Displaying articles for: 04-22-2012 - 04-28-2012
In my last blog post in the series “Tracing Data for Provenance, Transparency and Accountability in Cloud Computing”, I discussed how data is taking centre stage in cloud computing, and how current system tools are unable to effectively log file accesses and transfers within a Cloud environment.
These two factors call for a data-centric, detective approach which enables data events in the cloud to be captured, recorded and analyzed. We need a solution that enables all cloud stakeholders to monitor data files in the cloud and ensure that they remain where should be.
In this post, I want to introduce our proposed TrustCloud framework for managing the information in the cloud, as well as the granularities of data logs collected.
Contributed by Simon Firth, freelance technology journalist
Next to every pair of overhead lights in HP Labs’ headquarters office – in a facility known as Building 3 – you’ll find a small white disk, the size of a smoke alarm.
Each disk connects to a dimmer that controls the room’s lighting nearby and inside each disk is a tiny wireless transmitter that connects to a central server. Thanks to these commercially available third-party devices, it’s possible to remotely adjust the lighting at a building-wide scale down to the illumination of a single desk.