Archives

All posts for the month February, 2012

Cloud Computing Security

Cloud computing is an emerging paradigm for large scale web application deployment. While cloud computing may reduce the complexity and costs of web application deployment, it also introduces new risks and requires a fundamentally different approach to security. Traditional security approaches such as firewalls and network intrusion detection are either impossible or inappropriate for cloud applications. New risks include loss of governance, failure of compliance with regulations that assume infrastructure is physical rather than virtual, an expanded attack surface resulting from the connection between your organization and the cloud, and hypervisor attacks that may enable attackers on the same physical server to access your data. This talk will address how these risks occur in the context of cloud computing and will examine ways to mitigate them.

G-Cloud security

One major impediment to the adoption of cloud computing has been a fear of placing sensitive data up ‘in the cloud’. That’s an especially serious concern for government officials charged with managing services such as healthcare, criminal justice, and defense, that require the storage of highly personal or secret information. It’s one reason why governments want to create their own cloud networks, rather than run their services on public cloud systems. And it helps explain why the first technology to be highlighted in HP’s

G-Cloud Demonstrator¬†focuses¬†on G-Cloud security. “One of the things we’re doing is simulating an attack on a G-Cloud network, so you can see an attack happening and then see how the G-Cloud protects itself and overcomes the threat.”.

http://www.youtube.com/watch?v=zMsWaEqQcbI

Distributed Sensor Systems: Practice and Applications

This book focuses on the distinct but tightly inter-related areas of development for distributed sensing systems

In this book, the authors discuss the technological developments lead by sensor technology, addressing viable new applications to inspire a technological evolution. Under the advanced and visionary approach of distributed intelligence, the authors focus on three distinct but tightly inter-related areas of developments for distributed sensing systems (DSS): firstly, the sensor technology embracing the conversion of the phenomena of interest into desirable form of signal such as electric, secondly, the interaction process between sensing points which requires immense intelligence loosely called networking, and finally, the adoption of useful maturing systems through potential applications for right impacts for a better life and a brighter economy. Furthermore, the book contains a number of case studies and typical applications illustrating the technical details, features and functions of the systems, as well as demonstrating their benefits and limitations.

Key Features:

  • Discusses the technological developments lead by sensor technology
  • Addresses viable new applications
  • Contains a number of case studies and typical applications illustrating the technical details, features and functions of the systems
  • Demonstrates the benefits and limitations of distributed sensing
  • Written by experts with vast experience in the field (both in academia and industry)

This book will be an invaluable reference for postgraduates studying related courses (communication engineering, engineering management, computer systems, industrial process, automation, design, environmental, urban, surveillance), R&D engineers, system and application designers, researchers, industrial project managers and engineers, and technical and strategic managers planning new products.