Importance of Virtualization in the Amazon EC2 Cloud
In this post, I have selected the Amazon EC2 cloud service as a good use case to illustrate the importance of cloud virtualization in IaaS cloud service model. What is...
Read full article βShowing 64 articles in the Cloud & Big Data category.
β Back to all categoriesIn this post, I have selected the Amazon EC2 cloud service as a good use case to illustrate the importance of cloud virtualization in IaaS cloud service model. What is...
Read full article βThere are numerous ways in which enterprises can leverage the cloud computing services. Each of the cloud computing service models come with its own advantages, and the variety of options...
Read full article βHave you ever wondered what makes the service a βcloudβ application? Or alternatively, how does any app become cloud based? The following article dives a little deeper into this often-asked...
Read full article βThe following post is a short guide on how to expire Amazon S3 objects by means of defining a simple lifecycle rule. In this tutorial, we'll be deleting all files...
Read full article βFollowing are slides from Amazon AWS Innovate 2017 Toronto hosted on 10th of May 2017. AWS Cloud Adoption Framework 01-cafroadshowshawn-170511000505 Implementing Windows - Workloads on the AWS Cloud 02-awswindowstorontoinnovate-170511000500 SAP...
Read full article βI would like to start my initial post by quoting Paul Maritz, CEO of VMware who stated that βCloud is about how you do computing, not where you do computingβ...
Read full article βThe following article explores the technological convergence of Intelligent Personal Assistant (IPA). More specifically, it analyzes the emerging technology of Smart Voice-Enabled Wireless Speakers and how the IPA technology transitioned...
Read full article βThe following article analyses how anonymization methods and various other obfuscation techniques fare in their undertaking to defend against the privacy concerns. Personally Identifiable Information (PII) & Privacy Enhancing Technologies...
Read full article βNowadays, it is the volume, velocity, veracity and variety of Big Data that are the primary factors and true amplifiers of the security issues experienced in the large-scale cloud infrastructures....
Read full article βIn the following post, I cover the brief history of Enterprise Data Warehouse (EDW), analyze the major challenges of Enterprise Data Warehouse solutions and discuss traditional EDW and their capacity...
Read full article β