Cloud computing technology

Cloud computing technology is not new, it has been around for a long time. To avoid getting lost in too technical terms, describe cloud computing as hosting networks, servers, applications and information storage outside physical locations known to the user. We often talk about cloud computing or virtual computing. Basically, for a company, it is renting servers elsewhere rather than owning them. This technology makes it possible, for example, to host your website in India, or on a Pacific island.

It has become possible thanks to the appearance of very powerful equipment that has lowered the price of storage and accommodation. In comparison, 1 GB of space in 2000 was the same as 1000 GB (1 terabyte) today.

What’s the difference for us, poor fisherman?
Without our choosing, most of our personal information is kept in the cloud. Take the example of e-mail services. Our privacy no longer resides on the hard drive of our computer; it is stored somewhere on a server in Asia. And most often, we do not even have a copy. 99% of Internet users do not keep any copy of their email on their hard drive.

How many people also place all their photos on social networks like Facebook, without even keeping digital copies or not at home? We rely too much on these free services and the safeguarding of our information. Take multifunction phones like the iPhone which now offers the iCloud feature, which hosts all your phone content on an external server, to prevent you from losing your information in case of breakage, theft or loss. Apple offers you 5 GB of free space, in order to keep you as a customer, and especially that you are sold to their cloud.

There are several other storage services like Amazon EC2, Windows Azure or Google App Engine. For my part, I use DropBox, which offers free 2 GB of space and a bonus of 500 MB each time I invite a friend to subscribe to the service. But for less than $ 100 a year, you get 100GB of space. Dropbox even offers to replace the hard drive of your computer by offering that all your documents are systematically copied to the cloud, in real time. Convenient since you can access your information anytime, anywhere in the world and on any computer.

Dangers?
For a company, the biggest danger is probably the possibility of an intrusion into the confidential information of the company, since their network is no longer partitioned as before. The availability of networks is the other sword of Damocles hanging above the heads of companies. For an individual, the crucial issue is no doubt the protection of privacy and theft of one’s identity.

My recommendation to my clients is always make sure to store your essential information on services worthy of mention and especially to keep a copy of your precious documents at home, in a safe place.

Data Security In Cloud Computing

Businesses and governments are migrating more workloads to the cloud. However, some companies remain insensitive to the considerable strengths of the cloud amid persistent fears about data security in the context of cloud computing. Although their concerns are understandable and rightly implemented, data security in cloud computing can match or surpass the data security of traditional on-premise computing platforms.

Why can data security in cloud computing equal or surpass the data security of traditional IT platforms?

For starters, it’s important to answer the question What is the Cloud? According to the most common Cloud Computing definition, cloud providers make computing resources and applications available to users as a measured service that they can access over the Internet. Cloud services are typically categorized into Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), such as raw processing power or cloud storage.

By its very nature, Cloud Computing requires the user to give some control over to his service provider. But control and security are not synonymous. In fact, data security in cloud computing can be superior to traditional enterprise data centers for the same reasons that have a positive impact on the market as a whole: economies of scale and the division of labor.

How Akamai helps preserve data security in Cloud Computing

Akamai operates the world’s largest web content delivery network (CDN). This network consists of more than 160,000 servers in over 95 countries and broadcasts up to 30% of global Internet traffic. Akamai helps customers (service providers and businesses) deliver Web content and applications to their end users faster and more reliably. Akamai also offers a suite of integrated security solutions within its market-leading CDN. Akamai’s cloud-based security solutions protect against major cyber threats such as DDoS attacks, SQL injection and XSS attacks, as well as some less familiar Internet-based attacks.

Akamai’s security solutions are highly scalable and offer a globally distributed advanced defense line that detects and defeats attacks before they reach your data center. We offer solutions specifically designed for cloud service providers as well as solutions for organizations running applications in public clouds or using their own private cloud.

With a growing adoption of cloud computing technologies, security issues have become a real concern for businesses. Taking into account the unique nature of these problems, from the beginning of the implementation plan, is the guarantor of a permanent investment. This course provides you with deep and practical experience in identifying and resolving public and private cloud (cloud) security issues.

Tribune – Cloud Security: What Trends In 2017?

As every year, the big game of predictions of new trends is in full swing. So I decided to offer some thoughts on the cloud market and security by relying on the latest developments that I have seen.

Threats to IoT will force nations to engage in international fight against piracy

After the incidents that hit critical infrastructures in France, the United States and Ukraine this year, and faced with the risks of piracy of electronic voting machines, the administrations of many countries have decided to take up the problem of cyber espionage with arms. the body. If the United States has succeeded, through closed-door diplomatic negotiations, in reducing China’s computer attacks on private sector companies, piracy of connected objects is a challenge for the United States. another dimension.

On the defense side, the European Union has enacted legislation calling for a minimum of cybersecurity measures to protect critical infrastructure, and the US is expected to follow suit in 2017.

Strict regulations affect corporate cybersecurity policy

Consumer privacy laws are meant to act as a deterrent and punish security breaches that lead to data breaches. However, until now, regulators seem to have limited themselves to mere reprimands. At the instigation of Europe and the new General Data Protection Regulation (GDPR), the data protection authorities are increasing their vigilance and reviewing the amount of the fines upwards. The importance of the financial penalties imposed at the end of 2016 for violating the HIPAA regulations and EU directives on personal data set the tone for the coming year. There is no doubt that the entry into force of the GDPR in 2018 will encourage international companies to introduce additional controls for the protection of confidentiality.

Data breaches affecting cloud service providers sensitize businesses to the risks of the “logistical fabric”

The Cloud has transformed the traditional supply chain into a “logistics canvas” where trading partners exchange data via digital gateways on the Internet. An average company deals with 1,555 different business partners via cloud services, and 9.3% of files hosted in the Cloud and shared externally contain sensitive data. In the new cloud economy, data passes into the hands of more people than ever before. A data breach can affect the external partner of a company whose IT department and purchasing department have never heard of.

Restructuring IT departments with the promotion of CISOs

With the advent of virtualization, information technology occupies such a strategic place in the business that CIOs now assume the role of chief operating officer and CEO. In 2017, security will become a driving force for strategic business, both in internal systems and products. Today, all companies use software, so they need the expertise of software security providers. In 2017, security will confirm its role as a competitive advantage by helping CISOs reduce time to market for products and ensure the confidentiality of customer and employee data.

My Computer In The Cloud

Preamble: on the road to C2i1 academic certification

This MOOC is part of the MOOC collection “Numerical Skills and C2i”. The first 4 MOOCs of this collection make it possible to train to the skills of the C2i reference level 1 (C2i1). The present MOOC trains all the skills of the D1 domain of this repository: “Work in an evolving digital environment”. At the end of this MOOC you will be able to obtain a free certificate of follow-up of the MOOC.

You aim for the certification of your skills? You will be able to register for a university and national certification, the C2i level 1, and accomplish at the end of this MOOC a step towards the certificate by officially validating the domain D1. Special moments during this MOOC will be dedicated to the preparation for certification of the corresponding field: methodology of elaboration of the digital skills file, methods of certification MCQ and contact to higher education institutions certifying associated with the MOOC. Registration for certification is not free about the course

This MOOC is part of the MOOC collection “Numerical Skills and C2i”. The first 4 MOOCs of this collection open in 2014 and make it possible to train to the C2i level 1 skills.

The day before yesterday, the computer has transformed the way we work individually.

Yesterday, networks have transformed the way we work together.

Internet, then allowed us to access documents, data, regardless of their location.

Today, everything happens in the cloud: wherever we are, from a simple phone, we can communicate, produce, share, collaborate.

All this is possible thanks to efficient techniques, put in place by the giants of the internet. The choices we make for hardware, software and services are not simple and we do not always understand the implications, whether it’s interoperability, security, protecting our data, and more broadly freedom of action. This MOOC’s main objective is to bring you knowledge to enlighten your choices, and basic technical skills to evolve in this complex digital environment.

Format: this MOOC is planned over 7 weeks, and proposes:

Basic on training: videos, multiple choice questions and practical activities, to acquire the essential knowledge and put it into practice simply and directly; an additional optional course: assignments to be conducted solo or in teams, to test your skills in real-life situations and to build up your digital skills record for certification.

At the beginning of this MOOC, you will decide if you just want to train at least, or if you want to invest in the optional course complement. The first week will be devoted to the introduction to the theme of this MOOC and to the discovery of the principles of elaboration of a numerical record of skills that can be valorized in itself (in particular to expand an e-portfolio) and useful to present oneself to the C2i level 1 certification. This will allow you to determine for one or the other option.

Who should attend to?

This course is for people who want to improve their digital skills for personal, professional, or educational purposes.

Prerequisites

The prerequisites are those of an intuitive digital practice, without any specific requirement.

Cloud Computing Explained To Dummies

Cloud computing, or “cloud computing”, is everywhere. But this computer concept is still vague for the general public. Catch up session.

The phenomenon of “cloud computing” is becoming more and more widespread in companies and the general public is starting to know it in the form of remote storage services, or streaming music. The cloud is on everyone’s lips.

Bernard Ourghanlian is technical director and security of Microsoft France. For L’Express, he explains what the cloud is, and what he point.

How do you define cloud computing?

The general public has long used cloud computing without knowing it. When you use your webmail, Hotmail, Gmail or other, we make the cloud. Cloud computing is accessing computer resources that are somewhere through the internet. It can be accessed for free, as is the case with the webmail. On subscription, with a guaranteed level of service, Companies buy capacity, and are billed a little like water, gas or electricity: we pay for consumption. Like the electric current, you can consume as much as you want. Virtually, the power is infinite.

Can we say that cloud computing is a revolution for IT?

It is an economic revolution, but not technological. Because of it is based on long established technologies.

What is the interest of cloud computing?

It is mostly economic. If you are a very small company, you can launch a service without any capital investment in hardware. Thus, virtually no software start-up is investing in heavy equipment today. The second advantage is to be able to benefit from economies of scale that have economic repercussions. For example, IT resources that are not used by French companies at night, are by companies on the other side of the planet. It’s like a 24-hour factory with shared resources. This allows, for example, businesses such as e-merchants, who have a peak load at Christmas and much less charge the rest of the year, to have the necessary resources during this peak without investing in capabilities they would not use the rest of the year. That’s how Amazon started cloud services initially. They had invested in huge capacities and sought to amortize them.

What allows us to do the cloud, which we could not do before?

For example, preserve the context when changing terminals. Example: You start an Xbox Live game on your Xbox console, and you continue to play on your mobile phone.

Where are these computer resources, which are no longer local? Are some of them in France?

They may be “in the cloud”, they are on Earth, in giant datacenters that are a dozen times the size of a football field, and are filled with machines. At Microsoft, two datacenters are currently under construction. We have one in Europe, in Dublin, which has cost $ 500 million, and we have a backup in Amsterdam, which we rent to hosts. The further a data center is from the user, the longer the response time. We know how to increase the bandwidth but not decrease the latency of requests. For the general public, basically only couriers are hosted in France.

The problem is that data is held by a small number of companies, and access is based on maintaining an internet connection.

The big players in the cloud are indeed few. Google, Amazon, Microsoft, Salesforce. For more security, for businesses, there are private clouds, which are not shared. The goal is to have the same benefits, but to keep control of the environment. This type of service is offered by many actors, such as hosting companies, IBM …

As far as the general public is concerned, is it possible to know where the stored data are?

The average Internet user can not know. These data can also move. No commitment is made at this level vis-à-vis the general public.

Can the general public also lock their data in a private area, a digital safe?

This kind of service exists. To make sure that no one can access it, including the provider, you have to encrypt the data. Thus, only the user has the keys of his safe. As long as you want to store private data, it works. But copies of keys on a large scale, today we do not know how to do. If you want to share and collaborate, allow a large number of people to search in a field of encrypted data (in business for example), it is not possible because the response time becomes a lot of diving. It’s the grail of today’s cloud research.

Cloud Computing: Which Solutions Favor French Companies?

The need for cloud computing solutions has evolved considerably in France over the last 10 years. While the SaaS model is still in the majority and should remain at the top of the list by 2020, MARKESS analysts note a strong increase in demand for IaaS¹ solutions since 2012. These can cover different needs ranging from online access to storage resources, data backup (including PRA), hosting and / or application execution.

The move to the cloud definitely seduces French companies, but …
French companies are increasingly resorting to hybrid approaches, by combining different forms of cloud between them for their infrastructures.

Be it real-time applications, big data, connected objects, or artificial intelligence, IT decision-makers understand that cloud computing is a great model to support their innovation projects. .

However, 57% of these decision makers believe that the move to the cloud is complicating their approaches to security and data protection, and over 75% say that the RGPD will affect their approaches in this area².
The use of the cloud continues its progression on the French market
While the majority of IT decision-makers believe that their companies still favor SaaS applications, the analysis of needs expressed by 2020 reveals that:

the needs for transverse applications in SaaS mode (messaging, collaboration, content management, electronic signature, analytics …) should pass those emanating from the professions (HR, marketing, sales, customer relations, accounting, purchasing, finance …),
demand for IaaS solutions should be closer to SaaS,
the need for vertical SaaS solutions should almost double, while remaining behind other solutions, perhaps because of their youth on the market (many startups invest in this field in the image of FinTech, AssurTech, BioTech …)

Choose a reliable, private and hosted cloud infrastructure

Fujitsu puts its extensive and deep expertise in the field of IT infrastructure (processing, storage and networks) at the service of cloud computing. No need for a physical server for each application, resources can now be shared, virtualized and automated. Plus, they’re just a few clicks away from a self-service browser-based portal. Our cloud infrastructure solutions deliver the flexibility and adaptability you’re looking for with the security and quality of service you expect from Fujitsu. And most importantly, Fujitsu offers you different delivery options. The Fujitsu Global Cloud Platform is a solution that provides maximum flexibility at a low cost by securely and transparently sharing underlying computing resources with other resources to provide you with a secure, fully virtual environment. service. Private Hosted IaaS gives you greater customization possibilities, managed services, and physical or virtual resources of your choice. Our fully on-premise cloud solutions with partners such as Microsoft give you automated cloud flexibility in your own data center.

Data Security In The Cloud: What Do Hosting Providers Do?

Data security in the cloud remains a barrier for some companies wanting to adopt this technology for their applications or IT infrastructure.

According to a recent study by PAC (Pierre Audoin Consultants), security is the first obstacle to cloud adoption in France. A certain mistrust therefore exists. However, hosts and providers who own data centers take many steps to provide businesses with a level of security similar to what they can have on site within their premises.

The company and its service provider: necessary support and transparency

When adopting a cloud architecture, it is important to clearly define the need of the company because different security rules will result. That is why a host must know his client and perform a real personal support to help him make the best choices. The definition of the project will lead the host and the client to turn to the public, private or hybrid cloud – depending on the performance needs but also the critical and sensitive nature of the data.

Different security rules apply depending on the structures chosen. For public and hybrid cloud infrastructures, hosts implement strict isolation between different clients. Thus, a user on the same server can not, by a devious way, access the virtual machine of another user.

In the case of the private cloud, this problem does not arise because the server is dedicated, but different access rights to the physical servers are set up to guarantee the security of the data.

Full transparency between the company and its service provider is therefore essential. Several points need to be addressed to ensure that all security measures are put in place

The location of data centers: some hosts have multiple data centers. It is therefore necessary for the client company to be able to know where its data is located geographically. Ideally, it should even be able to choose the location of these in order to decide by which legislation the data will be governed.

Audit and contract guarantees: the chosen provider must be able to demonstrate through various audits that all security rules are optimal and up-to-date. This allows the client company to ensure the seriousness of the provider. In terms of contracts, a reversibility agreement must be included to ensure that customers have the opportunity to regain control of their data and infrastructure at any time.

Consistent Data Availability: Data security is also about ensuring that data is available at all times and will not be lost – even if there are technical issues. A good service provider must provide the business with a Disaster Recovery Plan (PRA), which will duplicate the data and cloud infrastructure so that it remains available even if the initial servers encounter a problem. This PRA can be set up with the same provider, if it has several data centers, or in collaboration with another host.

Securing data in motion

Data security therefore depends on the quality of the relationship and the administrative transparency with its provider, as well as the purely technical quality of its offer.

Data is vulnerable when in motion. This is why feeds are highly secure by trusted hosts. By using an encryption system, an arsenal of firewall and dedicated links between content creation points and the cloud, the host ensures the integrity of the data. All transfers to and from the cloud guarantee that data will not be modified via various protocols when in transit. These can also be monitored and archived as a log, a third-party monitoring tool. Several parameters are thus verifiable such as the exact moment of transmission of the stream, if the data has been modified, and by whom.

Data governance is also an important aspect of securing. Access policies must be stringent so that encryption keys are not in all hands. In addition, the hosts are implementing a protocol of access rights to physical servers, doubled by numerous anti-intrusion measures, to ensure their customers that only certain people will have access to the servers.

Data in the cloud is therefore subject to different rules to ensure both their confidentiality, their integrity but also their availability at any time. Personalized support and a relationship of trust with a host, coupled with quality offers, thus ensure the security of data in the cloud and remove the main obstacle preventing some organizations from adopting this IT architecture.

Does Oracle Want To Hide Its Weakness In The Cloud By Merging Its Results Iaas, Paas And Saas?

Oracle has reported the results of its quarterly activity in the cloud by adding revenue in SaaS, PaaS, and IaaS, rather than segmenting them as usual. Some see a willingness of the publisher to hide its weakness in hosted services.

Oracle has decided to change the way it communicates to the public, and especially its shareholders, about its financial performance in the cloud. So far, the publisher separated the turnover from this activity into two major components: those from the Saas, on the one hand, and those from PaaS and IaaS, on the other hand. Things have changed since the publication of the accounts for its fourth quarter of 2018. Now, all these revenues are accumulated and things do not stop there. During a conference call last week, Oracle co-CEO Safra Katz explained what her single cloud billing line consists of: “We combined SaaS billing, PaaS and IaaS with those generated by license updates, support for cloud services and license support. In other words, Oracle is not content to no longer segment its revenue in the cloud, it does not even report more specific line services hosted in its accounts.

The Real Share Of The Cloud Dropped In Q4

In the fourth quarter, aggregate billings from all of these businesses increased 8% to 60% of Oracle’s $ 11.3 billion (+ 3%) of total revenue. It did not really impress investors. The price of the Oracle action has indeed unscrewed by 7% after the publication of these figures, however, higher than the expectations of analysts. Perhaps because Oracle’s true cloud aggregation (SaaS, PaaS, and IaaS only) accounts for $ 1.7 billion in revenue, or 15 percent of overall business, compared to 18 percent. in the previous quarter. As everyone knows, Oracle has historically marketed database applications for on-premise deployment. For some time, he sees in the cloud a huge growth opportunity. In fact, the figures of its cloud activity were often well highlighted during its financial communications.

A Change Explained By The Launch Of The BYOL Option

Safra Katz justifies the change in reporting decided by Oracle by the recent introduction of the Bring Your Own License option in the publisher’s pricing model. “BYOL allows users to transfer their existing on-premise licenses to Oracle’s cloud as long as they continue to pay for support related to those licenses,” she explains. This model makes the purchase of new licenses more advantageous, even if they are only intended for use in the cloud. As a result, our license revenue is now a combination of revenue from new cloud licenses and new on-premise licenses. Our revenue from support is also a combination of cloud license support billing and on-premise license support. ”

Is that clear? Not really. The leader explains that because users take a hybrid approach, these revenues can not be segmented more finely and so they are all classified in the cloud box. From there to see in this wobbly argument a will of Oracle to want to hide his weakness in the cloud, there is only one step. Safra Katz denies: “Previously, all these licenses and associated support would have been fully accounted for in our on-premise income, which they are clearly not”.

Tencent Open Source Its Tars Microservices Management Project

The Chinese Tencent becomes Platinum member of the Linux foundation and open source its frameworks, Tars and TSeer. The first deals with microservice management, the second with service discovery and registration. In March, Tencent had already created an AI project with 9 other suppliers, including Baidu, Huawei and ZTE.

Tencent, one of China’s leading providers of web services, becomes a Platinum member of the Linux Foundation alongside its fellow Huawei. This means that it supports the foundation overseeing part of the major global open source projects for more than $ 500,000 annually. By becoming a Platinum member, the Shenzhen-based group also brings one of its directors to the board of directors of the Linux Foundation. This is Liu Xin, general manager of Tencent’s mobile Internet entity. Two other Chinese suppliers, Alibaba and Baidu, are also Gold members of the foundation, spending $ 100,000 a year to support the organization.

In the process, Tencent announces that it is open source two of its projects under the leadership of the Linux Foundation. The 1st, Tars, is a high performance RPC framework designed for the development, implementation and maintenance of microservices. It is based on service naming using the tars protocol and provides a platform for semi-automatic operation. The project allows users to execute remote procedures and supports C ++, Java, Node.js, PHP and Python languages. It comes with a build system and a code generation tool for agile development. The 2nd project, TSeer, is a light version of Tars. This fault-tolerant framework enables service discovery and registration. It is used in Tencent products such as QQ Browser, the App Store or Mobile Manager and handles an average of 10 billion queries per day. In a statement, Zeng Yu, vice president of Tencent, said the Chinese group has more than 10 years of experience managing interactions with a massive number of users, “which allows Tars and TSeer to optimize fully load-balancing and fault-tolerant systems. ”

Founding member of LF Deep Learning Foundation

This increased involvement of Tencent in open source comes just months from the creation in March, already within the Linux Foundation, of LF Deep Learning Foundation. This project aims to support innovation in artificial intelligence, machine learning and deep learning by making these technologies available to developers. Tencent is among its founding members alongside three other Chinese suppliers, Baidu, Huawei and ZTE, and nine other members, including Frenchman Orange. The Shenzhen Group is contributing to the LF Deep Learning Foundation through its Angel Artificial Intelligence Project, a high-performance distributed machine learning platform it has developed with Peking University. The description of this platform, cut for big data models, mentions that it can support more than one billion parameters. At the end of 2017, Tencent was the first Chinese technology company to be valued more than $ 500 million on the Hong Kong Stock Exchange, ahead of Alibaba. The latter, also very involved in artificial intelligence, announced February AI services in its cloud in Europe.

Cloud Screener Builds On Its Consulting Business To Grow

The French start-up Cloud screener specialized in comparing and measuring the quality of cloud offers has developed a consulting activity. By the end of the year the latter should represent 40% of the company’s business knowing that recruitment will come to strengthen it in 2019.

The French company Cloud Screener led by Anthony Sollinger is getting stronger in cloud computing consulting. Credit. D.R

Offering a cloud comparison service for the past 5 years – and since 2016, as far as the quality of this type of offer is concerned – the French start-up Cloud screener has been expanding its business into consulting to develop better. “When we created the company, we were not in the business of consulting companies, but only proposing tools,” said Anthony Sollinger, co-founder and CEO of Cloud screener. “We managed to launch a consulting offer by recruiting 5 dedicated consultants, deployed to customers”.

Far from being alone in the cloud consulting market (Capgemini, Atos, Devoteam …), Cloud screener is putting some strengths to make the difference. “We have implemented a proven methodology designed with Inria on different clouds,” continues Anthony Sollinger. “We are able to run performance tests on machines, look at virtual server behavior, processor speed, RAM, run multiple tests and track them over time.” Among the first customers of Cloud screener’s consulting offer, for example, LVMH is “to see more clearly in their private cloud, analyze the results and compliance of what is delivered by their suppliers to have a better understanding of internal operations and carry out the necessary corrective actions, “says Anthony Sollinger. Among the historical customers of the cloud offering is DINSIC, which runs Cloud screener benchmarks on their Cloudwatt-based public cloud infrastructure to verify that the provider’s quality of service commitments are compliant and consistent  required.

Already 12 customers for cloud consulting missions

“We come with expertise based on profiles of consultants with a technical background and the ability to go to the customer. They are more like juniors with 3 years of experience, “says Anthony Sollinger. The goal of Cloud screener is to make its consulting business one of the pillars of its business. While last year represented a quarter of its business, it is expected to account for 40% of the company’s revenue by the end of the year. Recruitment followed and will continue in 2019 with a projected increase in teams of 50%, bringing the total workforce to a little more than fifteen. “The idea is to make recurring sales with the board,” predicts Antony Sollinger. This seems well started: of the 60 current customers (Docapost, GRDF, Unibail …), 12 have started or already carried out cloud consulting missions with the French start-up.