seattle [12] or NetLord [13] which focus on creating a the problem lies with traffic coming from the Internet scalable L2 infrastructure within a data center, our goal to the Personal Cloud. Outgoing traffic from the Per- for VM networking is creation of a large number of sonal Cloud is NATed as normal by the home router, and virtual networks without any assistance in the form of does not have any reachability problems.
Recommended publications
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • Privacy by Design and the Emerging Personal Data Ecosystem
    Privacy by Design and the Emerging Personal Data Ecosystem Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Foreword by Shane Green CEO of Personal October 2012 Acknowledgements The Information and Privacy Commissioner of Ontario, Canada, would like to gratefully acknowledge the contributions of the following individuals whose efforts were invaluable in the drafting of this paper: Michelle Chibba, Director of Policy and Special Projects, IPC, and Policy Department staff; Josh Galper, Chief Policy Officer and General Counsel, Personal; Drummond Reed, Respect Network; Alan Mitchell, Strategy Director, Ctrl-Shift; Claire Hopkins, Marketing and Communications Director, Ctrl-Shift; and Liz Brandt, CEO, Ctrl-Shift. We also appreciate the opportunity to co-launch this paper with the Society for Worldwide Interbank Financial Telecommunication (SWIFT) and acknowledge their contribution to the case study section. We would especially like to thank Peter Vander Auwera, Innovation Leader, SWIFT, and Pierre Blum, Senior Product Manager, SWIFT. 416-326-3333 2 Bloor Street East 1-800-387-0073 Suite 1400 Fax: 416-325-9195 Toronto, Ontario TTY (Teletypewriter): 416-325-7539 Information and Privacy Commissioner M4W 1A8 Website: www.ipc.on.ca Ontario, Canada Canada Privacy by Design: www.privacybydesign.ca TABLE OF CONTENTS Foreword ............................................................................. 1 Introduction ......................................................................... 3 The Personal Data Ecosystem ...............................................
    [Show full text]
  • Security Issues and Countermeasures in Cloud Computing Environment
    ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 5, September 2015 Security Issues and Countermeasures in Cloud Computing Environment Varun Krishna Veeramachaneni Department of Computer Science, NewYork Institute of Technology, Old Westbury, NY Abstract- “Cloud computing” represents a relatively new computing model in the evolution of on-demand information technology services and products, that is built on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, and reduced total cost of ownership. Contrarily to traditional onsite application architecture where applications are residing in client machines or in a server accessible via client cloud computing offers shared computer application resources and accessible via the Internet. Since cloud computing share distributed resources via the network in the open environment, it presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Various categories of such security concerns are trust, architecture, identity management, software isolation, data protection, confidentiality and availability. All these security vulnerabilities lead to various threats on the cloud such as authentication, misuse of cloud infrastructure, eavesdropping, network intrusion, denial of service attack, session hijacking. Further Cloud Forensic is an emerging challenge related to cloud security]. It examines the key security issues of Cloud computing being faced today and the challenges and opportunities that it brings for business community.
    [Show full text]
  • Iomega® Personal Cloud for Storcentertm Desktop Network Storage
    Iomega® Personal Cloud for StorCenterTM Desktop Network Storage Reducing the cost, complexity and effort required to protect and share SMB data Iomega Personal Cloud is the ultimate data protection and remote access solution for small- and medium-sized businesses. Introducing the revolutionary technology that allows you to protect and share your data from any location. Iomega Personal Cloud is a patent-pending, web-based computing architecture that connects your Iomega StorCenter network storage devices to other individuals and/or devices via the Internet. Unlike public and private cloud applications, Iomega’s Personal Cloud technology is completely self-owned—so the content and Simplifying collaboration and accessibility is always under your control. Best of all, there are never any usage fees or protecting valuable business data subscription charges, therefore delivering the best value for cloud access and protection. —at a fraction of the effort and cost of prevailing solutions. Remote Replication for Business Continuity • Automatically copy files on your storage With two or more StorCenter devices connected together in your Personal Cloud, you can at work to your storage at home or branch automatically replicate data from your primary business to another location. Keeping this offices. off-site copy ensures data availability in the event of an unforeseen disaster. Remote • Connect your PC or Mac to your storage, backups can run in the background after business hours to eliminate network wherever you are. bottlenecks. • Invite co-workers to join and share, upload and download files in your Using Copy Jobs, remote replication is flexible and powerful. You can choose which folders Personal Cloud.
    [Show full text]
  • Editorial Style Guide February 2018
    Editorial Style Guide February 2018 Creative Services Revision 1.2 [email protected] Table of Contents Editorial Style Guide Notes for Sub-Brands (such as LaCie) External References Definitive Guides Legal Guidelines for Writing Legal Review Process Disclaimers Disclaimer Elements Typical Disclaimer Trademarks Trademark Use With Company Name Trademark Use With Product or Feature Names Third-Party Trademarks Corporate Current Products Legacy Products Current Features/Technologies Legacy Features/Technologies Permissions, Disclosures, and Citations Designer Credits Warranty Use of Language Compound Words 1 Numbers Units of Measure Rounding Areal Density Capacity Dimensions Electricity Performance/Speed Power Dissipation Shock Sound Temperature Time Vibration Lists Capitalization Punctuation Apostrophes Commas Semicolons Colons Dashes Parentheses Ellipses Multiplication Sign Quotation Marks Italics 2 URLs Acronyms and Abbreviations Acronyms to Avoid Acronyms You Do Not Have to Spell Out Word List Sub-Brand-Specific Exceptions LaCie 3 Editorial Style Guide This style guide establishes writing style conventions for Seagate and sub-brand writers and editors in order to help them achieve stylistic consistency across all platforms. This document is the sole point of reference for all ​ public-facing copy published by Seagate and Seagate sub-brands. Send questions, comments, and suggestions to: [email protected] ​ Notes for Sub-Brands (such as LaCie) Per company strategy, some sub-brands may be expected to maintain their unique voice, despite being a holding of Seagate. However, in the interest of centralizing copy standards across all of Seagate and its sub-brands, we expect all sub-brands to use this document as the single point of reference for copy standards.
    [Show full text]
  • Contact Info. KOTRA BUSINESS CENTER, Newdelhi
    129 129 Contact Info. KOTRA BUSINESS CENTER, Newdelhi Address : 12thFloor, DLF Cyber Terraces, Building 5-A, DLF Cyber City Phase-Ⅲ, Gurgaon-122002, Haryana, India Tel. (91-12) 4462-8500 FAX. (91-124)4628-501 Email. [email protected] SHOW LOCATION MAP Booth laYOUT CONTEnts GENERAL companY 12CM, INC. 7G61-08 08 AKSys Co., Ltd. 7G61-19 10 Chemtronics 7G61- 12 CLOUDIKE 7G61-20 14 DAZZL CO.,LTD 7F61- 16 DEMAND 7G61- 18 DNX Co.,Ltd. 7G61- 20 ELUON 7G61- 22 HANKOOK ANTENNA CO., LTD. 7G61- 24 INFOWORKS Co., ltd 7G61- 26 KDLAB INC 7FG1-3 28 KRF Co., Ltd. 7F61-25 30 LetinAR 7G61- 32 LiBEST Inc. 7G61- 34 Lycanthrope Co.,Ltd 7G61- 36 PHILKO INTERNTIONAL, INC. 7G61-17 38 Point Mobile 7G61- 40 Prinker Korea Inc. 7F61- 42 RTX Technology Co., Ltd. 7G61- 44 SELCOS 7G61- 46 Stealth Solution 7G61- 48 VIRNECT 7F61-12 50 vtw 7F61- 52 WooKyoung Information Technology Co., Ltd. 7G61-10 54 StaRT companY 42Maru 7F61- 56 Alfoto 7F61- 58 CIRCULUS Inc. 7F61- 60 DeepFine 7F61- 62 ERT Corp 7F61- 64 MINTPOT Co., Ltd. 7F61- 66 Mobile Doctor 7F61- 68 palmcat Corp. 7F61- 70 Robo Risen 7F61- 72 TrustVerse (WealthTreeSG) 7F61- 74 TWONUMVER 7F61- 76 VisualCamp 7F61- 78 Booth No. 8 9 7G61-08 KOREA PAVILION OFFICIAL DIRECTORY 12CM, INC. Products Echoss Smart Stamp/Echoss Platform Based on multi-touch function, 12CM captured the globally used recognition feature of 로고 없음 smart devices to develop and systemize certification system with physical touch on smart devices, which can be applied to a wide range of marketing, e-commerce, and payment service.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,081,411 B2 Kalns Et Al
    US009081411 B2 (12) United States Patent (10) Patent No.: US 9,081,411 B2 Kalns et al. (45) Date of Patent: Jul. 14, 2015 (54) RAPID DEVELOPMENT OF VIRTUAL 8,316,343 B2 * 1 1/2012 Birze et al. .................... 717/1OO PERSONAL ASSISTANT APPLICATIONS 2003/0005412 A1 1/2003 Eanes ........................... 717/120 2003/0046201 A1 3/2003 Cheyer 2005/0097.525 A1* 5, 2005 Stone et al. ................... 717/136 (71) Applicant: SR International, Menlo Park, CA 2007/0022408 A1 1/2007 Brandt et al. ................. 717/136 (US) (Continued) (72) Inventors: Edgar T. Kalns, San Jose, CA (US); Dayne B. Freitag, La Mesa, CA (US); FOREIGN PATENT DOCUMENTS William S. Mark, San Mateo, CA (US); WO WO2O11028844 A2 3, 2011 Necip Fazil Ayan, Palo Alto, CA (US); Michael J. Wolverton, Mountain View, OTHER PUBLICATIONS CA (US); Thomas J. Lee, San Francisco, CA (US) Jari Porras, Reusable Bluetooth Networking Component for Symbian Operating System, 2002, pp. 22-38.* (73) Assignee: SR international Menlo Park, CA (Continued) (*) Notice: Subject to any disclaimer, the term of this Primary Examiner — Thuy Dao patent is extended or adjusted under 35 U.S.C. 154(b) by 132 days Assistant Examiner — Mongbao Nguyen M YW- y yS. (74) Attorney, Agent, or Firm — Barnes & Thornburg LLP (21) Appl. No.: 13/891,858 57 ABSTRACT (22) Filed: May 10, 2013 (57) A platform for developing a virtual personal assistant (65) Prior Publication Data (“VPA) application includes an ontology that defines a com US 2014/0337814 A1 Nov. 13, 2014 puterized structure for representing knowledge relating to • - s one or more domains.
    [Show full text]
  • User Experience Studies of Personal Cloud Storage Services
    PARISA POUR REZAEI USER EXPERIENCE STUDIES OF PERSONAL CLOUD STORAGE SERVICES Master of Science thesis Examiner: Prof. Kaisa Väänänen Supervisor: MSc Jarmo Palviainen Examiner and topic approved by the Council of the Faculty of Computing and Electerical Engineering on 14th January 2015 i ABSTRACT PARISA POUR REZAEI: User Experience Studies of Personal Cloud Storage Services Tampere University of technology Master of Science Thesis, 78 pages, 31 Appendix pages September 2015 Master’s Degree Programme in Information Technology Major: User Experience Examiner: Professor Kaisa Väänänen Keywords: user experience, design, cloud storage services Nowadays, individuals’ data is at their disposal in real time from any device with the assistance of cloud storage services (CSS, e.g. Dropbox, OneDrive, iCloud and Google Drive). Success of cloud computing in an enterprise ultimately depends on delivering user experience (UX) which delivers business applications anytime and anywhere, and on any device that user prefers. CSSs empower new kind of collaborations between individuals and have fundamental impact on how we organize and share our data. Despite an increasing popularity of cloud computing among researchers and academia, and vast variety of CSSs offered to the end users by cloud computing, the literature on UX studies of these services is quite restricted. This master’s thesis studies UX of different CSSs (with focus on Dropbox, Google Drive, OneDrive, and iCloud) based on 10 interviews and 65 Web survey responses. We analysed the data qualitatively and quantitatively. The results consist of reasons for the most positive and negative experiences and descriptions of current habits and motivations of the CSS users.
    [Show full text]
  • Cloud-Based Architecture of Raspberry Pi: Personal Cloud Storage
    Global Journal of Computer Science and Technology: B Cloud and Distributed Volume 19 Issue 1 Version 1.0 Year 2019 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online ISSN: 0975-4172 | Print ISSN: 0975-4350 | DOI: 10.17406 Cloud-based Architecture of Raspberry Pi: Personal Cloud Storage By Faisal Khalil-Ur-Rehman & Muhammad Farooq Limkokwing University of Creative Technology Abstract- The research explained the reason why we need personal cloud storage. This research will show steps on how to build a personal cloud storage by using credit card size Raspberry Pi (minicomputer), which will help the user to enable cloud storage mode to their external hard drive. However, other cloud storage services like Dropbox, Google Drive, and iCloud gives limited amount of storage. This research will help the users to use (1TB) or above size external hard drive to be use and have access anywhere from any device over internet. Also the second part of this research focus on replace the laptops to raspberry pi that lecturers use in the classroom to play PowerPoint slides, and videos at university. Keywords: raspberry Pi, cloud storage, cost benefit-analysis, low cost-computing, university classrooms. GJCST-B Classification : H.3.m Cloud-basedArchitectureofRaspberryPiPersonalCloudStorage Strictly as per the compliance and regulations of: © 2019. Faisal Khalil-Ur-Rehman & Muhammad Farooq. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creative commons.org/licenses/by-nc/3.0/), permitting all non- commercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
    [Show full text]
  • The Live Web Series from Personal Computers to Personal Clouds
    The Live Web Series From Personal Computers to Personal Clouds The Advent of the Cloud OS Phillip J. Windley, Ph.D., Kynetx Other Authors in this Series Craig Burton, KuppingerCole Scott David, K&L Gates, LLP Drummond Reed, Respect Network Corp. Doc Searls, The Searls Group April 2012 The Live Web Series sets forth a vision for the future of the Internet and our interactions on it. This paper is the first paper in that series. Future papers in this series will build upon the ideas presented here to show how personal clouds form a foundation for richer and more satisfying online applications and experiences. There’s no doubt that clouds are big business. A 2011 report from research firm Gartner (http://www.gartner.com/it/page.jsp?id=1739214) put worldwide software as a service (SaaS) revenue at $12.1 billion, a 20.7 percent increase from 2010 revenue of $10 billion. The SaaS-based delivery will experience healthy growth through 2015, when worldwide revenue is projected to reach $21.3 billion. SaaS is just one component of the overall cloud services sector which a 2010 Gartner Research report projected to grow to $148.8 billion by 2014. While much of the growth in cloud computing is in the enterprise space—especially infrastructure and platform plays like Amazon and Rackspace—there is significant activity in the area of personal cloud computing. Point solutions like Dropbox along with more holistic offerings like Apple’s iCloud and Google’s suite of products are all part of the personal cloud space. Through their personal cloud offerings, companies like AppleTM, GoogleTM, and FacebookTM vie for the attention of Internet users.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • My Cloud EX2 Ultra Private Cloud Storage Software
    My Cloud™ EX2 Ultra Private Cloud Storage User Manual WD Service and Support Should you encounter any problem, please give us an opportunity to address it before returning this product. Most technical support questions can be answered through our knowledge base or email support service at http://support.wd.com. If the answer is not available or if you prefer, please contact WD at the best telephone number shown below. Your product includes 30 days of free telephone support during the warranty period. This 30-day period starts on the date of your first telephone contact with WD Technical Support. Email support is free for the entire warranty period and our extensive knowledge base is available 24/7. To help us keep you informed of new features and services, remember to register your product online at http://register.wd.com. Accessing Online Support Visit our product support website at http://support.wd.com and choose from these topics: Downloads—Download drivers, software, and updates for your WD product. Registration—Register your WD product to get the latest updates and special offers. Warranty & RMA Services—Get warranty, product replacement (RMA), RMA status, and data recovery information. Knowledge Base—Search by keyword, phrase, or answer ID. Installation—Get online installation help for your WD product or software. WD Community—Share your thoughts and connect with other WD users. Learning Center — Start here to get the most out of your Private Cloud Storage device (http://www.wd.com/setup). Contacting WD Technical Support When contacting WD for support have your WD product serial number, system hardware, and system software versions available.
    [Show full text]