摘要:
Systems, methods and apparatus, including computer program products, are disclosed for regulating access of consumers (e.g., applications, containers, or VMs) to resources and services (e.g., storage). In one embodiment, this regulation occurs through the movement of consumers between different providers of a resource or service, such as a cloud service provider. Moving consumers includes, for example, determining the cost of moving the consumer from a first provider to a second provider. According to various embodiments, the cost of moving the consumer is compared to cost and performance criteria associated with moving the consumer from the first provider to the second provider. Cloud-based services may be priced as templates, reserved instances, or a combination.
摘要:
Systems, methods and apparatus, including computer program products, are disclosed for regulating access of consumers (e.g., applications, containers, or VMs) to resources and services (e.g., storage). In one embodiment, this regulation occurs through the movement of consumers between different providers of a resource or service, such as a cloud service provider. Moving consumers includes, for example, determining the cost of moving the consumer from a first provider to a second provider. According to various embodiments, the cost of moving the consumer is compared to cost and performance criteria associated with moving the consumer from the first provider to the second provider. Cloud-based services may be priced as templates, reserved instances, or a combination.
摘要:
An inventive monitor monitors accesses to a resource in an electronic system, such that access to the resource is based on payments in electronic security value units. The monitor detects patterns of payments for the resource in electronic security value units, and compares the patterns of payments to predetermined patterns of payment. In addition, the monitor determines a difference in the compared patterns of payments to the predetermined patterns of payment, such that when the difference is greater than a predetermined threshold difference, an attack is indicated.
摘要:
Methods and systems allow for the creation, management and use of networks of people that trust each other in order to enable them to collaborate to transport objects or people. Information of users wishing to send objects or people is matched thereby with people having the capability to perform the transportation.
摘要:
A network utilizes electronic security value units to prevent unauthorized access to resources in the network. The network includes at least a resource manager and an electronic bank server (e.g., the local resource bank). The resource manager determine a pricing strategy in electronic security value units for a group of one or more resources in the network. The electronic bank server selectively distributing electronic security value units to a client in the network, where the electronic security value units are unique to a group of one or more resources. Accordingly, access to a resource in the group, by the client, is determined by at least the above pricing strategy and by an amount of electronic security value units distributed to the client.
摘要:
Systems, methods and apparatus, including computer program products, are disclosed for regulating access of consumers (e.g., applications, containers, or VMs) to resources and services (e.g., storage). In one embodiment, this regulation occurs through the movement of consumers between different providers of a resource or service, such as a cloud service provider. Moving consumers includes, for example, determining the cost of moving the consumer from a first provider to a second provider. According to various embodiments, the cost of moving the consumer is compared to cost and performance criteria associated with moving the consumer from the first provider to the second provider. Cloud-based services may be priced as templates, reserved instances, or a combination.
摘要:
Systems, methods and apparatus, including computer program products, are disclosed for regulating access of consumers (e.g., applications, containers, or VMs) to resources and services (e.g., storage). In one embodiment, this regulation occurs through the movement of consumers between different providers of a resource or service, such as a cloud service provider. Moving consumers includes, for example, determining the cost of moving the consumer from a first provider to a second provider. According to various embodiments, the cost of moving the consumer is compared to cost and performance criteria associated with moving the consumer from the first provider to the second provider. Cloud-based services may be priced as templates, reserved instances, or a combination.
摘要:
Systems, methods and apparatus, including computer program products, are disclosed for regulating access of consumers (e.g., applications, containers, or VMs) to resources and services (e.g., storage). In one embodiment, this regulation occurs through the movement of consumers between different providers of a resource or service, such as a cloud service provider. Moving consumers includes, for example, determining the cost of moving the consumer from a first provider to a second provider. According to various embodiments, the cost of moving the consumer is compared to cost and performance criteria associated with moving the consumer from the first provider to the second provider. Cloud-based services may be priced as templates, reserved instances, or a combination.
摘要:
A method for identifying a particular component of an electronic system that accesses a resource of the electronic system using electronic security value units is described. First, electronic security value units are selectively distributing to a plurality of components, such as to a client, of the electronic system. Next, a unique first association is created with each individual component to which the security electronic security value units are distributed. Further, upon a particular access to a resource, a unique second association is created between particular ones of security electronic security value units and the particular access to the resource. In addition, the unique second association is analyzed to determine which particular security electronic security value units were used to access the particular resource. Then, the first association of the particular security electronic security value units is analyzed to determine the identity of the component which accessed the resource.