摘要:
Described herein is technology for managing cloud storage. In particular, systems, devices and methods for managing cloud storage are described. In some embodiments, management of cloud storage may result in the designation of storage allocated to a first storage pool as obsolete, and the reallocation and/or reclamation of such storage to a second storage pool and/or a general cloud storage pool. Management may occur in accordance with one or more policies.
摘要:
Computer-readable storage medium, apparatus and method associated with management of data elements in a cloud computing environment are disclosed herein. In embodiments, one or more computer-readable storage medium may contain instructions which when executed by a computing apparatus may facilitate a user in managing the user's data elements in a cloud computing environment. In embodiments, this may be accomplished through the use of management metadata associated with the user's data elements. Other embodiments may be described and/or claimed.
摘要:
Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of servers of a computing cloud. The service monitor, in response, may identify one or more requests of the computing cloud to attempt to improve performance of the services provided by the application service. Other embodiments may be disclosed and claimed.
摘要:
A system and method provide for mapping a virtual core of a computing system to an external computing resource and intercepting an instruction directed from an application resident on the computing system to the virtual core. The intercepted instruction may be sent to the external computing resource for processing.
摘要:
A system and method may provide for defining a usage policy for an available resource of a personal computing system, and transmitting the usage policy to a market broker. The market broker may identify a match between the usage policy and a request from another computing system, and generate a notification of the match. In addition, funds may be transferred from an account associated with the other computing system to an account associated with the personal computing system based on a remote usage of the available resource by the other computing system.
摘要:
Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of servers of a computing cloud. The service monitor, in response, may identify one or more requests of the computing cloud to attempt to improve performance of the services provided by the application service. Other embodiments may be disclosed and claimed.
摘要:
A system and method provide for mapping a virtual core of a computing system to an external computing resource and intercepting an instruction directed from an application resident on the computing system to the virtual core. The intercepted instruction may be sent to the external computing resource for processing.
摘要:
A system and method may provide for defining a usage policy for an available resource of a personal computing system, and transmitting the usage policy to a market broker. The market broker may identify a match between the usage policy and a request from another computing system, and generate a notification of the match. In addition, funds may be transferred from an account associated with the other computing system to an account associated with the personal computing system based on a remote usage of the available resource by the other computing system.
摘要:
Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.
摘要:
Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.