Wednesday, August 21, 2013

Cloud Computing Services Model

Cloud based IT resources can be consumed for various reasons in myriad ways. That the IT industry has really rallied around three standard cloud computing services models:

Infrastructure as a service (IaaS): This is really the most basic cloud service model, aligning the on demand resources of the cloud with tactical IT needs. In this way, IaaS is similar to managed services offerings of the Internet era (i.e., hosting services, storage service providers (SSPs), etc.). The primary difference is that cloud resources are virtual rather than physical and can be consumed on an as needed basis. In other words, enterprise consumers pay for virtual machines (VMs), storage capacity, and network bandwidth for a variable amount of time rather than servers, storage arrays, and switches and routers on a contractual basis. Typically, enterprises have no control over the underlying cloud technology. As described above, IaaS can be utilized as a temporary resource or used for years at a time. IaaS prices are based upon two factors: IaaS resource consumption and the duration of use.

Platform as a service (PaaS): Simply stated, PaaS provides the capability to build or deploy applications on top of IaaS. Typically, a cloud computing provider offers multiple application components that align with specific development models and programming tools. For the most part, PaaS offerings are built upon either a Microsoft based stack (i.e., Windows, .NET, IIS, SQL Server, etc.) or an open source based stack (i.e., the “LAMP” stack containing Linux, Apache, MySQL, and PHP).

Software as a service (SaaS): In this model, an entire business or set of IT applications runs in the cloud. Enterprise consumers outsource the entire underlying technology infrastructure to a SaaS provider and thus have no responsibility or management oversight for SaaS--‐based IT components. Users typically access these applications over the Internet through a thin client interface such as a Web browser. SaaS examples include Gmail from Google, Microsoft “live” offerings, and salesforce.com.

There is no hierarchy in these service offerings; rather, CIOs can choose any or all cloud service offerings that fit their needs.


Cloud Computing

What is cloud computing anyway? Skeptics might say it is nothing but industry hyperbole and visionaries might say it is the future of IT. In reality, both statements are true.

Large organizations are adopting cloud
Cloud computing builds upon current IT trends like data center consolidation and server virtualization. Enterprises will follow a pragmatic path to the cloud by adopting new technologies, transitioning from physical to virtual IT assets, and adapting existing IT best practices to a new dynamic world.

The network acts as the foundation for cloud computing
Cloud computing moves Web based applications to the Internet inexorably tying user connectivity and productivity to networking equipment. Of all networking technologies available, WAN optimization will play a major role in the transition to the cloud. As this happens, WAN optimization must become a virtual service, support mobile users, support innovative applications and protocols, and provide network visibility at a lower level.

Demystifying Cloud ComputingLook at any technology magazine or go to any IT trade show; regardless of where you look, everyone is talking about cloud computing.

ESG believes that a detailed characterization of cloud computing must include three things:

The consumption model: Cloud computing offers a unique way to consume compute, network, and storage resources.

The services model: Cloud computing can be used as a platform for different activities up and down the technology stack.

The deployment model: Cloud computing is not a one size fits all platform. Rather, there are numerous ways to deploy and utilize clouds.

Tuesday, August 20, 2013

How to make Folders Inaccessible by everyone ?

To make your folders inaccessible
1. Open cmd.
2. Change to the directory where your folder is located. cd <dir_name>
3. cacls <directory name> /e /p everyone:n
4. Now noone, including you can not open or delete that folder/directory.

To remove the restrictions, again follow from step 1 and 2.
5. cacls <directory name> /e /p everyone:f
Thats it. Now you can protect your folders from unauthorised access.

How to hide drives for your security & privacy ?
Hide your Drives for security & Privacy. This is a great trick you can play on your friends. To disable the display of local or networked drives from your computer follow the steps.

Go to Start-> Type regedit in the Run command window

Now it opens the Registry, do these things very carefully
Click on HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Now in the right pane of the Registry click right mouse button and select DWORD to create a new DWORD item and give name as NoDrives (it is case sensitive).
Now modify DWORD (NoDrives) value and set it to 3FFFFFF (Hexadecimal).

Now restart your computer, now when you click on My Computer no drives will be shown!

To display the drives in My Computer window
Repeat the 1 and 2 steps
Now delete the DWORD (NoDrives) shown in the Registry right pane.

Again restart your computer. You can see now all the drives displayed again.