Components of OpenStack
Components of OpenStack Nova Glance Neutron Swift and Cinder
Components of OpenStack Nova Glance Neutron Swift and Cinder
OpenStack is a cloud computing software platform which facilitates building and managing cloud computing platforms. OpenStack provides IaaS and offers compute, network and storage resources
The network of servers deployed for distributing content conforming to the requirements of fast delivery and high bandwidth is called a CDN. Since video streaming will be used by large number of users Content Distribution Network required to establish
Business Continuity Plan- BCP is a system or methodology used to create a plan on how an organization will resume its partially or completely interrupted critical functions within a predetermined time after the occurrence of a disaster or disruption. The aim is to keep critical functions operational.
Analyzing criticality of the business process Applications supporting the processes Cost Time required to recover Security
Data Security means to protect intellectual property and to identify, monitor, and protect valuable data
Easy Methods to improve Email Security Restricting access to messages to their intended recipients Maintaining the integrity of messages Authenticate and verify the source of messages Verify the delivery of messages Classify sensitive content within or attached to messages
“A way to reduce costs by consolidating services onto the fewest number of physical machines” Virtualization is a broad term that refers to the abstraction of resources across many aspects of computing One physical machine to support multiple virtual machines that can run in parallel.
Cloud computing is a modern technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources like , networks, servers, storage, applications that can be rapidly provisioned and released with minimal management effort or service provider interaction
Easy steps to Protect Corporate Data Assess the inventory and risk Update systems with latest service patches and Signatures Use Firewall’s and Anti-virus program Implement ISMS policies Restrict downloading dubious software Access controls and authorization Block the removable mediums