Cloud Tutorials

1. Power On a VM from ESXI command line

By: Kelly G : 2022年05月16日

Description: Steps to Power On a VM from ESXI command line

(追記) (追記ここまで)

2. How to change the virtual machine name in Azure

By: Jason : 2020年06月01日

Description: I accidentally created a long name for my VM in azure and I am not sure how to change the name to make it shorter while connecting from ssh


3. Install OpenStack step by step guide

By: Sheldon : 2020年04月05日

Description: If you have a spare Server or a PC that you want to use and try out OpenStack, then you have come to the perfect step by step guide tutorial. If it is a bare metal, then you should first install a fresh Ubuntu 16.04 or later in that server before you proceed.

(追記) (追記ここまで)

4. What is Puppet?

By: Sheldon : 2020年04月05日

Description: Puppet is a pioneering configuration automation and deployment orchestration solution for distributed apps and infrastructure. The product was originally developed by Luke Kanies to automate tasks for sysadmins who would spend ages configuring, provisioning, troubleshooting and maintaining server operations.


5. How to get the API key for CloudStack

By: Binoy : 2018年02月14日

Description: You can generate the CloudStack API Keys from the CloudStack admin portal.

(追記) (追記ここまで)

6. Mac with Google Apps

By: Eskalin : 2012年10月24日

Description: The google calendar has to be synced with iCal. However, the outlook calendar doesnt sync with iCal properly. These are the issues.


7. HA and DR in a cloud environment such as Amazon EC2

By: William Alexander : 2012年10月20日

Description: When you have decided to move your application hosting to the cloud such as amazon ec2 instances, the common question is how can High Availability and Disaster Recovery can be achieved in a cloud environment.

(追記) (追記ここまで)

8. Backup and recovery in a cloud environment such as Amazon EC2

By: Emiley J : 2012年10月20日

Description: Although the High Availability design of the architecture takes care of most of the common failure points, different levels of the technical stack, from the virtual hardware to the business applications, require different approaches to backup and recovery.


9. Application Security in a cloud environment such as Amazon EC2

By: Emilley J : 2012年10月20日

Description: In addition to the inbuilt security of any IAAS architecture such as Amazon EC2, the application itself should enforce security between its webservers, application servers and database servers. This is achieved by the use of Security Groups and grouping the servers in their own security groups. This is explained in the diagram below.

(追記) (追記ここまで)

10. Security and Privacy Management in the Cloud

By: Emiley J : 2012年10月20日

Description: Any application in the SaaS model hast to be designed from the ground up with Security and Privacy in mind. The development strategy starts by understanding the cloud application stack as shown in figure below and identifying the malicious attacker. The attacker can be of two types namely Insider and Outsider.


© 2023 Java-samples.com

Tutorial Archive: Data Science React Native Android AJAX ASP.net C C++ C# Cocoa Cloud Computing EJB Errors Java Certification Interview iPhone Javascript JSF JSP Java Beans J2ME JDBC Linux Mac OS X MySQL Perl PHP Python Ruby SAP VB.net EJB Struts Trends WebServices XML Office 365 Hibernate

Latest Tutorials on: Data Science React Native Android AJAX ASP.net C Cocoa C++ C# EJB Errors Java Certification Interview iPhone Javascript JSF JSP Java Beans J2ME JDBC Linux Mac OS X MySQL Perl PHP Python Ruby SAP VB.net EJB Struts Cloud Computing WebServices XML Office 365 Hibernate

AltStyle によって変換されたページ (->オリジナル) /