<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-254947516016146767</atom:id><lastBuildDate>Thu, 05 Sep 2024 04:25:45 +0000</lastBuildDate><category>Cloud Computing</category><category>linux</category><category>Amazon Web Services</category><category>virtualization</category><category>Amazon</category><category>Salesforce.com</category><category>begining of  cloud computing</category><category>cloud</category><category>java</category><category>mysql</category><category>security</category><category>AWS micro instance</category><category>Abiquo</category><category>Benefits of Cloud Computing</category><category>Big data</category><category>DynamoDB</category><category>Salesforce</category><category>Utility Computing</category><category>alfresco</category><category>aws cloud</category><category>centos</category><category>cloud components</category><category>cost</category><category>disaster recovery</category><category>flexibility</category><category>iCloud</category><category>multi-tenancy</category><category>noSQL</category><category>paas</category><category>project managers and cloud computing</category><category>rightscale</category><category>saas</category><category>scalr</category><category>shell script</category><category>virtual computing</category><category>/bin/bash</category><category>AWS Linux instance</category><category>AWS VPC</category><category>AWS types of Instances</category><category>Access</category><category>Advances in cloud computing</category><category>Agile Software Development</category><category>Amoeba</category><category>Application Layer</category><category>Aserver</category><category>Back Up in cloud</category><category>Backbone of Service</category><category>Bit</category><category>BlueLock</category><category>Business atmosphere</category><category>Businesses and the Cloud</category><category>CRM</category><category>CRM system</category><category>CSC</category><category>Capability of operations</category><category>Carelessness</category><category>Cloud Computing Companies</category><category>Cloud Computing history</category><category>Cloud Corporate Intranet</category><category>Cloud Deployment Implications</category><category>Cloud Hosting</category><category>Cloud disaster</category><category>Cloud-Stored Files</category><category>Cloud.com</category><category>Cloudo</category><category>Cloudy world</category><category>Community Edition</category><category>Consumer Electronics Show</category><category>CorneliOS</category><category>Customer communication</category><category>DaaS</category><category>Data</category><category>Data Link Layer</category><category>Data import/export</category><category>Deployment models of cloud</category><category>Dish network</category><category>ERP</category><category>Efficiency</category><category>Elastra</category><category>Email Clutter</category><category>Enomaly</category><category>Eucalyptus</category><category>European Organization for Nuclear Research</category><category>Everyone in cloud</category><category>File transfer using puppet</category><category>Firewalls</category><category>Freemium</category><category>Gartner</category><category>Ghost</category><category>Glide</category><category>Gmail</category><category>Google</category><category>Heartbeat</category><category>IBM</category><category>IT and cloud</category><category>Identity Management</category><category>Industry Secrecy</category><category>Integration of Business Technology</category><category>JDBC</category><category>Joli OS</category><category>Joyent</category><category>Kohive</category><category>Liferay 6.0.5</category><category>Linux Programming</category><category>Linux SWAP Partition</category><category>Lucid Desktop</category><category>MAC</category><category>MS music</category><category>Marc Benioff</category><category>Mashup</category><category>Microsoft</category><category>Netflix</category><category>Network Dependency</category><category>Network Layer</category><category>NewScale</category><category>Nimbula</category><category>Open Access</category><category>OpenNebula</category><category>OpenQRM</category><category>OpenStack</category><category>Opportunities in cloud</category><category>PHP</category><category>Particle Physics</category><category>Pay as you go</category><category>Physical Layer</category><category>Physical Servers</category><category>Postgresql</category><category>Power of cloud</category><category>Presentation Layer</category><category>Public Networks</category><category>ROI</category><category>Rackspace</category><category>SAP</category><category>Salesforce Outlook integration</category><category>Scalability in cloud</category><category>Security Risks</category><category>Service Guarantees</category><category>Session Layer</category><category>Startforce</category><category>Subscribers still need IT skill</category><category>Subscription-based pricing</category><category>Television affected by cloud</category><category>The Application</category><category>The Client</category><category>The Cloud</category><category>The End User</category><category>The Platform</category><category>The Service</category><category>The Storage</category><category>Tracing Difficulties</category><category>Transport Layer</category><category>Trelo</category><category>VMWare vCloud Compatible clouds</category><category>Vendor lock-in</category><category>Verizon (Terremark)</category><category>Vertical Cloud</category><category>Virtual Servers</category><category>Workflow Automation</category><category>Workloads Locations</category><category>World of Cloud Apps</category><category>Zimdesk</category><category>about cloud as super power</category><category>amazon elastic beanstalk</category><category>apache tomcat</category><category>api</category><category>apple</category><category>application security</category><category>authkeys</category><category>auto scaling</category><category>autoscaling</category><category>backup</category><category>basics of puppet</category><category>bitnami</category><category>boot</category><category>brute-force attacks in cloud</category><category>byte</category><category>capability</category><category>characteristic of cloud computing</category><category>characteristics of physical servers</category><category>chatter</category><category>cisco</category><category>cloud Communities</category><category>cloud Data Recovery</category><category>cloud Distribution of Content</category><category>cloud Experts</category><category>cloud Outsourcing</category><category>cloud Replication</category><category>cloud Restore from Backup</category><category>cloud apps</category><category>cloud as super computer</category><category>cloud based ap</category><category>cloud based projects</category><category>cloud by NIST</category><category>cloud by mobile</category><category>cloud computing for project managers</category><category>cloud computing in business</category><category>cloud computing testing</category><category>cloud computing with example</category><category>cloud database</category><category>cloud enable applications</category><category>cloud faces</category><category>cloud filesystem</category><category>cloud for SMBs</category><category>cloud for business</category><category>cloud for job seeker</category><category>cloud for non-IT industries</category><category>cloud future</category><category>cloud migration</category><category>cloud network</category><category>cloud providers</category><category>cloud scalability</category><category>cloud security</category><category>cloud service provider</category><category>cloud software</category><category>cloud storage</category><category>cloud trends</category><category>cloud world</category><category>cloudera</category><category>cloudfoundry</category><category>cloudstack</category><category>cluster</category><category>community cloud</category><category>crowdDirector</category><category>cut cost by cloud computing</category><category>database</category><category>delay</category><category>different devices for cloud</category><category>direct access</category><category>directory structure</category><category>dropbox</category><category>ec2 instances</category><category>eclipse</category><category>efficiency in cloud</category><category>exabyte</category><category>eyeOS</category><category>facebook</category><category>ftp</category><category>get cloudy</category><category>gigabyte</category><category>grid computing</category><category>gridfox</category><category>higgs boson</category><category>history of cloud computing</category><category>hotmail</category><category>how to test cloud</category><category>httpd</category><category>hybrid cloud</category><category>hybrid kernal</category><category>hybrid model</category><category>iPad</category><category>innovation</category><category>installation</category><category>iterative methods for software development</category><category>kaavo</category><category>kernal</category><category>kernal architecture</category><category>kilobyte</category><category>l2/l3</category><category>liferay</category><category>linux file structure</category><category>linux kernal</category><category>load balancing</category><category>location</category><category>media devices</category><category>megabyte</category><category>micro kernal</category><category>mobile computing</category><category>mobility</category><category>monitis</category><category>monolithik kernal</category><category>mor.ph</category><category>myGoya</category><category>openoffice</category><category>oracle</category><category>osi model</category><category>past of cloud</category><category>patch</category><category>petabyte</category><category>physics</category><category>pixlr</category><category>plugin sdk</category><category>poweroff</category><category>principles of agile model</category><category>private cloud</category><category>professionals</category><category>prons and cons of cloud</category><category>public cloud</category><category>pupper server</category><category>puppet</category><category>puppet client</category><category>puppet installation</category><category>puppet introduction</category><category>quickstart</category><category>rPath</category><category>reboot</category><category>rmi</category><category>root password</category><category>safe cloud</category><category>service cost</category><category>service-oriented architecture</category><category>sharepoint</category><category>shutdown</category><category>soa</category><category>software as a service</category><category>solr with alfresco</category><category>ssl certificate for solr</category><category>standards</category><category>symlified</category><category>terabyte</category><category>test scenario</category><category>testing in cloud</category><category>testing types in cloud</category><category>the Functions in Cloud Computing</category><category>tomcat 6 n 7</category><category>traditional computing</category><category>traditional outsourcing in cloud</category><category>trust</category><category>understanding of cloud</category><category>useradd</category><category>users</category><category>virtual machine</category><category>virtual storage</category><category>webdata backup</category><category>why cloud computing</category><category>why cloud?</category><category>windows azure</category><category>yahoo</category><category>zettabyte</category><title>Cloud Magic World</title><description>all about cloud era...</description><link>http://cloudbyuchit.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>75</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="http://3.bp.blogspot.com/-PItxGDpfZVE/T6IvISQVAUI/AAAAAAAAAC8/6OAYBmm6osI/s220/images.jpg"/><itunes:keywords>cloud,computing,cloud,world,cloud,architecture</itunes:keywords><itunes:summary>all aboutcloud era...</itunes:summary><itunes:subtitle>all aboutcloud era...</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-6553506130154045692</guid><pubDate>Wed, 11 Mar 2015 09:32:00 +0000</pubDate><atom:updated>2015-03-11T15:02:35.548+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">basics of puppet</category><category domain="http://www.blogger.com/atom/ns#">File transfer using puppet</category><category domain="http://www.blogger.com/atom/ns#">pupper server</category><category domain="http://www.blogger.com/atom/ns#">puppet</category><category domain="http://www.blogger.com/atom/ns#">puppet client</category><category domain="http://www.blogger.com/atom/ns#">puppet installation</category><category domain="http://www.blogger.com/atom/ns#">puppet introduction</category><title>File Transfer using Puppet</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;






&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:DocumentProperties&gt;
  &lt;o:Revision&gt;0&lt;/o:Revision&gt;
  &lt;o:TotalTime&gt;0&lt;/o:TotalTime&gt;
  &lt;o:Pages&gt;1&lt;/o:Pages&gt;
  &lt;o:Words&gt;582&lt;/o:Words&gt;
  &lt;o:Characters&gt;3323&lt;/o:Characters&gt;
  &lt;o:Company&gt;Opex&lt;/o:Company&gt;
  &lt;o:Lines&gt;27&lt;/o:Lines&gt;
  &lt;o:Paragraphs&gt;7&lt;/o:Paragraphs&gt;
  &lt;o:CharactersWithSpaces&gt;3898&lt;/o:CharactersWithSpaces&gt;
  &lt;o:Version&gt;14.0&lt;/o:Version&gt;
 &lt;/o:DocumentProperties&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:PixelsPerInch&gt;96&lt;/o:PixelsPerInch&gt;
  &lt;o:TargetScreenSize&gt;800x600&lt;/o:TargetScreenSize&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;JA&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="276"&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="0" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";}
&lt;/style&gt;
&lt;![endif]--&gt;



&lt;!--StartFragment--&gt;

&lt;div class="MsoNormal"&gt;
&lt;b style="font-family: 'Times New Roman'; font-size: 13pt;"&gt;Installation&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman'; font-size: 14pt;"&gt;Server:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sudo apt-get install irb libopenssl-ruby
libreadline-ruby rdoc ri ruby ruby-dev&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sudo apt-get install puppet puppetmaster&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 14.0pt;"&gt;Client:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;sudo apt-get install irb libopenssl-ruby
libreadline-ruby rdoc ri ruby ruby-dev&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sudo apt-get install puppet&lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 14.0pt;"&gt;Configration&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 14.0pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style="text-indent: -23.25pt;"&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;1)&lt;span style="font-size: 7pt; font-weight: normal;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style="text-indent: -23.25pt;"&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Both side: server and
client&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: 15.0pt;"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: 'Times New Roman'; font-size: 13pt;"&gt;1.1)&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: 'Times New Roman';"&gt;Edit: gedit /etc/hosts&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: 15.0pt;"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Set syntax below:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Server ip:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;192.168.10.56&amp;nbsp; puppetserver.example.com &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Client ip: &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;192.168.10.14&amp;nbsp; puppetclient.example.com&lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp; &lt;b&gt;2) Puppet
server&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;2.1) Edit puppet.conf:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman'; text-indent: 35.45pt;"&gt;gedit /etc/puppet/puppet.conf&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-left: 70.9pt; text-indent: 35.45pt;"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: 'Times New Roman'; text-indent: 35.45pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Set
syntax below:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;pluginsync=false&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;certname = puppetserver.example.com&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;(This name will be puppet server name for certificate)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;2.2) Create Folder in Puppet:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;2.2.1) Step - 1:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;make folder in /etc/puppet/
which name is 'files'&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;At cmd:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;mkdir /etc/puppet/files&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;2.2.2) Step - 2:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;make folder 'testing' in
'files' folder which will clone at client side&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;At cmd:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;mkdir
/etc/puppet/files/testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Copy testing source and paste /etc/puppet/files/testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;At cmd: &amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;cp&amp;nbsp; -r / tesing /&amp;nbsp; /etc/puppet/files/testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;2.3)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;Edit&amp;nbsp; fileserver.conf&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;gedit
etc/puppet/fileserver.conf&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Set
syntax below :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;[files]
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;path /etc/puppet/files &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;allow * &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;#&amp;nbsp; deny
*.evil.example.com &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;allow 192.168.10.14&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;[plugins]
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;allow * &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;#&amp;nbsp; deny
*.evil.example&lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;.com
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;allow 192.168.10.14&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;2.4) Create 'site.pp'
file in /etc/puppet/manifests/&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Add below code :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; class sudo {&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
file { "/ tesing ":&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;mode =&amp;gt; "644",&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;owner =&amp;gt; 'root',&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; group =&amp;gt; 'root',&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp;ensure =&amp;gt; directory,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp;recurse =&amp;gt; true, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp;purge =&amp;gt; true, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp;force =&amp;gt; true, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;
source =&amp;gt; 'puppet:///files/ tesing’&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;}&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;node
puppetclient {&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
include sudo&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;}&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b style="font-family: 'Times New Roman';"&gt;Restart puppetserver&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;cmd: &amp;nbsp;/etc/init.d/puppetmaster restart&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: 'Times New Roman'; font-size: 13pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;3) Puppet client&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;3.1) Edit puppet.conf&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;gedit
/etc/puppet/puppet.conf &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Set
syntax as given below:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;certname
= puppetclient.example.com &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;(This
name is puppet client name for certificate)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;server
= puppetserver.example.com&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;runinterval
= 60&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;3.2) &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Restart&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt; puppet&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: 'Times New Roman';"&gt;cmd: &amp;nbsp;/etc/init.d/puppet restart&lt;/span&gt;&lt;span style="font-family: 'Times New Roman';"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;4) Connect server and
client&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;Client side&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;As a command, for certificate request:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN"&gt;puppetd --server&amp;nbsp; puppetserver.example.com &amp;nbsp;--waitforcert 60 –test&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN"&gt;&amp;nbsp;&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN"&gt;(&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span lang="EN-IN" style="font-weight: normal; mso-bidi-font-weight: bold;"&gt;You should see
the following message.)&lt;/span&gt;&lt;span lang="EN-IN"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/strong&gt;&lt;em&gt;&lt;span lang="EN-IN"&gt;err: No certificate; running with reduced
functionality.&lt;/span&gt;&lt;/em&gt;&lt;strong&gt;&lt;span lang="EN-IN"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;em&gt;&lt;span lang="EN-IN"&gt;info: Creating a new certificate
request for pclient.example.con&lt;/span&gt;&lt;/em&gt;&lt;strong&gt;&lt;span lang="EN-IN"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/strong&gt;&lt;em&gt;&lt;span lang="EN-IN"&gt;info: Requesting certificate &lt;/span&gt;&lt;/em&gt;&lt;strong&gt;&lt;span lang="EN-IN"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/strong&gt;&lt;em&gt;&lt;span lang="EN-IN"&gt;warning: peer certificate won’t be verified
in this SSL session&lt;/span&gt;&lt;/em&gt;&lt;strong&gt;&lt;span lang="EN-IN"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/strong&gt;&lt;em&gt;&lt;span lang="EN-IN"&gt;notice: Did not receive certificate&lt;/span&gt;&lt;/em&gt;&lt;em&gt;&lt;b&gt;&lt;span lang="EN-IN" style="font-style: normal;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN"&gt;Server side&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;Use command as shown below:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN"&gt;puppetca --list&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN" style="font-weight: normal;"&gt;Then Display&amp;nbsp;client request like below:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN"&gt;puppetclient.example.com
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN" style="font-size: 13.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;Then sign the
certificate.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;To sign the certificate, use below command&lt;strong&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span lang="EN-IN" style="font-size: 13.0pt;"&gt;puppetca
–sign puppetclient.example.com &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&lt;br /&gt;
Signed puppetclient.example.com&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;If
everything went OK you should see this message on puppetclient.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;em&gt;&lt;span lang="EN-IN" style="font-size: 13.0pt;"&gt;info:
Requesting certificate&lt;/span&gt;&lt;/em&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&lt;br /&gt;
&lt;em&gt;warning: peer certificate won’t be verified in this SSL session&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;notice: Ignoring –listen on onetime run&lt;/em&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;em&gt;&lt;span lang="EN-IN" style="font-size: 13.0pt;"&gt;info: Caching
configuration at /etc/puppet/localconfig.yaml&lt;/span&gt;&lt;/em&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;&lt;br /&gt;
&lt;em&gt;notice: Starting configuration run&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;notice: //puppetclient/test_class/File[/tmp/testfile]/ensure: created&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;info: Creating state file /var/lib/puppet/state/state.yaml&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;notice: Finished configuration run in 0.11 seconds&lt;o:p&gt;&lt;/o:p&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;if
everything is ok, client have folder named liferay-tomcat in filesystem.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;5)&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;If any problem to verify
certificate, use below command&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;find
/var/lib/puppet -type f -print0 |xargs -0r rm&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-IN" style="font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 13.0pt;"&gt;restart client and send
request by&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: 'Times New Roman'; font-size: 13pt;"&gt;going again to step (4).&lt;/span&gt;&lt;span style="font-family: 'Times New Roman'; font-size: 13pt;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;!--EndFragment--&gt;&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2015/03/file-transfer-using-puppet.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-3087307249176132428</guid><pubDate>Thu, 21 Aug 2014 06:56:00 +0000</pubDate><atom:updated>2014-08-21T12:26:53.997+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Amazon Web Services</category><category domain="http://www.blogger.com/atom/ns#">cloud</category><category domain="http://www.blogger.com/atom/ns#">database</category><category domain="http://www.blogger.com/atom/ns#">DynamoDB</category><category domain="http://www.blogger.com/atom/ns#">noSQL</category><title>Happy To Announce My Another Book - DynamoDB Applied Design Patterns</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;About This Book&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Create, design, and manage databases in DynamoDB&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Immerse yourself in DynamoDB design examples and user cases,
be it for new users or expert ones&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Perform sharding and modeling, to give your applications the
low cost NoSQL edge&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;Who This Book Is For&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
If you are an intermediate to advanced DynamoDB developer
looking to learn the best practices associated with efficient data modeling,
this book is for you.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;In Detail&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
DynamoDB provides fast and predictable performance with
seamless scalability. If you are a developer, you can use DynamoDB to create a
database table that can store and retrieve any amount of data, and serve any
level of request traffic. DynamoDB automatically spreads the data and traffic
across multiple Availability Zones in a Region to provide high built-in
availability and data durability. As a database administrator, you can create,
scale up or down your request capacity for the DynamoDB table without downtime
or performance degradation, and gain visibility into resource utilization and
performance metrics.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Designed as a complete solutions guide for AWS DynamoDb,
this book is a fully managed proprietary NoSQL database service pattern that is
offered by Amazon.com as part of the Amazon Web Services portfolio. You will
learn how to create, design, and manage databases in DynamoDB, using the AWS
SDKs, APIs as well as the AWS Management Console, followed by designing a
browser-based graphical user interface for interacting with the service.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
The book will include a significant number of examples that
can be used by new users and experts alike. The book begins with a description
on the concepts of data model including tables, items, and attributes, primary
key, indexes, and design patterns. You will learn to access DynamoDB in the
Management Console, command line, and eclipse plugin. You will also gain
insights into DynamoDB locals and CLI commands. Furthermore, global and local
secondary indexes and its importance in DynamoDB will be looked into. You will
then learn how to use Query and Scan operations in DynamoDB tables, along with DynamoDB
APIs and their formats. The book ends by covering the best design use cases
DynamoDB architectures along with real-time problem statements and their best
solutions.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
By the end of the book, you will have all that it takes to
efficiently use DynamoDB to its utmost capabilities.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;a href="https://www.packtpub.com/dynamodb-applied-design-patterns/book" target="_blank"&gt;Book Details -&amp;nbsp;DynamoDB Applied Design Patterns&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
ISBN13 &amp;nbsp;9781783551897&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Paperback &amp;nbsp;179&amp;nbsp;pages&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Even you can checkout my other titles on&amp;nbsp;https://www.packtpub.com/books/info/authors/uchit-vyas&lt;/div&gt;
&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2014/08/happy-to-announce-my-another-book.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-3141456521727100249</guid><pubDate>Thu, 02 Jan 2014 15:37:00 +0000</pubDate><atom:updated>2014-06-06T16:08:31.694+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">about cloud as super power</category><category domain="http://www.blogger.com/atom/ns#">cloud as super computer</category><category domain="http://www.blogger.com/atom/ns#">cloud computing in business</category><category domain="http://www.blogger.com/atom/ns#">cloud for SMBs</category><category domain="http://www.blogger.com/atom/ns#">cloud world</category><category domain="http://www.blogger.com/atom/ns#">Cloudy world</category><category domain="http://www.blogger.com/atom/ns#">get cloudy</category><category domain="http://www.blogger.com/atom/ns#">Power of cloud</category><title>Cloud Computing as an Alternative to Super Computers</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-family: inherit;"&gt;Cycle
Computing Company, which provides technical solutions for high-performance
computing (HPC), set a new record. The maximum power of a combined cluster
which is based on eight geographically distant data centers by Amazon running
on CycleServer exceeds 1.21 Tflops for eighteen hours. Each virtual machine had
about 9.3 of a processor core. It seems that the performance of such a cluster
could compete with the Japanese supercomputer Helios, it is at 20&lt;sup&gt;th&lt;/sup&gt;
place in the Top 500. However, the Executive Director of Cycle Computing Jason
Stowe explains that now we are talking only about overcoming the barrier within
the theoretical common performance of all&amp;nbsp;data-centers&amp;nbsp;of Amazon.&amp;nbsp; To demonstrate more than a quadrillion operations&amp;nbsp;per second on a specialized test programs like Linpack, it requires high speed
of data transmission and compute nodes which are physically close to each
other.&lt;/span&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shapetype id="_x0000_t75" coordsize="21600,21600"
 o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f"
 stroked="f"&gt;
 &lt;v:stroke joinstyle="miter"/&gt;
 &lt;v:formulas&gt;
  &lt;v:f eqn="if lineDrawn pixelLineWidth 0"/&gt;
  &lt;v:f eqn="sum @0 1 0"/&gt;
  &lt;v:f eqn="sum 0 0 @1"/&gt;
  &lt;v:f eqn="prod @2 1 2"/&gt;
  &lt;v:f eqn="prod @3 21600 pixelWidth"/&gt;
  &lt;v:f eqn="prod @3 21600 pixelHeight"/&gt;
  &lt;v:f eqn="sum @0 0 1"/&gt;
  &lt;v:f eqn="prod @6 1 2"/&gt;
  &lt;v:f eqn="prod @7 21600 pixelWidth"/&gt;
  &lt;v:f eqn="sum @8 21600 0"/&gt;
  &lt;v:f eqn="prod @7 21600 pixelHeight"/&gt;
  &lt;v:f eqn="sum @10 21600 0"/&gt;
 &lt;/v:formulas&gt;
 &lt;v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/&gt;
 &lt;o:lock v:ext="edit" aspectratio="t"/&gt;
&lt;/v:shapetype&gt;&lt;v:shape id="image01.jpg" o:spid="_x0000_s1027" type="#_x0000_t75"
 style='position:absolute;left:0;text-align:left;margin-left:1.5pt;
 margin-top:107.25pt;width:196.95pt;height:147.65pt;z-index:251658240;
 visibility:visible;mso-wrap-style:square;mso-wrap-distance-left:9pt;
 mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
 mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
 mso-position-horizontal-relative:margin;mso-position-vertical:absolute;
 mso-position-vertical-relative:text' o:allowincell="f" o:allowoverlap="f"&gt;
 &lt;v:imagedata src="file:///C:\Users\kareem\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg"
  o:title=""/&gt;
 &lt;w:wrap type="square" anchorx="margin"/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style="font-family: inherit;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: inherit;"&gt;However,
the purpose of a cluster is not to provide all available power for solving a
single task, and ensuring high performance for thousands individual virtual
machines, which do not require high-speed connections.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-family: inherit;"&gt;According
to the classical evaluation methodology the main cluster of Amazon (EC2) takes
"only" 127&lt;sup&gt;th&lt;/sup&gt; place in the last edition of the list of 500
the fastest supercomputers in the world. It consists of 2&amp;nbsp;128 8-nuclear
CPUs Xeon and demonstrates in Linpack 240 Tflops.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;Even
with such result cloud computing looks more attractive for most companies and
scientific institutions service, such as Amazon Elastic Compute Cloud, than
using supercomputer of any classical architecture. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-family: inherit;"&gt;To
get an opportunity to download one of such machines with the help of their
computing tasks is really difficult. You need to ground their importance and
await your turn (it is about six months). Then you need to rewrite your code
together with the programmers of the Supercomputer Institute and pay all
working days, without reference to the actual amount of computing. Cloud
platforms are available immediately; they are easily scaled and are much cheaper.&lt;/span&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape
 id="image00.jpg" o:spid="_x0000_s1026" type="#_x0000_t75" style='position:absolute;
 left:0;text-align:left;margin-left:259.5pt;margin-top:495pt;width:203.7pt;
 height:152.9pt;z-index:251659264;visibility:visible;mso-wrap-style:square;
 mso-wrap-distance-left:9pt;mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
 mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
 mso-position-horizontal-relative:margin;mso-position-vertical:absolute;
 mso-position-vertical-relative:text' o:allowincell="f" o:allowoverlap="f"&gt;
 &lt;v:imagedata src="file:///C:\Users\kareem\AppData\Local\Temp\msohtmlclip1\01\clip_image003.jpg"
  o:title=""/&gt;
 &lt;w:wrap type="square" anchorx="margin"/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-vIKvR6lK4Vk/UsWFJgRi05I/AAAAAAAAAWc/RyqVI_2tQ14/s1600/2.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;Mark
Thompson (Professor of Chemistry) comments his scientific needs in the
high-performance computing to the ArsTechnica magazine (his research team
develops new coatings for solar cells in order to make alternative energy more
efficient). &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-family: inherit;"&gt;Computer
simulation of the molecules’ properties of different compounds reduces the time
and sum of expenses a lot; it filters out less suitable substances at an early
stage without any need of physical work with them. &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;Thompson’s
Group used Schrödinger software package and cloud computing platform. Defining
the properties of 250 thousand potential candidates to the role of new cover
for solar panel took a week and cost $ 33 000. This work would require 2.3
million hours using traditional approach. In other words, it would be simply
impossible.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 13.5pt; text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;This
post has been initiated by my dear friend Paul Smith who is an experienced
writer, and also good at various things. Writing is his hobby. One can see his
posts on popular sites and &lt;a href="http://smartessaywritingservice.com/"&gt;writing
essays services&lt;/a&gt;. He likes to spend time in the open air.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2014/01/cloud-computing-as-alternative-to-super.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-3925354495382042350</guid><pubDate>Sun, 17 Nov 2013 14:15:00 +0000</pubDate><atom:updated>2014-06-10T12:14:29.215+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">characteristic of cloud computing</category><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">cloud scalability</category><category domain="http://www.blogger.com/atom/ns#">traditional computing</category><title>How Cloud Will Look Like in Future</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Cloud computing is turning to be the next big thing that is capable of handling information technology among companies, individuals and most governments. It has become the basic business innovation mechanism that is responsible of bringing significant improvements to businesses that rely on information technology. Businesses utilizing cloud computing aim at improving their profits, overall success and scalability. Due to the radical changes affecting technological departments, it is expected that cloud computing is likely to take a different direction in a bid to effectively serve businesses.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br style="background-color: white; color: #222222;" /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Enhanced democratization of technology&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Currently, cloud computing allows individual computer users to collaborate with everyone else in the virtual computing world. Future trends are expected to simplify these trends more by allowing people with little IT knowledge handle their duties effectively using special programs designed to control all the activities. Connection speeds to the cyberspace world are expected to be enhanced through introduction of cloud computing on similar computing devices. It should become very easier to access information from any institution you desire to collaborate with unlike it is now. Some of the expected technological advancements may appear technical and only applicable in scientific fiction movies but will certainly become reality at their ripe time.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br style="background-color: white; color: #222222;" /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;High expectations among employees&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Since technology will aim at simplifying everything in the business perspective, there will certainly be a rise in the type of employees that will come about. The future of cloud computing perceives the development of a different type of employees commonly refereed to as &lt;/span&gt;&lt;span style="line-height: 18.8889px; white-space: pre-wrap;"&gt;Millennials&lt;/span&gt;&lt;span style="background-color: transparent; line-height: 1.15; white-space: pre-wrap;"&gt;. They have extraordinary expectations about what they can achieve for their organizations. The regular cultural parameters will no longer constrain their performance. Extra characteristics such as cooperation and talent will be a major determining factor on the level of success a business attains.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br style="background-color: white; color: #222222;" /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Input vs output ratio&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Operation in most organizations is based upon some form of agility. This is partly occasioned by the radically changes affecting our economy. The rising economy demands that business operations be handled with uttermost care. A careful analysis of every business operation is required in order to determine how they could be enhanced. An efficient business should be capable of delivering more than the input incurred by the operators. The only way to achieve these is by making use of stronger cloud computing platforms.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br style="background-color: white; color: #222222;" /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;More economical growth&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;Economic constraints have been the major hindering factor in the adoption of cloud computing platforms in most businesses. This is the reason why the economy has performed poorly for a very long time. Many people safeguard their investments in traditional industries that risk the value of investments. &lt;/span&gt;&lt;span style="line-height: 18.8889px; white-space: pre-wrap;"&gt;&lt;a href="http://www.crucial.com.au/" target="_blank"&gt;Cloud computing&lt;/a&gt;&lt;/span&gt;&lt;span style="background-color: transparent; line-height: 1.15; white-space: pre-wrap;"&gt; is capable of creating a new generation of virtual economic powerhouses that will shift wealth acquisition from traditional industries to global markets that provide an enhanced market industry for the sale of products. The world is expected to be a better place with such quality marketing.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br style="background-color: white; color: #222222;" /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; color: #222222; line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: transparent; vertical-align: baseline; white-space: pre-wrap;"&gt;There is a general push for adoption of cloud computing by most businesses. Cloud computing comes in different types and choosing the appropriate can at times be a complex process. Future trends are expected to come with hybrid systems that are likely to be cheaper to handle and migrate to. Hybrid systems will balance a range of requirements covered in individual systems.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/11/how-cloud-will-look-like-in-future.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-2519345311647851630</guid><pubDate>Mon, 23 Sep 2013 11:39:00 +0000</pubDate><atom:updated>2013-10-23T17:34:04.972+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business atmosphere</category><category domain="http://www.blogger.com/atom/ns#">Capability of operations</category><category domain="http://www.blogger.com/atom/ns#">Customer communication</category><category domain="http://www.blogger.com/atom/ns#">Integration of Business Technology</category><title>Why Vertical and Horizontal Integration of Business Technology is Imperative?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;Technology
is arguably the tool that has enabled global business to reach the level it’s
at today. We as a population have created devices, applications and networks
that present nearly limitless potential when it comes to providing products and
services. &lt;a href="http://cloudbyuchit.blogspot.in/2013/08/company-communities-bringing-breath-of.html"&gt;&lt;span style="text-decoration: none; text-underline: none;"&gt;Communication within business&lt;/span&gt;&lt;/a&gt;
is at a place it’s never been before.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;However,
our economy is also competitive, with each entity vying to gain traction on the
next. Most successful businesses have state of the art technology, so it’s not
a matter of who has what, but how they utilize those resources to be successful
in a particular market niche.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;It all
boils down to how well a company integrates technology both horizontally and
vertically throughout its structure. The more multidimensional an employee base
is with regards to technology utilization, the better off the company will be
in this society. From there&lt;a href="http://www.blogger.com/blogger.g?blogID=254947516016146767" name="_GoBack"&gt;&lt;/a&gt;, people can do their jobs
most effectively and better help the customer receive and enjoy the offered
product or service.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;Below
are the ways that widespread knowledge of a company’s technology amongst
employees can help a business, and how tech influences operations overall.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 13pt; line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;Customer
communication&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;Technology
helps businesses communicate with customers and create transparency. In today’s
world people want to know how a business is doing things, why they’re doing
them that way and how quickly they’re executing. This creates a natural demand
for technology that enables all business areas to communicate with the
customers and partners being dealt with on the front line. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;If
employees in the financial department of a large corporation understand when
the batch processing in the data center happens each week, they can better
explain billing delays and similar situations to customers. The same goes for
all departments across any company. If one business sector understands the technology
in another unit, the efficiency of that particular frontline in their
experiences with customers and each other will go much more smoothly.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 13pt; line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;Capability
of operations&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;Technology
is the oil that has made operations across the international economy run so well,
and it’s no different on a micro level within a business. The more an employee
base knows about technology, both vertically and horizontally across a company,
the better they understand the operation as a whole. A team is best when all
players know each other’s skillset, and the same goes for a business. If the
marketing department understands what &lt;a href="http://www.silicus.com/"&gt;&lt;span style="text-decoration: none; text-underline: none;"&gt;software development&lt;/span&gt;&lt;/a&gt;
projects the IT professionals work on each day, everything makes more sense.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 13pt; line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;Business
atmosphere&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;Technology
integrated at all levels of a business creates an atmosphere that’s just better
for everyone. If business executives in the headquarters can communicate
instantaneously with the factory supplier two states away, clarity is
inherently a priority in business procedure and people are more comfortable
with one another. It used to be sufficient for a representative to speak and
communicate for an entire department, but it really doesn’t work that way
anymore. All touch points of a business need to relate to one another to create
a forum-type atmosphere. Technology does this.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;Most
thriving businesses have technology, but it’s what they do with it that
separates them and creates something special. The more intricately a company’s
tech is orientated throughout the business model, the greater success it will
find in this marketplace.&lt;/span&gt;&lt;span style="font-family: Times New Roman, serif;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/09/why-vertical-and-horizontal-integration.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-7972371626915749045</guid><pubDate>Fri, 16 Aug 2013 05:20:00 +0000</pubDate><atom:updated>2013-10-23T17:32:28.830+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">chatter</category><category domain="http://www.blogger.com/atom/ns#">cloud Communities</category><category domain="http://www.blogger.com/atom/ns#">Cloud Corporate Intranet</category><category domain="http://www.blogger.com/atom/ns#">cloud Distribution of Content</category><category domain="http://www.blogger.com/atom/ns#">cloud Experts</category><category domain="http://www.blogger.com/atom/ns#">Salesforce</category><category domain="http://www.blogger.com/atom/ns#">Salesforce.com</category><category domain="http://www.blogger.com/atom/ns#">World of Cloud Apps</category><title>Company Communities – Bringing a Breath of Fresh Air to Corporate Communication</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;Business
organizations these days are constantly striving to build a transparent and
pervasive network for all their employees in order to facilitate better
corporate communication. Keeping this challenge under consideration, cloud
software juggernaut&amp;nbsp;&lt;/span&gt;&lt;span style="color: windowtext; line-height: 115%; text-decoration: none;"&gt;Salesforce&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;&amp;nbsp;recently showcased an
ingenious new product called Company Communities that is designed to overcome
the one-dimensional, limited nature of corporate intranets. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;It aims to bring a much-needed
personalized experience by putting a strong emphasis on the mobile and social
features of corporate communication models.Sales&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;force hopes these features will encourage and enthrall
employees in their work. Just like smoking &lt;/span&gt;&lt;a href="http://saffireecigs.com/"&gt;&lt;span style="line-height: 115%;"&gt;Saffire
Vapor&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt; from your
e-cigs is a much healthier option than smoking cigarettes, Company Communities promises
to deliver exactly the same kind of efficient functionality for your corporate
communication platform.&lt;br /&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;How Company Communities Is Better
Than Your Corporate Intranet&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;Recent research studies have shown that nearly 80% of
employees in major organizations get their own mobile device for work, and 68%
of them are actively using it for &lt;a href="http://www.freeprwebdirectory.com/computers_and_internet/world_wide_web/programming/"&gt;social&lt;/a&gt;  purposes in the workforce. Hence, the
demand for corporate mobile apps has drastically shot up, since employees feel their
work efficiency is maximized with the help of these tools.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;Company
Communities is aimed particularly at businesses that heavily invest in
corporate intranet services, but are held back due to the poor participation
levels of their employees. It takes a departure from the mundane and highly
formal corporate communication model and engages employees on the social front.
This is accomplished with the help of a diverse set of Android, iOS and Windows
apps that are tailor-made to give your network of employees the best possible
social interaction platform.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;Many cloud
experts and established Salesforce customers have called Corporate Communities
a deeper extension of its popular enterprise-networking platform, known as &lt;/span&gt;&lt;a href="http://www.salesforce.com/chatter/overview/" target="_blank"&gt;&lt;span style="color: windowtext; line-height: 115%; text-decoration: none;"&gt;Chatter&lt;/span&gt;&lt;/a&gt;&lt;span style="line-height: 115%;"&gt;.Company Communities does indeed capture the essence of
Chatter; however, it takes its service to a whole another level with the help
of a nifty set of tools that helps you accomplish the following tasks with
great finesse:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;·&lt;span style="line-height: normal;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="line-height: 115%;"&gt;Efficient Distribution of Content&lt;/span&gt;&lt;/b&gt;&lt;span style="line-height: 115%;"&gt; –
Your employees can now publish, review, approve and upgrade content they intend
to share with certain co-workers according to their organizational roles. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;·&lt;span style="line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="line-height: 115%;"&gt;Engaging Experts –&lt;/span&gt;&lt;/b&gt;&lt;span style="line-height: 115%;"&gt;&amp;nbsp;The
provision of a social profile for all employees ensures that anyone can easily
interact and seek information from other employees whose field of expertise
matches with the content required. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;·&lt;span style="line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="line-height: 115%;"&gt;Proficient Teamwork – &lt;/span&gt;&lt;/b&gt;&lt;span style="line-height: 115%;"&gt;Corporate
Communities allows all employees to conveniently access and share content as
well as obtain suitable advice on it. It facilitates better collaboration on
work projects and helps you assign them to the right experts in your organization.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="line-height: 115%;"&gt;·&lt;span style="line-height: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="line-height: 115%;"&gt;A Rich World of Apps –&lt;/span&gt;&lt;/b&gt;&lt;span style="line-height: 115%;"&gt;Salesforce provides
access to a strong suit of corporate apps as well as third-party tools that can
easily be downloaded by employees to cater to their specific work requirements.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo1; text-indent: -.25in;"&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style="line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;My best friend Michelle is a blogger and freelancer. She’s written about
almost every topic under the sun, and loves constantly learning about new
subjects and industries while she’s writing. In her spare time she enjoys
spending time outdoors with her dogs.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/08/company-communities-bringing-breath-of.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-8955785272029299492</guid><pubDate>Sat, 10 Aug 2013 23:48:00 +0000</pubDate><atom:updated>2013-08-11T05:18:54.613+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud Data Recovery</category><category domain="http://www.blogger.com/atom/ns#">Cloud Hosting</category><category domain="http://www.blogger.com/atom/ns#">cloud Outsourcing</category><category domain="http://www.blogger.com/atom/ns#">cloud Replication</category><category domain="http://www.blogger.com/atom/ns#">cloud Restore from Backup</category><title>Data Recovery and Cloud Hosting</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;span style="font-family: inherit;"&gt;Recovering data in a cloud environment may be new to
those who have recently made the switch to &lt;a href="http://www.iservercloud.com/our-services/cloud-hosting/"&gt;cloud computing&lt;/a&gt;.&amp;nbsp; Because more and more organizations are
migrating to the cloud, it is important to understand how to recover data in an
event that any data is lost due to a security incident.&amp;nbsp; There are a number of methods to go about
recovering data, and understanding each method is the first step in knowing
what to do in case you have a security problem.&amp;nbsp;
Below are three methods of data recovering as it pertains to cloud
hosting.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;&lt;span style="font-family: inherit;"&gt;Replication&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;span style="font-family: inherit;"&gt;Replicating data is one of the simplest and most relied
on form of backing up data.&amp;nbsp; When you
replicate data, you are simply placing your data on another system.&amp;nbsp; Doing this will give you backup data should
anything be lost on one system.&amp;nbsp; Although
this is one of the most popular methods of backing up data, it doesn’t
necessarily translate to 100% of your data being able to be recovered.&amp;nbsp; Some data may be lost.&amp;nbsp; Talk to a cloud computing professional about
what you can do to protect yourself using this particular method.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;span style="font-family: inherit;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;&lt;span style="font-family: inherit;"&gt;Outsourcing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;span style="font-family: inherit;"&gt;Many organizations will elect to outsource their disaster
recovery to a managed service provider.&amp;nbsp;
There is obviously a cost associated with this method, but managed
service providers are equipped to handle data recovery.&amp;nbsp; There is a great peace of mind knowing your
data can be recovered from professionals that focus primarily on this task. &amp;nbsp;If you make the decision to go this route,
make certain you understand the timeframe it generally takes to recover data
from the managed service provider you are considering.&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;&lt;span style="font-family: inherit;"&gt;Restore from
Backup&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;span style="font-family: inherit;"&gt;There is an automated process of backing up data to the cloud
that can be taken advantage of.&amp;nbsp; This
particular method is relatively safe and inexpensive, but backing up the data
can take hours depending on what was lost.&amp;nbsp;
If you consider this method, talk to a cloud computing expert about the
differences between interval backups and synced backups.&amp;nbsp; Each is different types of backup solutions
with pros and cons to consider.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: 11pt; line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;Regardless of what method you choose any route
you decide to take a wise choice.&amp;nbsp; You
want to make sure you backup your data and understanding what your options are
is a great first step at making the right decision for your business.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/08/data-recovery-and-cloud-hosting.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-2265599157669659790</guid><pubDate>Fri, 02 Aug 2013 04:38:00 +0000</pubDate><atom:updated>2013-08-02T10:08:34.617+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">begining of  cloud computing</category><category domain="http://www.blogger.com/atom/ns#">Benefits of Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">cloud</category><category domain="http://www.blogger.com/atom/ns#">safe cloud</category><title>Maintaining a Safe Cloud Computing Environment</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNoSpacing"&gt;
One of the most popular misconceptions about &lt;a href="http://www.iservercloud.com/our-services/cloud-hosting/"&gt;cloud computing&lt;/a&gt;&lt;a href="" name="_GoBack"&gt;&lt;/a&gt; is that data on the cloud is not safe and secure.&amp;nbsp; Although no storage data is 100% safe,
regardless of platform being used, cloud computing has proven to be just as
effective, if not more, than traditional hosting when it comes to
security.&amp;nbsp; As long as there are people
making every attempt to hack into systems to obtain information, there will
always be a focus on security, rightfully so.&amp;nbsp;
If you are considering using the cloud to store your data, we provide a
handful of tips for maintaining a safe cloud environment.&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-vp6UQ4WyG8E/Ufs3NNOalgI/AAAAAAAAAQo/BxMrXXX0Z7I/s1600/cloud-image.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="114" src="http://2.bp.blogspot.com/-vp6UQ4WyG8E/Ufs3NNOalgI/AAAAAAAAAQo/BxMrXXX0Z7I/s640/cloud-image.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;Use Email Wisely&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
Email is a fantastic tool to communicate, but it is also
a focal point for those looking to hack into systems and obtain sensitive
information.&amp;nbsp; If you need to relay a
username and/or password to another person, avoid using email.&amp;nbsp; Simply call the person and let them know what
that information is.&amp;nbsp; Emailing sensitive
information out such as usernames and passwords is a great way to have your
information compromised.&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;Be Clever&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
You would be surprised just how many people choose
“password” as their security password.&amp;nbsp;
Be clever when it comes to accessing your information.&amp;nbsp; Create passwords that are unique.&amp;nbsp; Also, when it comes to security questions and
answers, think outside of the box.&amp;nbsp; Don’t
answer the question of “what is your favorite color?” with “blue”.&amp;nbsp; Instead, use another name such as
“football”.&amp;nbsp; An unrelated response can
tighten your security measures considerably.&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;b&gt;Be Aware &lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
A simple way for someone to steal your information is to
simply look over your shoulder.&amp;nbsp; If you
are logging in from a remote location, be aware of what and who is around
you.&amp;nbsp; Avoid any high traffic areas and
try to do work with your back against a wall.&amp;nbsp;
This can help reduce the chances of your information being stolen.&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
Cloud computing is safe and reliable.&amp;nbsp; However you want to make sure you don’t leave
yourself open to having your data stolen and following the tips above will
help.&amp;nbsp; Before you make any computing
decision, be sure to do your research and understand the facts, especially when
it comes to cloud computing.&amp;nbsp;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/08/maintaining-safe-cloud-computing.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/-vp6UQ4WyG8E/Ufs3NNOalgI/AAAAAAAAAQo/BxMrXXX0Z7I/s72-c/cloud-image.jpg" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-1877665832681839634</guid><pubDate>Thu, 27 Jun 2013 07:26:00 +0000</pubDate><atom:updated>2013-10-23T17:46:44.557+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Physical Servers</category><category domain="http://www.blogger.com/atom/ns#">Virtual Servers</category><title>How physical servers are different from virtual servers?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="margin-bottom: 12pt;"&gt;
&lt;span style="font-family: inherit;"&gt;Most of
the hosting network services have two types of offers for dedicated servers of
which the first one enables users to order a physical one. As soon as it
arrives, it is setup on the racks and its operating system is installed. Now,
it is fully available to be accessed remotely. In the second case, the virtual
servers come into view wherein the physical layer is abstracted. This type
dedicated server enables users to get their very own servers which they can
start using immediately. Both these types of dedicated servers have their own
advantages which have been highlighted&lt;span style="font-family: inherit;"&gt; below&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Physical
Servers&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt;Users can get physical servers by following some simple steps that
include hiring a hardware provider who will install the hardware for the users.
The free rack unit will later be located by the technicians who will install
the server and connect the cables and power supply. Later, the desired
operating system is installed after consulting the user.&lt;br /&gt;
&lt;br /&gt;
Once the operating system and basic diagnostics are ready, the credentials are
delivered to the user. This will enable the users to access their server
remotely as well as to start installing the softwares that are needed by the
user. The hosting provider is responsible only for offering reboots and
hardware changes while the overall control of the server lies with the user.
Apart from that, they also provide fast connectivity of the network due to
which the server runs non-stop without any kind of problems.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Virtual
Servers&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt;The virtual dedicated servers or Infrastructure as a service is a way
for the users to get their very own machines. In order to get such virtual
dedicated servers, the users need to register their account with the hosting
service provider and confirm their email and identity. Once the users have
registered, the service provider’s control panel will be accessible to them. On
the control panel, the users have to click on ‘New VM’ after which they need to
select the operating system and wait for some time.&lt;br /&gt;
&lt;br /&gt;
This process will enable the users to get a new virtual machine by accessing it
through SSH or VNC. Since the IP address for the system is assigned
automatically, the users will be able to start installing the softwares on it.
The servers run at all times unless the users turn them off manually so the
users will be able to clone, erase, turn back on or even leave the server
paused. The users not only have the facility to pay for the usage of the server
by hour or capacity but are also able to increase or decrease power and cost
between minutes. The usage of this facility is fully based on the user or the
application being used. So, the users can choose whether they want this
facility to be automated. Click &lt;a href="http://www.vpshosting.com.hk/en/asia-cloud-hosting"&gt;here&lt;/a&gt; to
know more about virtual private server hosting.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;The
right tool&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt;There have been lots of advantages of the cloud computing platform but
that doesn’t mean that a complete switch-over to the cloud servers should take
place. Since, there are times when a physical server needs to be used, it is
essential to get a really powerful server that will not cause any kinds of
overheads. Many examples of such situations are available wherein a big
database server is used for extensive data operations. Similarly, the game
servers also handle thousands of users at the same time with ease.&lt;br /&gt;
&lt;br /&gt;
Since, a physical server enables users to know the exact location of the server
due to which the server is completely free from any overhead as well as the
underlying softwares. The cost-effectiveness of the cloud servers serves as a
great advantage for medium or large companies that need to scale. This will
ensure that the users are able to easily manage their own private dedicated
servers as remote systems. Due to this, the users will be able to check problem
by sitting at a virtual console. Most of the changes to the servers can be done
by the user which otherwise would be solved only with the help of a technician.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Wrapping
it up:&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt;Recently, people have started following a trend wherein they are
switching to cloud servers which maybe private or public. Some others also
prefer to use virtual servers directly. It is recommended to use virtual
servers as they tend to give users more control over the resources. The main
difference between both these servers is that physical servers need users to
pay even when they aren’t accessing the web server. Conversely, the users need
to pay for only those resources that they want to access using the virtual
servers.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/06/how-physical-servers-are-different-from.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-8118466429787582828</guid><pubDate>Wed, 12 Jun 2013 14:14:00 +0000</pubDate><atom:updated>2013-06-14T18:08:39.386+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">begining of  cloud computing</category><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">cloud network</category><title>How To Connect Your Network to the Cloud</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;1.Welcome to the Cloud!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Cloud computing is a storage utility which is
quick, engaging and enlightening. Building a network will be potentially unique
to the requirements of a. your company and b. the connection to the user as and
when needed. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;You may have seen commercial applications such
as iCloud and Drop Box providing simple, deployable solutions that work on your
desktop, tablet and smartphone.An office based system is not too different to
these applications; however the enterprise will want to often integrate its own
IP Address Management (IPAM.) to maintain a tight level of control on its own
server.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;2. What can I expect?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;A lot of business applications are now moving
to the cloud, it’s a shift from traditional software as the internet has become
more acceptable and advanced over the last 10 years.&amp;nbsp; Cloud computing will simplify the technology
and eventuallyoverlap the network, because of its interconnectivity with phones
and tablets, and any other further potential computing devices that may come
around.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Cloud-based apps are also very quick and easy
to set up. Getting them up and running in weeks and costing less than a network
or a CRM tool for research, project files, progress charts etc. The cloud app
will let you create projects, reports and manage data in a dynamic format, with
charts, graphs and plenty of other formats that other CRMs charge much more
money to use.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;3. Public cloud access networking&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Public cloud access networking, such as Oracle
CloudWorld, Cloud Pro and vCloud by VM Ware are all examples of internet cloud
access.&amp;nbsp; These cloud providers are able
to support virtual private networks (VPNs) for large customers as well. It’s
important to note that not all computing providers will support encrypted
tunnels, so there will always be a security issue while your information is
sent over the open internet. There are drawbacks to encryption as well, because
this often delays data trafficking, slowing your transfer speed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;The more recent innovations in cloud computing
are making our business applications more mobile and sleeker to collaborate
with. As consumers we expect to be able to deal with information in real time,
and business applications in the cloud are heading towards that direction now
as well. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;4. Will cloud computing continue to
grow?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;The future of cloud computing seems to be
positive, with lots of growth, if not a little enterprising and prosperous as
well. A new report from Visiongain entitled ‘'World Cloud Computing Market 2013
- 2018' cites the prospect of cloud computing for the years ahead, painting a
starry picture for the industry.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Market revenue for Cloud computing services will
grow to $35.6 billion by the end of 2013. This worldwide phenomenon in growth
is evidence of the success cloud computing has in industry. It is undeniable
that cloud computing is changing the business landscape, and is seen by many as
the solution to the problems seen in slow deployment of applications, with
limited resources and unpredictable system configurations that can occur in
existing IT infrastructure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;5.
What we do at my company&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Working at &lt;i&gt;The Genuine Gemstones
Company&lt;/i&gt; a company which has brands selling jewellery live on television, we
like to be innovative with ideas and embrace new technology. Our brands Gems TV
and Rocks TV are televised in the UK and USA respectively to a TV audience who
are shopping savvy and fashion-conscious. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Using cloud technology enhances our reach within the company. With many
departments reliant on data, it is useful to keep some low key projects on the
cloud and store away data in CRM based charts, processing private data used in
the operations for day to day usages.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;One example is so we can see what our customers like ordering, such as &lt;a href="http://www.gems.tv/" target="_blank"&gt;diamond earrings&lt;/a&gt;, silver pendants or a bright blue gemstone sapphire ring for example.&amp;nbsp; Once we can collate this data on the cloud,
we can log in on any digital device connected to the internet,&lt;a href="https://www.blogger.com/blogger.g?blogID=254947516016146767" name="_GoBack"&gt;&lt;/a&gt;
analyse the data and create charts instantaneously, making our own all in one
CRM for order frequency and filter out variables effectively.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Our team are always working to keep up to speed with the latest technology,
as it is in the nature of the business to excel and achieve and grow year on
year. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span lang="EN-GB"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;This post is written by my dear friend Edward Meeks, digital marketing executive at &lt;/span&gt;&lt;i&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;The Genuine Gemstones Company&lt;/span&gt;&lt;span style="font-family: Calibri, sans-serif; font-size: x-small;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/06/how-to-connect-your-network-to-cloud.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-3698563847500911996</guid><pubDate>Tue, 14 May 2013 08:55:00 +0000</pubDate><atom:updated>2013-05-14T14:25:54.189+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Big data</category><category domain="http://www.blogger.com/atom/ns#">Consumer Electronics Show</category><category domain="http://www.blogger.com/atom/ns#">CRM system</category><category domain="http://www.blogger.com/atom/ns#">Email Clutter</category><category domain="http://www.blogger.com/atom/ns#">Marc Benioff</category><category domain="http://www.blogger.com/atom/ns#">Salesforce Outlook integration</category><category domain="http://www.blogger.com/atom/ns#">Salesforce.com</category><title>Mining Email Clutter in Salesforce.com</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
Marc Benioff, CEO of Salesforce.com, has an aversion to
email.&amp;nbsp; At the Consumer Electronics Show
(CES) 2013, his keynote speech was entitled “How are you connected with your
customer, your partners, your employees. &amp;nbsp;Email? &amp;nbsp;Those
days are over.”&amp;nbsp;&amp;nbsp; Marc should pick up a
copy of this month’s &lt;u&gt;Foreign Affairs&lt;/u&gt; and carefully read the article
written by Kenneth Cukier and Viktor Mayer-Schoenberger entitled “The Rise of
Big Data”.&amp;nbsp; Their key insight is that
“Large amounts of messy data trumped small amounts of clean data”. &lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Marc needs to think beyond the current fad of social
networking and realize that the next $1 billion of revenue is in making use of
big data.&amp;nbsp;&amp;nbsp; With big data in his pocket,
Salesforce.com’s current overblown valuation might actually be sustainable.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Currently, the big data component of customer relationship
management is email and voice; two old technologies that make up 99% of
customer interaction.&amp;nbsp; Think about it,
what else is there?&amp;nbsp;&amp;nbsp;&amp;nbsp; Currently, cloud integration
technologies exist that can consolidate all voice and email interactions inside
a CRM system and make them available for data mining.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Using that mountain of raw and messy data, sales executives
can apply data analysis techniques that can unlock patterns in customer
behavior and use those trends to monitor and optimize the sales process.&amp;nbsp; On a simple level, daily sales rep activity
can be measured.&amp;nbsp; How many emails and
calls did a sales rep receive; how many emails and calls did he or she send/make?&amp;nbsp;&amp;nbsp; More specifically, identify those Leads and
Opportunities that are hot and those that are cold.&amp;nbsp; Look for linguistic clues in the email bodies
and voice-over-IP transcripts as to why certain deals closed and other deals
were lost.&amp;nbsp;&amp;nbsp;&amp;nbsp; Look at correlations
between won deals and email subject lines to determine which phrases led to
commercial success.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
But to gain the benefits of big data in a CRM system,
Salesforce.com needs to adjust its thinking.&amp;nbsp;
Up until now, Salesforce.com has been about a small set of clean
data.&amp;nbsp; Salesforce.com account reps are
trained to create FUD (fear, uncertainty and doubt) about email and
voice-over-IP clutter.&amp;nbsp;&amp;nbsp;&amp;nbsp; More
importantly, Salesforce.com pricing nudges customers away from big data
concepts because storage is limited to absurdly low levels:&amp;nbsp; Enterprise Edition users get 20 MB of Data
Storage, only enough for a few months of email and voice-over-IP data;
Unlimited Editions users, which in fairness are used by the majority of major
corporations, get enough storage for about 18 months.&amp;nbsp;&amp;nbsp; Salesforce.com needs to unlock these
constraints and give customers the space to import big data and analyze it.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
There are two cloud services on the AppExchange that can be
used as the foundation for email and voice-over-IP big data in Salesforce.com.&amp;nbsp; Match My Email offers automated &lt;a href="http://www.matchmyemail.com/blog/technology/salesforce-integration-microsoft-outlook/"&gt;Salesforce
Outlook integration&lt;/a&gt;.&amp;nbsp; It is different
from the other tools and services on the market because it creates a 100%
complete and accurate email log in Salesforce.com with no user
intervention.&amp;nbsp; This comprehensive data is
then available for analysis.&amp;nbsp;&amp;nbsp; Shoretel
offers a voice-over-IP integration cloud for Salesforce.com.&amp;nbsp; The Shoretel service logs every voice
interaction to Salesforce.com together with a transcript of the telephone
call.&amp;nbsp; Because it works completely in the
cloud like Match My Email and Salesforce.com, it captures every phone call
regardless of where it is made – mobile phone or office phone.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Making use of apps such as these, Salesforce users can begin
to harness the power of big data on their own, and maybe Salesforce will then
move in that direction.&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/05/mining-email-clutter-in-salesforcecom.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-6018842826203484622</guid><pubDate>Fri, 10 May 2013 07:11:00 +0000</pubDate><atom:updated>2013-05-10T12:41:14.248+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">brute-force attacks in cloud</category><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">Cloud-Stored Files</category><title>How Easily Hackable Are My Cloud-Stored Files?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Cloud computing, the practice of storing information on networks
(usually the Internet) instead of yourdevices, has garnered a significant
degree of criticism for being unsafe and easily crackable. However, is data
fundamentally less safe when stored outside ofyour computer system?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The Pros and Cons&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Storing data in the cloud is an easy and convenient solution to the
constant need for more space and instant access to one’s accumulated data. It
also keeps things safe in case of hardware failure. A computer is vulnerable to
water damage or a cracked hard drive, but when a user’s pictures, videos,
emails and other information are stored in the cloud, they are kept safe by the
protection of many powerful servers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Local storage has some advantages too, however. When the files are
stored within the device itself, the device is able to access them
instantaneously. In contrast, if there is network interference — even if it has
nothing to do with the user — retrieving data may be slow or impossible. A &lt;a href="http://www.wymoo.com/countries/uk-investigators/"&gt;&lt;span style="color: #1155cc;"&gt;UK private
investigator&lt;/span&gt;&lt;/a&gt;, for example, could be cost precious hours in
retrieving a criminal’s data simply because of a storm in New York.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Which to Choose?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;To examine whether &lt;a href="http://www.businessawaaz.com/web/cloudmagicworld" target="_blank"&gt;cloud storage&lt;/a&gt; is safer than hardware storage, the
very term “safer” must be examined. Is password protection enough to be
considered “safe,” or must the data actually be encrypted within the storage
device? Should the files be accessible from the root user, or must they be
completely hidden within the system? Determining what, if anything, can keep
malicious users out of a personal machine is more complex than it sounds.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;To complicate matters, the tactics used to hack passwords are the same
whether the password applies to a cloud system or to a local machine.
Dictionary or brute-force attacks can ping thousands of potential passwords at
the system per second. If the hacker gets a lucky guess, it’s game over for
your private data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;While it may sound like the two are equally matched as far as security,
there is an added complication to cloud computing: the fact that data can be
intercepted en route. Viruses and malware can hang in an operating system
without the owner’s knowledge, silently transmitting data back to its source.
Therefore if a personal machine isn’t safe, then neither is anything in the
else in the cloud that that machine might connect to.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;What to Do to Keep Safe&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Whether you choose to entrust the cloud with your personal data or keep
it on your own computer, there are a few basic safety tips to practice. Always
choose passwords that are hard to crack, such as long strings of random numbers
and letters. Removing the vowels of a phrase or substituting in numbers for
letters can make this easy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Additionally, when using the Internet, make sure that any personal data
goes to a site with the https:// prefix, instead of http://. This indicates
that it is a secure connection.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;With the options available to today’s computer users, unlimited data
access has never been easier. Just make sure your storage method is safe and
takes advantage of these advancements to itsfullest potential.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="Normal1"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;My dear friend Michelle who wrote this for me is a blogger and
freelancer. She’s written about almost every topic under the sun, and loves
constantly learning about new subjects and industries while she’s writing.
Whenever she’s able to step away from her computer she enjoys spending time
outdoors with her dogs.&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Tahoma, sans-serif;"&gt;&lt;a href="" name="_GoBack"&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/05/how-easily-hackable-are-my-cloud-stored.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-4228172370043222943</guid><pubDate>Fri, 05 Apr 2013 10:14:00 +0000</pubDate><atom:updated>2013-04-05T15:44:40.936+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">aws cloud</category><category domain="http://www.blogger.com/atom/ns#">AWS Linux instance</category><category domain="http://www.blogger.com/atom/ns#">AWS micro instance</category><category domain="http://www.blogger.com/atom/ns#">AWS types of Instances</category><category domain="http://www.blogger.com/atom/ns#">AWS VPC</category><category domain="http://www.blogger.com/atom/ns#">Linux Programming</category><category domain="http://www.blogger.com/atom/ns#">Linux SWAP Partition</category><title>How to add Swap Space to Amazon EC2 Linux (Micro) Instances?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
Micro instance (t1.micro) type is one of the most
fashionable and highly acceptable instance types by IT fellows supported by
&lt;a href="http://cloudbyuchit.weebly.com/" target="_blank"&gt;Amazon&lt;/a&gt; EC2.&lt;span class="apple-converted-space"&gt;&lt;span style="color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 8.0pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #333333; font-family: Arial, sans-serif; font-size: 8pt; text-align: -webkit-auto;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Other&lt;/span&gt; &lt;span class="Apple-style-span" style="font-family: inherit;"&gt;thing
to note down is that the Linux Micro Instance&amp;nbsp;&lt;/span&gt;doesn't&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&amp;nbsp;have swap space. &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Follow these steps to append swap space and boost the recital
of your Linux based Amazon EC2 Micro Instance.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Login to AWS Console, switch to root and follow these steps
to add the swap space.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Fire following command with count that should be equal to
the preferred block size:&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: &amp;quot;Lucida Console&amp;quot;;"&gt;dd if=/dev/zero
of=/swapfile bs=2M count=2048&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Create the swap file with the following command:&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: &amp;quot;Lucida Console&amp;quot;;"&gt;mkswap /swapfile&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
To enable the swap file instantaneously but not
automatically at boot time:&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: &amp;quot;Lucida Console&amp;quot;;"&gt;swapon /swapfile&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 13.35pt; margin-bottom: 9.35pt; mso-hyphenate: auto; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
To enable the swap file at the boot time, add the subsequent
entry into /etc/fstab:&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: &amp;quot;Lucida Console&amp;quot;;"&gt;/swapfile swap
swap defaults 0 0&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
That’s it…..Voila!&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/04/how-to-add-swap-space-to-amazon-ec2.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-1928109785289789807</guid><pubDate>Fri, 22 Mar 2013 10:11:00 +0000</pubDate><atom:updated>2013-03-22T15:41:27.739+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">characteristics of physical servers</category><category domain="http://www.blogger.com/atom/ns#">cloud software</category><category domain="http://www.blogger.com/atom/ns#">efficiency in cloud</category><category domain="http://www.blogger.com/atom/ns#">virtualization</category><title>Just How Efficient Is Using Cloud Computing?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;A lot of people
now use cloud computing with various cloud sites or software. &lt;a href="http://cloudbyuchit.weebly.com/" target="_blank"&gt;Cloud computing&lt;/a&gt;
is seen as the new, easy way to transfer work, pictures or videos anywhere with
internet connection, rather than the older method of storing documents on
hardware such as USB sticks and hard drives. From recent reports and analyses,
cloud computing is seen as a lot more efficient however, just how efficient is
it?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;For one, it’s a
lot cheaper for larger cloud computing companies to make efficiency
improvements as the cost is ultimately spread across a large server base which
means it can afford to have more dedicated workers to then focus on the efficiency
improvements. There are usually fixed costs for implementing techniques which
are used to improve Power Usage Effectiveness. The costs of having an equipment
inventory and assessing data centre airflow which is the same for implementing
institutional changes like charging users per kW rather than of per square foot
of floor area. Of course, there is also a great advantage of having in-house
qualities which are devoted to efficiency, rather than having workers split
between various jobs. We are in a world where technology changes extremely
quickly which means that it is difficult for those who are not fully focused on
efficiency to keep us with the enthusiasts. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Because more and
more people are beginning to use cloud software and systems to store their work,
it means one thing; diversity. More users in different places means computing
loads are spread over the day, allowing for increased equipment
utilization.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Cloud systems
also use virtualisation and various other techniques to divide the system or
software from the characteristics of physical servers. When using this method,
it means that you can redesign the servers and ditch expensive energy costs.
Ultimately, this method redefines the concept of reliability from one that is
based on the reliability of the delivery of IT services of interest,
additionally; this is seen as the much more sensible approach. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Another reason
why using cloud software is highly efficient is the fact you can work around
organisational issues instead of having to face them personally which can take
a lot of time.&amp;nbsp; Most in-house IT services
encounter the problem of a disconnection from IT department which are driving
server facilities and purchases departments paying the bill for electricity.
This particular problem has been solved simply for the cloud providers. &amp;nbsp;They generally have one data centre budget and
clear responsibilities assigned to one person with decision making authority.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;My friend Jake who has written this article currently
writes for &lt;a href="http://www.synthesis-it.co.uk/page-14-Software"&gt;Syntehsis
IT&lt;/a&gt; a company that specialises in the maintenance of business and computer
hardware and software.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/03/just-how-efficient-is-using-cloud.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-9133255991078281944</guid><pubDate>Tue, 19 Mar 2013 06:57:00 +0000</pubDate><atom:updated>2015-11-19T12:55:56.832+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Amazon</category><category domain="http://www.blogger.com/atom/ns#">Big data</category><category domain="http://www.blogger.com/atom/ns#">flexibility</category><category domain="http://www.blogger.com/atom/ns#">Salesforce</category><category domain="http://www.blogger.com/atom/ns#">Scalability in cloud</category><title>Why Cloud Computing's Offer of Scalability is so Crucial</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Business technology consultants would have no job if every
business leader was always completely aware of all the ways the technology in
their industry is changing. The problem is, as the curve of technology’s
advancement grows ever steeper on the timeline from the industrial revolution
to the spread of the internet to mobile technology to cloud computing and big
data, the task of keeping up and staying ahead becomes an ever taller order. &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Adapting to change has long been a key to the success of any
business though technology is much more of a factor in business than it was
hundreds of years ago or even thirty years ago. &lt;a href="http://www.cloudbyuchit.weebly.com/" target="_blank"&gt;Cloud Computing&lt;/a&gt;
offers effectively limitless depth and scalability, so essentially, the
flexibility to adapt to change of varying extremes in needed computing power is
available to all (given a reliable and sufficient internet connection). The speed
at which a business is able to accomplish adaptation to change is also
essential and there the cloud offers quick implementation of its services even
as its contents are in a state of flux.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Growing to Become an
Enterprise&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;One of the reasons that the most successful businesses such
as Amazon and eBay are so successful is that their infrastructure was designed
to be scalable. Before cloud computing was on everyone’s lips, having too much
investment in computing resources might have been a problem, but the advance of
internet technology bridged a gap and breathed life into cloud computing,
illustrating how technology feeds and builds on itself. In 1999, Salesforce was
able to offer enterprise applications through the web and Amazon capitalized on
their excess resources by offering scalable access tohardware and even
personnelthrough the web in 2002.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Smaller businesses and startups have to embrace the cloud in
order to grow and compete. Especially during the first few years of a business’
existence, keeping costs down is a fervent focus. The low entry-cost and room
to grow in cloud services makes them the only really sensible option.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Timing is Everything&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;One of the main reasons that any business project fails is
that it runs into problems with resources not being in the right place at the
right time. The accessibility and scalability of the cloud helps put the right
amount of computing resources exactly where and when they are needed.With
applications becoming increasingly integral to the functionality of the enterprise,
this is ever more vital as it bodes well for the agility of software
development.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Consumer Flux&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Big data is also expected to be a key factor of successful
enterprising in this decade. Business leaders hope to be able to have a much
clearer understanding of their market through analysis of large data sets
relating to consumers. Though the room for growth when utilizing cloud services
is often cited as the benefit of its scalability, often overlooked is the fact
that the ability to scale back can be just as important. &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Consumerism fluctuates due to a vast variety of factors. Big
data will aid in clearly identifying factors and better predicting
fluctuations. The ability to cut costs by scaling back rental of cloud services
during the natural valleys of consumption will be every bit as useful as being
able to scale up during peaks. Cloud vendors charging based on measurable usage
of their service is a step into much greater economical use of computing
resources.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The importance of scalability of the computing
infrastructure of businesses has been noted well before cloud computing became
so prevalent. With the current state of technology, it has simply never been
more important. The advantage of cloud’s scalability is such that avoidance
bears the heavy risk of &lt;a href="http://www.blogger.com/blogger.g?blogID=254947516016146767" name="_GoBack"&gt;&lt;/a&gt;getting left behind by tomorrow’s
enterprising competition.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial;"&gt;My Friend Nichols, Who write this article post, is a Systems
Analyst and writer. As computing environments evolve and complexify, he does
his best to keep up with the challenge.&lt;/span&gt; When Arthur isn't drawing up
diagrams and flow charts, he writes for BMC, leading provider of &lt;a href="http://www.bmc.com/solutions/cloud-computing/cloud-computing-management/cloud-planning-design.html"&gt;cloud
design&lt;/a&gt; solutions.&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div id="spoon-plugin-kncgbdglledmjmpnikebkagnchfdehbm-2" style="display: none;"&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/03/why-cloud-computings-offer-of.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-3832051649252638325</guid><pubDate>Mon, 25 Feb 2013 13:20:00 +0000</pubDate><atom:updated>2014-03-26T22:10:44.500+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Businesses and the Cloud</category><category domain="http://www.blogger.com/atom/ns#">Everyone in cloud</category><category domain="http://www.blogger.com/atom/ns#">Opportunities in cloud</category><title>What Makes the Cloud Such a Big Opportunity?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The use of cloud computing is growing all of the time, and there is not likely to be any let up in this growth in the months ahead.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Businesses and the Cloud&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;While there have been concerns from businesses that cloud services may be insecure and unreliable, a study set to be released from England’s Manchester University this week shows that&amp;nbsp;use of the cloud has dramatically cut costs in relation to information technology.&amp;nbsp;In addition, most businesses that have enjoyed a cut in costs saw this translate directly into vastly improved profit at the bottom line.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;One of the biggest barriers to businesses embracing cloud computing has been their own attitude, with many believing that the cloud would ultimately fizzle out as something as a gimmick, rather than a service that can have a profound impact throughout a &lt;a href="http://www.businessawaaz.com/" target="_blank"&gt;business&lt;/a&gt;. Many industry analysts feel that this study could be the final step in getting everyone to embrace the cloud. After all, if you are a CEO of a business and are seen to be turning down the opportunity to cut a cost line by 25%, your shareholders or board of directors are probably not going to remain supportive for long, are they?&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Final Destination&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The endgame of cloud services, whether it is data storage or server hosting, is that at some point in the future everything will be based there. The existing concerns that remain around security and reliability don’t show any sign of going away, although more will surely be done to minimise these issues now that the positive impact is so clear. For now, providers of traditional host services have nothing to worry about, but they could see demand for their products beginning to diminish in the years ahead as the need and clamour for the cloud grows ever larger.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Other Opportunities&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The opportunities that cloud services give to businesses are clear, but how do they influence other groups?&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;In terms of individual consumers, they have been living their lives increasingly in the cloud for a number of years, whether they were aware of it or not.&amp;nbsp;Services such as&amp;nbsp;iTunes&amp;nbsp;and Gmail have been cloud based for a long time, and consumers are perhaps only now becoming fully aware of it thanks to data synchronisation between devices and the way they use mobile technology interchangeably.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The cloud will continue to make consumers’ lives easier, whether that is via the streaming of television shows and movies, or the ability to access essential information at any time of the day.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Investors will also be licking their lips, or have the proverbial currency signs in their eyes, as the cloud continues to grow. Conservative projections show that the market for cloud services is going to at least double over the next three years, so anyone with money to invest should certainly be at least considering this area.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Something for Everyone&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The technology industry has a habit of over selling certain things as ‘life changing’ or ‘revolutionary,’&amp;nbsp;but there is no doubting that the cloud is both of those.&amp;nbsp;The opportunities the cloud will present to all of us in the coming years will be huge, and change how we do things forever.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span class="Apple-style-span" style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="line-height: 26px;"&gt;This article is written by Jaguar PC where my&amp;nbsp;colleagues&amp;nbsp;are working, the original leaders in &amp;nbsp;&lt;/span&gt;&lt;/span&gt;VPS hosting&lt;span class="Apple-style-span" style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="line-height: 26px;"&gt;, with&amp;nbsp;24/7 professional support and&amp;nbsp;affordable Web Hosting plans.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/02/what-makes-cloud-such-big-opportunity.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-512397288366381560</guid><pubDate>Mon, 18 Feb 2013 06:35:00 +0000</pubDate><atom:updated>2013-02-18T12:05:20.310+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Back Up in cloud</category><category domain="http://www.blogger.com/atom/ns#">cloud providers</category><category domain="http://www.blogger.com/atom/ns#">Firewalls</category><category domain="http://www.blogger.com/atom/ns#">Service Guarantees</category><title>How to Keep Your Business Secure When Using the Cloud</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The role of cloud-based technology is growing every day, both in terms of our individual lives and in the way we do business.&amp;nbsp; While the benefits of using the cloud are wide ranging, easily the biggest concern surrounds keeping data secure. With the use of cloud platforms set to increase further in 2013, there will be more to keep safe and more due diligence to be carried out than ever before.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;We explored how you can keep your business secure by effectively managing everything in your cloud space in the coming year.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Don’t Rely on Firewalls&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Place whatever you are keeping in the cloud, whether that is data, server processes, or web hosting functions, behind a firewall. The mistake, however, would be then to think everything is okay, and not carry out any further monitoring.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;As good as firewalls can be for preventing attacks and viruses, they are not infallible, and leaving them unmonitored will inevitably lead to a breach eventually. Combine technology and an element of human IT management in order to get the best results.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Get Service Guarantees&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Some of the service guarantees you will seek from your cloud provider are obvious. For example, it goes without saying that you will want to be able to access your data securely and quickly wherever you are, and whenever you want.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Many companies that use a cloud service make the mistake of thinking they are the only clients using a particular space. If you have paid for a private cloud service, get a written guarantee that you are the only group that can access it. Some cloud providers will ‘re-sell’ your space if you leave a significant chunk of it unused, which could lead to others accessing your data and leave you at risk. Be sure to take this possibility out of the equation.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Have a Back Up Plan&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Even if you have a stringent policy in place, have a firewall and a human set of eyes on your cloud operation and performance at all times, and believe you are the only person with access to the data, you can still be open to an attack and lose some of your data.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Keep an action plan active at all times, so that any data is backed up elsewhere, and have a clear idea of timescales when it comes to dealing with any breaches or restoring services. Part of this will be down to you, although your corrective actions are better to be planned in conjunction with your service provider, especially if you can get them board with carrying out security monitoring on your behalf.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;strong style="font-style: inherit;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Make it a Big Thing&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Anyone who suffers any data security breach of any kind, not just in terms of cloud computing, does so for several reasons. One common factor shared by everyone this happens to, is that they have not made it a big deal in their organisation.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Whether you are a one man company or are responsible for a team of employees, ensure cloud security is high on the agenda on a daily basis, and something that everyone in your business lives by day in, day out.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Keep yourself secure on the cloud throughout 2013 and beyond, and you will soon find yourself well positioned to make full use of its great potential.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; line-height: 26px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; text-align: -webkit-auto;"&gt;
&lt;span lang="EN-GB"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span class="Apple-style-span" style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="line-height: 14px;"&gt;This post is from Posterita where my&amp;nbsp;colleagues are working,&amp;nbsp; is revolutionary new&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #222222; line-height: 26px;"&gt;&lt;a href="http://www.posterita.com/" style="color: #1155cc;" target="_blank"&gt;inventory management software&lt;/a&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="line-height: 14px;"&gt;&amp;nbsp;that allows chain stores and single stores to manage every aspect of their operations via an easy-to-use web-based platform.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/02/how-to-keep-your-business-secure-when.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-1022677329281860571</guid><pubDate>Thu, 07 Feb 2013 09:19:00 +0000</pubDate><atom:updated>2013-02-07T14:51:02.308+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">auto scaling</category><category domain="http://www.blogger.com/atom/ns#">aws cloud</category><category domain="http://www.blogger.com/atom/ns#">AWS micro instance</category><category domain="http://www.blogger.com/atom/ns#">ec2 instances</category><title>EC2 Micro Instances - Best Among AWS Cloud</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Micro instance (t1.micro) type is one of the most
fashionable and highly acceptable instance types by IT fellows supported by
Amazon EC2. During November 2010, AWS&amp;nbsp;announced&amp;nbsp;the free tier and started
offering 750 hours of Micro Instance usage free per month for the first one
year, but it's available as an Amazon EBS-backed instance only.&lt;span class="Heading1Char"&gt;&lt;span style="background: white; font-size: 16.0pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class="apple-style-span"&gt;&lt;span style="background: white;"&gt;You can now launch EC2
micro instances within a&lt;/span&gt;&lt;/span&gt;&lt;span class="apple-converted-space"&gt;&lt;span style="background: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Virtual Private Cloud&amp;nbsp;&lt;span class="apple-style-span"&gt;&lt;span style="background: white;"&gt;(VPC).&lt;/span&gt;&lt;/span&gt;&lt;span class="apple-converted-space"&gt;&lt;span style="background: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="background: white; mso-bidi-font-weight: bold;"&gt;AWS&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;span class="apple-converted-space"&gt;&lt;span style="background: white;"&gt;now&lt;/span&gt;&lt;/span&gt;&lt;span class="apple-style-span"&gt;&lt;span style="background: white;"&gt; extends to t1.micro instances
running inside of a VPC also.&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="font-size: 16.0pt; mso-bidi-font-size: 12.0pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="background: white; line-height: 13.35pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto; text-align: center;"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span style="color: #444444; font-size: 9.5pt;"&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shapetype
 id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
 path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"&gt;
 &lt;v:stroke joinstyle="miter"/&gt;
 &lt;v:formulas&gt;
  &lt;v:f eqn="if lineDrawn pixelLineWidth 0"/&gt;
  &lt;v:f eqn="sum @0 1 0"/&gt;
  &lt;v:f eqn="sum 0 0 @1"/&gt;
  &lt;v:f eqn="prod @2 1 2"/&gt;
  &lt;v:f eqn="prod @3 21600 pixelWidth"/&gt;
  &lt;v:f eqn="prod @3 21600 pixelHeight"/&gt;
  &lt;v:f eqn="sum @0 0 1"/&gt;
  &lt;v:f eqn="prod @6 1 2"/&gt;
  &lt;v:f eqn="prod @7 21600 pixelWidth"/&gt;
  &lt;v:f eqn="sum @8 21600 0"/&gt;
  &lt;v:f eqn="prod @7 21600 pixelHeight"/&gt;
  &lt;v:f eqn="sum @10 21600 0"/&gt;
 &lt;/v:formulas&gt;
 &lt;v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/&gt;
 &lt;o:lock v:ext="edit" aspectratio="t"/&gt;
&lt;/v:shapetype&gt;&lt;v:shape id="Picture_x0020_1" o:spid="_x0000_i1025" type="#_x0000_t75"
 alt="Amazon Web Services" style='width:168pt;height:36pt;visibility:visible;
 mso-wrap-style:square'&gt;
 &lt;v:imagedata src="file:///C:\DOCUME~1\uchit\LOCALS~1\Temp\msohtmlclip1\01\clip_image001.jpg"
  o:title="Amazon Web Services"/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span style="color: #444444; font-size: 9.5pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="background: white; line-height: 13.35pt; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Talking to it technical specifications, the Micro Instance
type doesn’t have that much power required for heavy stimulating. The main
memory presented in Micro instance type is 613MB. It comes with explode CPU
capacity that can be goes up to 2 Elastic Compute Units (ECU). That means the
CPU performance is not conventional. This is just not enough for running any severe
workloads. And yes, storage can be added through Elastic Block Storage (EBS)
and the free tier covers up to 30GB of storage space.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;But from the technical specification it doesn’t mean Micro
Instances are totally ineffective. They offer excellent worth in certain cases.
In this article, I want to share how to get the best out of the Amazon EC2
Micro Instances.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;Optimize Swap Memory&lt;/b&gt;&amp;nbsp;–
This is pertinent to Linux based Micro Instances. By default, these types of instances
do not have swap space configured at initial level. I ran my &lt;a href="http://cloudbyuchit.weebly.com/"&gt;Cloud Magic World&lt;/a&gt; Website on a Micro
Instance for a few days. During the crest loads, I have experienced Apache
Server or MySQL crashing unexpectedly. So with just 613 MB at your clearance,
you got to make sure that you have set aside enough disk space for the swap.
This will radically enlarge the reliability of Micro Instance.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;Auto Scaling Out&lt;/b&gt;&amp;nbsp;–
The funda on the Cloud is auto scaling out. Running a convoy of low-end servers
in parallel is more competent and cost effectual on any virtualized
infrastructure. As per the load and use-case, splitting a job across number of
Micro Instances may be cheaper and faster than running the same job on a single
Large Instance. This scale out structural design provides better fail over and quicker
processing.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;Mull over Caching&lt;/b&gt;&amp;nbsp;–
If you are scheduling to host sites on these Micro Instances, be clear in your
mind that they are not very dynamic. Dynamic websites demand more CPU power and
memory due to the approach each request is processed. Straightforward websites
like &lt;a href="http://www.cloudbyuchit.blogspot.in/"&gt;blogs&lt;/a&gt; and marketing
sites with a few dynamic contents are ideal participants for the Micro
Instances. Moreover, consider caching the content to avoid CPU spikes. For
example, if you are running any blog or website, you can enable caching plug-ins
to increase the performance. There are plenty of plug-ins available for caching
by free of cost.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;Select 64-bit&lt;/b&gt;&amp;nbsp;–
Always pick 64-bit when running Micro Instances. This is assured to give you
better recital than the 32-bit complement. You will see the difference when you
are running batch processing that deals with large files and processes.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;Pull the Cron jobs&lt;/b&gt;&amp;nbsp;–
Many patrons operate a Linux Micro Instance to run cron jobs and precise locale
tasks that monitor and handle their entire AWS infrastructure. If you want to
run a cron job, stop all other running services, add swap space to instance and
pull it to make it a tilt and mean cron job machine. &lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Summary:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Hope this article gave you the basic fundamentals to get best
out of the Micro Instances. I have mentioned core advantages and use cases of
EC2 micro instance type over here. From Best-of-breed, you can use micro
instances for normal dynamic websites and contents with caching power and
scaling advantage.&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/02/ec2-micro-instances-best-among-amazon.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-2251268715173844433</guid><pubDate>Sun, 20 Jan 2013 03:48:00 +0000</pubDate><atom:updated>2013-01-20T09:18:40.845+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud based ap</category><category domain="http://www.blogger.com/atom/ns#">ERP</category><category domain="http://www.blogger.com/atom/ns#">Gartner</category><category domain="http://www.blogger.com/atom/ns#">saas</category><category domain="http://www.blogger.com/atom/ns#">SAP</category><category domain="http://www.blogger.com/atom/ns#">Workflow Automation</category><title>The sunny side of cloud-based AP</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
Having your “head in the clouds” means different things to
different people. If you’re managing the finance department within your
organization, having your head in the cloud is the smart way to go. Once considered
a luxury, cloud-based SaaS (software as a service) for &lt;a href="http://corcentric.com/"&gt;workflow automation&lt;/a&gt; and invoice processing is now a necessity in a world of
uncertain revenues and controlled costs.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
The fact that SAP recently acquired SaaS provider Ariba for
$4.3B should tell you all you need to know about the importance of cloud&lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:18"&gt; accounting&lt;/ins&gt;&lt;/span&gt;
for the future. Gartner forecasts that spending on cloud computing will
increase at a rate of 19% compared to the total spending on IT, which is
predicted to rise just 3%. As far as the growth in spending for cloud-based
SaaS, Gartner expects that to grow from an estimated $12.1B in 2013 to $21.3B
in 2015.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
So what are the conditions that are making smart CFO’s and Finance
Managers who haven’t already done so, put &lt;span class="msoDel"&gt;&lt;del cite="mailto:SEER" datetime="2013-01-10T12:19"&gt;cloud-based automation&lt;/del&gt;&lt;/span&gt;&lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:19"&gt;cloud
accounting software&lt;/ins&gt;&lt;/span&gt; at the top of their wish list? &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;b&gt;A paper-free environment is not the only
endgame. &lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
Moving into
automated financial processing definitely has a paper-elimination advantage, to
be sure. The problems that may arise from paper pileups and lost or misplaced
invoices, and the efficiencies realized from accounts payable automation can’t be
overstated; but the silver lining in the cloud is its value as a business information
and cash management tool. One of the truly major transformation companies are
experiencing is the changing role of accounts payable, from a transactional
back office cost center to a strategic position within the organization. &amp;nbsp;AP
automation solutions enable this transformation by providing access to
real-time data, and thus the insights necessary for procurement and treasury to
effectively manage cash flow. &lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:22"&gt;Invoice &lt;/ins&gt;&lt;/span&gt;Automation allows AP to:&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;ul type="disc"&gt;
&lt;li class="MsoNormal"&gt;Increase
     &lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:22"&gt;invoice
     &lt;/ins&gt;&lt;/span&gt;processing speeds with streamlined workflows&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;Gain
     higher accuracy and faster access to data by removing touch points in the
     payables process&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;Eliminate
     late payments and take advantage of early-payment discounts with automated
     invoice approval workflows and payment disbursements&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;Enhance
     visibility at the click of a mouse for accurate reporting, better cash
     flow management, and improved supplier relationships&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;Improve
     supplier relationships through a seamless exchange of transaction-related
     information and payments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;b&gt;Automation is a clear advantage, but why in
the cloud?&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;New infrastructure, new
software, and additional personnel are investments few companies are able, or
willing, to undertake. Using a cloud-based SaaS provider means that companies only
need a computer and internet access to run the application software, so there
is no need to purchase hardware or software, make new hires, or pay the high
cost of ongoing upgrades and training. Cloud automation has &lt;/span&gt;the
advantages of&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Low
upfront costs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Fast
deployment and flexibility &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Minimal
IT commitment&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Access
to data, anytime…anywhere&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Rapid
adoption and easy ERP integration&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Automatic
backup&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style="color: #2f2f2f; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-bidi-font-size: 11.0pt; mso-fareast-font-family: Symbol;"&gt;·&lt;span style="font-family: 'Times New Roman'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style="color: #2f2f2f; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;Continuous
software updates and upgrades&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 0.0001pt 44.25pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 0.0001pt;"&gt;
&lt;b&gt;When real storm clouds appear,
cloud-based &lt;span class="msoDel"&gt;&lt;del cite="mailto:SEER" datetime="2013-01-10T12:24"&gt;AP &lt;/del&gt;&lt;/span&gt;&lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:24"&gt;software &lt;/ins&gt;&lt;/span&gt;is
essential&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
It’s no
secret that storms are becoming more frequent and more treacherous, and that
companies need to have a disaster recovery (DR) plan for all eventualities; but
having multiple off-site servers, the personnel ready to implement emergency
backups, and additional redundancies may not be feasible or optimal. Data
stored in the cloud exists on the servers of service providers, who have their
own system of servers at a variety of locations, constantly backing up data.
Companies that have lost the ability to operate out of a brick-and-mortar
facility can still access the necessary data through the cloud&lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:25"&gt; accounting
system&lt;/ins&gt;&lt;/span&gt; using their laptops, smartphones or tablets. &lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
It’s clear
that &lt;span class="msoDel"&gt;&lt;del cite="mailto:SEER" datetime="2013-01-10T12:25"&gt;AP’s
&lt;/del&gt;&lt;/span&gt;&lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:25"&gt;the &lt;/ins&gt;&lt;/span&gt;future &lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:25"&gt;of Accounts Payable &lt;/ins&gt;&lt;/span&gt;is
in the clouds, and the future looks pretty bright…and definitely sunny. Have
you transitioned into the cloud for your AP functions? If not, why not&lt;span class="msoIns"&gt;&lt;ins cite="mailto:SEER" datetime="2013-01-10T12:25"&gt;?&lt;/ins&gt;&lt;/span&gt;&lt;span class="msoDel"&gt;&lt;del cite="mailto:SEER" datetime="2013-01-10T12:25"&gt;.&lt;/del&gt;&lt;/span&gt;
If so, let us know your experiences.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="line-height: 115%;"&gt;For more than 15
years, &lt;/span&gt;&lt;span style="line-height: 115%;"&gt;Corcentric’s&lt;/span&gt;&lt;span style="line-height: 115%;"&gt; cloud-based financial process automation solutions have
revolutionized how the world’s largest organizations manage and protect their
financial assets. By connecting best practices with deep expertise,
Corcentric’s ground-breaking Accounts Payable and Accounts Receivable
automation solutions have enabled organizations to reduce costs, streamline
processes, and provide unmatched visibility executives need to make critical
business decisions.&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/01/the-sunny-side-of-cloud-based-ap.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-8509602718970829867</guid><pubDate>Wed, 16 Jan 2013 05:24:00 +0000</pubDate><atom:updated>2013-01-16T10:54:50.977+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Amazon</category><category domain="http://www.blogger.com/atom/ns#">cloud</category><category domain="http://www.blogger.com/atom/ns#">java</category><category domain="http://www.blogger.com/atom/ns#">oracle</category><category domain="http://www.blogger.com/atom/ns#">patch</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Java Patch from Oracle: Close, but No Cigar</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;When Java technology came on the scene, it revolutionized the online
experience. Web surfers came to expect more and more interactive websites and
features from the companies they frequented online. It changed the ways
companies do business, as well as their marketing strategies.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;Yes, Java was quite the phenomenon, but it’s always had one major
downfall. Designing security for the technology that actually works has been
nothing short of a nightmare. It would seem, in fact, that a reliable security
patch is a Java programmer’s elusive unicorn.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;b&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;Security
Woes&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;OS and browser
developers are constantly trying out new technology to make your PC and devices
as secure as possible. The latest inventions are more secure than ever before.
However, much to the bane of Microsoft and other developers, even their
ironclad security measures are meaningless if the PC user makes one ill-fated
visit to a site with a Java plug-in.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;Lack of security
can be problematic for anyone, but particularly for businesses. The last thing
a company needs is for a hacker to gain access to their bid management software
or accounting programs. As rigid as modern firewalls and security features are,
all a company user has to do is run Java and it’s all for naught.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;b style="mso-bidi-font-weight: normal;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;Attempting to Address the Problem&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;In fairness, it’s
not entirely Java’s fault that security has become such a large issue. It’s
almost as if the cure has helped to exacerbate the problem. With more
sophisticated operating systems and browsers, hackers have been forced to look
for the weakest points of a computer in order to gain access. Poor hackers,
right?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;In any event,
Java certainly didn’t ask for all of this new attention. Even so, the fact
remains that it’s a major problem. A recent patch released by Oracle helped to
stave off a new Amazon email hack campaign, but it hasn’t been completely
effective.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;Sometimes this can be as
difficult as finding the exact &lt;/span&gt;&lt;a href="http://www.cjponyparts.com/1988-mustang-parts/c/9_1001_26/"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;1988 Mustang parts&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt; you need for your car. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;Oracle typically
releases updates on a four-month schedule to try to stay on top of security
threats. Perhaps they should consider making that a monthly schedule instead.
It seems they’re always right on the pinnacle of developing a secure plug-in,
but then the lull updates allows hackers time to discover the vulnerabilities.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;b style="mso-bidi-font-weight: normal;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;Does it Really Matter?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;The word on the
street is that Java may eventually become obsolete anyway. If this is true,
then you can’t blame a company for not wanting to invest money in a product
they may eventually lose. On the other hand, if Java could just get a hold of
their security problems, perhaps the call to find an acceptable alternative for
online interaction wouldn’t have come about in the first place.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt; line-height: 115%;"&gt;What is certain
is that Internet users should be extremely cautious when using anything related
to Java. Outdated versions are the most vulnerable, but installing updates can
also be detrimental if a hacker has access to it. Your best bet is to either uninstall
Java altogether or make extensive backups of your data before performing any
updates.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: inherit;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="color: black; font-size: 10pt; line-height: 115%;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="color: black; font-size: 10pt; line-height: 115%;"&gt;My friend &lt;/span&gt;&lt;/span&gt;Michelle&amp;nbsp; is a Content Specialist and Blogger with a passion for
the Internet, specifically social media and blogging. She loves how social
media connects people across the globe, and appreciates that blogging gives her
the opportunity to voice &lt;a href="http://www.blogger.com/blogger.g?blogID=254947516016146767" name="_GoBack"&gt;&lt;/a&gt;her thoughts and share advice
with an unlimited audience.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:DontVertAlignCellWithSp/&gt;
   &lt;w:DontBreakConstrainedForcedTables/&gt;
   &lt;w:DontVertAlignInTxbx/&gt;
   &lt;w:Word11KerningPairs/&gt;
   &lt;w:CachedColBalance/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267"&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:"Times New Roman";
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:"Times New Roman";
 mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2013/01/java-patch-from-oracle-close-but-no.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-1803490696126295899</guid><pubDate>Sat, 29 Dec 2012 09:06:00 +0000</pubDate><atom:updated>2012-12-29T14:37:24.537+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cisco</category><category domain="http://www.blogger.com/atom/ns#">cloud by mobile</category><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">mobile computing</category><title>Cisco Stares into the Developing Cloud</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Networking company Cisco Systems released its
second annual Cisco Global Cloud Index in October of 2012. The Index examines
the current state of cloud computing and extrapolatesfuture developments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;If Cisco's predictions are correct, we're
teetering on the brink of a major networking shift from fixed IT networks to
cloud data centers. Cisco suggests 2014 will see the turning point, at which
time over 50 percent of all workloads will shift to the cloud. The Index
defines a workload as the processing power required by a server to run an app
and support users interacting with the app.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Global
Cloud Cover&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span style="font-size: 10pt;"&gt;The growing importance of cloud data centers is
readily apparent; whether you’re an individual or a &lt;/span&gt;&lt;a href="http://www.webpagefx.com/"&gt;&lt;span style="font-size: 10pt;"&gt;company for SEO&lt;/span&gt;&lt;/a&gt;&lt;span style="font-size: 10pt;"&gt; at
least some of your data and apps now live in the cloud. Cisco's Index, however,
indicates just how thick the cloud cover will be in 2016.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;According to the Index, the Asian-Pacific region
will generate more cloud traffic in 2016 than either North America or Western
Europe, despite Western Europe's edge in network strength and broadband
accessibility. By 2016, Asia-Pacific is expected to generate 36 percent of the global
cloud workload.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Regions such as Hong Kong, Japan, South Korea,
Singapore and Taiwan are already positioned to profit from increased cloud
workload, with China, Thailand, Cambodia and Vietnamincreasingly likely to add
to the cloud.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;While
the Asian-Pacific will dominate the cloud, it won’t be the fastest developing
adopter of cloud technology. That title goes to the Middle East and Africa, which
Cisco expects to show rapid cloud growth through 2016.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Cloud Thickness&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Presuming
Cisco's predictions pan out, by 2016 the cloud will process an overwhelming
amount of data, estimated at 6.6 zettabytes a year. A zettabyte equals one
sextrillion bytes, or 1,000,000,000,000,000,000,000 bytes. Approximately 76
percent of this data will be internal data center traffic, according to Cisco
estimates. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Mobile Lags Behind&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;While
fixed networks across the globe are ready to handle intermediate and basic
cloud apps, no region has yet to emerge capable of handling advanced apps. Cisco
defines basic apps as small games and text-based apps. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Intermediate
apps include programs such as iTunes, Enterprise Resource Planning and Customer
Relationship Planning apps. Advanced apps include high-definition video
streaming and video conferencing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Some are
already prepared for advanced cloud apps, including Hong Kong, Japan, Romania,
South Korea and Sweden. They are the onlyones currently capable of handling
advanced cloud apps over a fixed network.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;As for
mobile cloud apps, no country is ready for advanced cloud app use. Western
Europe comes closest, being capable of handling intermediate cloud apps over mobile
access.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Cisco's
Index confirms what many analysts already know: cloud data centers represent an
important, and potentially lucrative, field of development. Eventually, we're
all going to live under the cloud.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-size: 10pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;My dear friend Michelle is an aspiring writer and blogger with a
passion for the Internet, specifically social media and blogging. She loves how
social media connects people across the globe, and appreciates that blogging
gives her the opportunity to voice her thoughts and share advice with an
unlimited audience.&lt;/span&gt;&lt;/span&gt;&lt;a href="http://www.blogger.com/blogger.g?blogID=254947516016146767" name="_GoBack"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2012/12/cisco-stares-into-developing-cloud.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-4758846342825761147</guid><pubDate>Sat, 13 Oct 2012 09:06:00 +0000</pubDate><atom:updated>2015-11-19T14:56:53.333+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">cloud for job seeker</category><category domain="http://www.blogger.com/atom/ns#">cloud for non-IT industries</category><category domain="http://www.blogger.com/atom/ns#">IT and cloud</category><title>How is Cloud Computing Changing IT and Other Industries?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The advent and growing clamour for and popularity of cloud
computing represents perhaps the biggest change ever experienced in IT and
technology circles. Bigger than tablet technology, bigger than anything Apple
has ever done, a bigger change even, than perhaps the first ever Windows
operating system.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;With change comes resistance, however once the resistance
has worn away then comes the real reason change is so great: the opportunity.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;How is cloud computing revolutionising the industry both
from a consumer and business point of view?&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;PC Purchases&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;For the time being, manufacturers of personal computers are
still packing their hardware with as much hard disk space as possible, and
charging consumers ever-growing amounts of money for the privilege of an extra
gigabyte or four.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;How much of that hard disk space ever actually gets used? In
most cases, the answer will be not all of it. In fact, the answer will likely
to be less than half. So why should consumers pay for something they don’t use?&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Sooner or later, consumers will start saying no to high
prices for gigabyte after gigabyte of disk space, realising they can make
savings on buying a cheaper laptop and just using a free cloud service and
paying the small fee for any additional space they may need.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Job Opportunities&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;For the doom-mongers who believe humans are soon to rendered
useless, cloud computing is a disaster. It is yet another example of the world
finding a way to automate tasks that can be done quicker and more efficiently
than if a human was doing them.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;While this is true to some extent, the opportunities
afforded by cloud computing are actually likely to make the reliance on IT
grow, thus creating jobs. The affordable nature of cloud computing also means
that start-up businesses can reduce their costs – funds that could go to
bringing additional employees on board.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;This is just scratching the surface, too, as cloud
observation, security maintenance, and other human completed tasks will become
much more in demand.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Business Added Value&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Opinion is split over whether this factor is a good thing or
not, but cloud computing will, eventually, force IT vendors to look at what
else they can offer in terms of products to the consumer world.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;It is not only IT vendors that will need to evolve, either.
Retailers of entertainment products will begin to see interest in their stores
dwindle as eventually computer games move exclusively online. DVD sales are
suffering thanks to the likes of Netflix, much like CD sales dipped
dramatically when iTunes became so popular.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: 11pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;While these changes will mean increases profits for the businesses who
aren’t paying middleman fees, it leaves those reliant on interest in particular
products and services facing a challenging future.&lt;/span&gt;&lt;/span&gt;&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: 11pt;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="background-color: white; color: #222222;"&gt;Posterita, who helped me in this post, is a&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.posterita.com/" style="background-color: white; color: #1155cc;" target="_blank"&gt;retail software&lt;/a&gt;&lt;span style="background-color: white; color: #222222;"&gt;&amp;nbsp;that allows chain stores and single stores to manage every aspect of their operations via an easy-to-use web-based platform.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div id="spoon-plugin-kncgbdglledmjmpnikebkagnchfdehbm-2" style="display: none;"&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2012/10/how-is-cloud-computing-changing-it-and.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-684386538779348295</guid><pubDate>Wed, 26 Sep 2012 11:51:00 +0000</pubDate><atom:updated>2012-09-26T17:22:53.587+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">European Organization for Nuclear Research</category><category domain="http://www.blogger.com/atom/ns#">higgs boson</category><category domain="http://www.blogger.com/atom/ns#">Particle Physics</category><category domain="http://www.blogger.com/atom/ns#">physics</category><title>What the Higgs Boson Particle Could Mean for Cloud Computing</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Most
businesses have come to realize the cost-saving potential of using cloud
computing. Large and reliable resources for data storage have become essential,
whether a company specializes in sales, marketing or particle acceleration.
Making use of the cloud typically involves allotting resources over a network,
while grid computing is a similar concept, but involves computing resources
outside of a single network.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Both
of these systems have been widely analyzed for managing data and computing
resources. Companies can outsource their computing needs to a third party, just
as an &lt;/span&gt;&lt;a href="http://www.webpagefx.com/"&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;SEOcompany&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt; can be enlisted for online marketing,
website creation and traffic monitoring. Small businesses and big corporations
alike benefit from such services, even a company like the European Organization
for Nuclear Research (CERN). The company recently used its Large Hadron
Collider in the discovery of a once theoretical particle.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;b&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Cloud Computing and Particle Physics&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;With
a 17-mile-long tunnel and repeated experiments, CERN produces a lot of data. As
much as 1 GB per second is recorded in the facility’s datacenter. This adds up
to so much data that even Moore’s Law, the principle that states memory
capacity should double every 18 months, is not enough to keep up. Data are
measured in petabytes, one of which is equal to a million gigabytes. Time
during experiments is measured in nanoseconds; with an estimated 600 million
particle collisions per second during experiments, up to a petabyte of
information can be collected during each run.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Many
businesses use a public cloud, but CERN has created a grid network consisting
of 150 different computer systems spread around the world. Ethernet connections
link most of them, allowing for the use of 300,000 cores to drive computational
operations. When the &lt;a href="http://en.wikipedia.org/wiki/Higgs_boson"&gt;Higgs
boson&lt;/a&gt; particle, theoretically the generator of mass, was found, enormous quantities
of data were created for collision analysis, particle path tracking and
statistical analysis.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;b&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Progressive Efforts&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;European
research organizations and CERN have begun experimenting with a cloud resource
called Helix Nebula – The Science Cloud. The project was implemented in March
2012 and is a partnership between various research groups, IT businesses and
cloud vendors. Simulations from the particle collider have already been run
through this network as part of a two-year study.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Many
scientists consider the particle discovery one of the most important in recent
times, while the cloud has become perhaps the most significant aspect of
computing for businesses. The Higgs boson particle itself may not yet have
applications directly related to IT, but the research surrounding it seems to
be driving a push to advance public computing resources on a wide scale. Data
security is important for businesses no matter what their focus is.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0in; margin-right: 0in; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0in; mso-para-margin-right: 0in; mso-para-margin-top: .01gd;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;Byline: &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: Tahoma, sans-serif; line-height: 115%;"&gt;My best friend&lt;b&gt; &lt;/b&gt;Michelle is a Content Specialist and Blogger with a passion for the
Internet, specifically social media and blogging. She loves how social media
connects people across the globe, and appreciates that blogging gives her the
opportunity to voice her thoughts and share advice with an unlim&lt;a href="http://www.blogger.com/blogger.g?blogID=254947516016146767" name="_GoBack"&gt;&lt;/a&gt;ited audience.&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;

&lt;/span&gt;&lt;/div&gt;
</description><link>http://cloudbyuchit.blogspot.com/2012/09/what-higgs-boson-particle-could-mean.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-3598762955384277627</guid><pubDate>Wed, 19 Sep 2012 10:46:00 +0000</pubDate><atom:updated>2012-09-19T16:16:02.081+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">alfresco</category><category domain="http://www.blogger.com/atom/ns#">solr with alfresco</category><category domain="http://www.blogger.com/atom/ns#">ssl certificate for solr</category><title>How to renew Alfresco Solr SSL certificate</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;This information is only applicable to Alfresco (Enterprise) 4.x versions&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;There needs to be two-way communication between the Alfresco server and the SOLR server. So that no one else can abuse this communication channel, it must be secured by means of HTTPS encryption and a mutual client certificate authentication.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;There are three important points involved in setting up this mutual&amp;nbsp;trust relationship:&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Creating a 'keystore directory' and configuring the Alfresco and Solr servers to use it.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Generating and installing your own&amp;nbsp;'secure certificates'.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Replacing default certificates and handling&amp;nbsp;'certificate expiry'.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;If you installed Alfresco and SOLR via the Installation Wizard, there is no need to perform step 1, as the directory and associated configuration will already be present. You can proceed straight to step 2.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;If you installed SOLR manually, then please carefully review steps 1 and 2 - as otherwise, without configuring your own keystore directory, you may be picking up expired, default keys.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;1. &lt;b&gt;Creating a keystore directory and configuring the Alfresco and Solr Servers to use it&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The following instructions assume SOLR has already been extracted and configured.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;We will use&amp;nbsp;to refer to the tomcat directory where Alfresco is installed and&amp;nbsp;to the tomcat directory where Solr is installed. These may be the same or different directories, depending on whether you have chosen to install Solr on a standalone server or the same server as Alfresco.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Ensure that Alfresco has already been started at least once, i.e. the /webapps/alfresco/WEB-INF directory exists.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Create and populate a keystore directory for the Alfresco and SOLR servers. By convention, we will create this in&amp;nbsp;/alf_data/keystore. Please note that at this stage the keystore directory will just be a template, containing standard keys available to everybody.&amp;nbsp;To secure the installation you must carry out the steps to generate new keys, specified in section 2.&lt;/span&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b style="text-indent: -24px;"&gt;Linux/Unix&lt;/b&gt;:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; mkdir -p&amp;nbsp;/alf_data/keystore&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; cp&amp;nbsp;/webapps/alfresco/WEB-INF/classes/alfresco/keystore/* /alf_data/keystore&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b style="text-align: justify; text-indent: -24px;"&gt;Windows&lt;/b&gt;:&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; mkdir&amp;nbsp;\alf_data\keystore&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; copy&amp;nbsp;\webapps\alfresco\WEB-INF\classes\alfresco\keystore\* \alf_data\keystore&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Configure the Alfresco and SOLR tomcats to use the keystore and truststore for https requests, by editing the specification of the connector on port 8443 in&amp;nbsp;/conf/server.xml and&amp;nbsp;/conf/server.xml as follows, remembering to replace&amp;nbsp;/alf_data/keystore with the full path to your keystore directory&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="margin-left: 1.0in;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&amp;lt; maxThreads="150" scheme="https" keystoreFile="/alf_data/keystore/ssl.keystore" keystorePass="kT9X6oe68t" keystoreType="JCEKS"&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 9.5pt; text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;secure="true"connectionTimeout="240000" truststoreFile="/alf_data/keystore/ssl.truststore"truststorePass="kT9X6oe68t" truststoreType="JCEKS"&lt;/span&gt;&lt;/div&gt;&lt;div style="font-size: 9.5pt; text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;clientAuth="false" sslProtocol="TLS" /&amp;gt;&lt;/span&gt;&lt;/div&gt;&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;div style="text-align: justify;"&gt;&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Configure Alfresco itself to use the keystore and truststore for client requests to SOLR, by specifying dir.keystore in ALFRESCO_TOMCAT_HOME/shared/classes/alfresco-global.properties, remembering to replace&amp;nbsp;/alf_data/keystore with the full path to your keystore directory&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dir.keystore=/alf_data/keystore&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Configure an identity for the Alfresco server. In&amp;nbsp;/conf/tomcat-users.xml, add the following. Note that you can choose a different username, such as the host name of the Alfresco server, but&amp;nbsp;it must match the REPO_CERT_DNAME you will later specify in the keystore in section 2.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Configure an identity for the Solr server. In&amp;nbsp;/conf/tomcat-users.xml, add the following. . Note that you can choose a different username but&amp;nbsp;it must match the SOLR_CLIENT_CERT_DNAME you will later specify in the keystore in section 2.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;To complete the installation, it’s necessary to secure communications by generating your own keys. See section 2.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;2. &lt;b&gt;Generating and installing your own secure certificates&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Use these instructions to replace or update the keys used to secure communications between Alfresco and SOLR, using secure keys specific to your Alfresco installation.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;NOTE:&amp;nbsp;If applying these instructions to a clustered installation, the steps should be carried out on a single host and then the generated&amp;nbsp;.keystore&amp;nbsp;and&amp;nbsp;.truststore&amp;nbsp;files must be replicated(used) on all other hosts in the cluster.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The following instructions assume that solr has been extracted and a keystore directory has already been created, either automatically by the Alfresco installer, or manually by following the instructions in section 1.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;ul&gt;&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Obtain the file&amp;nbsp;generate_keystores.sh&amp;nbsp;(for Linux and Solaris) orgenerate_keystores.bat&amp;nbsp;(for Windows) from the Customer Support website under 'Online Resources &amp;gt; Downloads &amp;gt; Alfresco Enterprise 4.x &amp;gt;&amp;nbsp;'&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Edit the environment variables at the beginning of the file to match your environment&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class="MsoNormal" style="margin-left: 0.5in; text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;If you are updating an environment created by the Alfresco installer, you will only need to edit ALFRESCO_HOME to specify the correct installation directory&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="margin-left: 0.5in; text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;For manual installations, carefully review ALFRESCO_KEYSTORE_HOME, SOLR_HOME, JAVA_HOME, REPO_CERT_DNAME and SOLR_CLIENT_CERT_DNAME and edit as appropriate.&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Run the edited script&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;You should see the message&amp;nbsp;'Certificate update complete'&amp;nbsp;and another message reminding you what dir.keystore should be set to in alfresco-global.properties&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;3. &lt;b&gt;Replacing default certificates and handling certificate expiry&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;If you see errors such as the following in the logs, it means that the expiry date set in one or more of your SSL certificates has passed.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;21:52:14,109 ERROR [org.quartz.core.ErrorLogger] Job (DEFAULT.search.archiveCoreBackupJobDetail threw an exception.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;org.quartz.SchedulerException: Job threw an unhandled exception. [See nested exception: org.alfresco.error.AlfrescoRuntimeException: 07180158 Bakup for core archive feailed .... ]&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;at org.quartz.core.JobRunShell.run(JobRunShell.java:227)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;at org.quartz.simpl.SimpleThreadPool$WorkerThread.run(SimpleThreadPool.java:563)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Caused by: org.alfresco.error.AlfrescoRuntimeException: 07180158 Backup for core archive failed ....&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;at org.alfresco.repo.search.impl.solr.SolrBackupClient.executeImpl(SolrBackupClient.java:158)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;at org.alfresco.repo.search.impl.solr.SolrBackupClient.execute(SolrBackupClient.java:112)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;at org.alfresco.repo.search.impl.solr.SolrBackupJob.execute(SolrBackupJob.java:58)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;at org.quartz.core.JobRunShell.run(JobRunShell.java:216)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;... 1 more&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Caused by: org.apache.solr.client.solrj.SolrServerException: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: timestamp check failed&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;It is recommend to generate&amp;nbsp;new&amp;nbsp;secure certificates following the instructions in section 2&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;As a&amp;nbsp;temporary&amp;nbsp;measure, you can substitute&amp;nbsp;all&amp;nbsp;your existing .keystore, .truststore and .p12 files with the new Alfresco default files. These can be found in zip file'keystores.zip'&amp;nbsp;available in the support website download section with the generate keystore scripts.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;There are numerous locations for these files in the Alfresco/SOLR install, you must find and replace all the .keystore, .truststore and .p12 files with the new secure certificates&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;This is an example list of typical (v4.0.2.x ) file paths to be updated is below, but please be aware these files may be located in different relative locations in your system:&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/keystore/browser.p12&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/keystore/ssl.truststore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/keystore/ssl.keystore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/solr/workspace-SpacesStore/conf/ssl.repo.client.truststore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/solr/workspace-SpacesStore/conf/ssl.repo.client.keystore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/solr/archive-SpacesStore/conf/ssl.repo.client.truststore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/solr/archive-SpacesStore/conf/ssl.repo.client.keystore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/solr/templates/test/conf/ssl.repo.client.truststore&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;/alf_data/solr/templates/test/conf/ssl.repo.client.keystore&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Use the generate keystore script provided with the Alfresco Enterprise version you are updating&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;In the case of version 4.0.2, ideally it is best to update your install to 4.0.2.9, else use the scripts found under 4.0.2.9 downloads for 4.0.2 secure certificate generation&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The&amp;nbsp;/alf_data/solr/templates&amp;nbsp;directory&amp;nbsp;does not exist&amp;nbsp;in 4.0, 4.0.1 installs.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Users connecting directly to SOLR web app will need to replace their browser.p12 file with the new one (&lt;a href="http://docs.alfresco.com/4.0/topic/com.alfresco.enterprise.doc/tasks/solr-SSL-connecting.html"&gt;http://docs.alfresco.com/4.0/topic/com.alfresco.enterprise.doc/tasks/solr-SSL-connecting.html&lt;/a&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;(cluster) If applying these instructions to a clustered installation, the&amp;nbsp;.keystoreand&amp;nbsp;.truststore&amp;nbsp;files must be replicated (used) on all other hosts in the cluster.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;  &lt;/span&gt;&lt;/div&gt;</description><link>http://cloudbyuchit.blogspot.com/2012/09/how-to-renew-alfresco-solr-ssl.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-254947516016146767.post-5637637553115560242</guid><pubDate>Fri, 17 Aug 2012 11:52:00 +0000</pubDate><atom:updated>2012-08-17T17:27:11.539+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Carelessness</category><category domain="http://www.blogger.com/atom/ns#">Public Networks</category><category domain="http://www.blogger.com/atom/ns#">Security Risks</category><category domain="http://www.blogger.com/atom/ns#">The Cloud</category><category domain="http://www.blogger.com/atom/ns#">Tracing Difficulties</category><title>Does Cloud Computing Hold Security Risks?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;No matter what business you walk into, there will be some measure of security when it comes to their systems. Whether it is individual user identification for logging into systems and having certain privileges, or certain passwords to access particular programs, there will have been some measure taken to restrict access.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;&lt;span style="color: #222222;"&gt;The Cloud&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #222222;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;In recent years, cloud computing has emerged as a popular innovation and a great platform for businesses. The biggest benefit from a &lt;a href="http://www.attuneuniversity.com/" target="_blank"&gt;business point&lt;/a&gt; of view has been the reduction of both short and long-term costs associated with data storage. Cloud computing has allowed businesses to begin storing data online, at a much cheaper cost than they were previously paying for hard disk space and servers, which could then potentially slow down computer systems and make the workforce less productive.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;Of course, for everything that brings a benefit, there are dangers that are associated with it, especially when platforms are relatively new, as is the case with &lt;a href="http://www.attuneinfocom.com/" target="_blank"&gt;cloud computing&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;&lt;span style="color: #222222;"&gt;Carelessness&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #222222;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;The biggest risk with cloud computing is unquestionably security. Unless cloud storage is set up to only be accessible from specific ports or through an intranet, for example, any business employee could access their work information at home or even during a night out with friends.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;I am sure that the thought of an employee sharing business information with their friends and anyone else within earshot over a few drinks would send a shiver down the spine of most managers. Yes, people discuss work in their social lives, but do they always pull out their phone to prove a point, unwittingly revealing confidential business information? This is a distinct possibility and one which has seen human resources employee’s furiously rewriting “Communications in the Public Domain” guidelines for employees to follow.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;&lt;span style="color: #222222;"&gt;Tracing Difficulties&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #222222;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;One of the common problems businesses face when everyone is privy to a password, as is the case in many instances, is that if something goes wrong there is no real way to find out who was responsible. Cloud computing solves this problem only if businesses assign each individual employee an access name and password. Unless this is done then security will be further compromised.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span style="color: #222222;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="background: white; margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;b&gt;&lt;span style="color: #222222;"&gt;Public Networks&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #222222;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="margin-bottom: .0001pt; margin-bottom: 0in; mso-hyphenate: auto;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;span style="color: #222222;"&gt;Perhaps the biggest problem with cloud computing and storage is that, because it is designed to be used on the go, professionals everywhere are potentially connecting to public Wi-Fi networks without knowing who else is on the network and what they are potentially doing. This could easily lead to business’ information being placed into the public domain, as well as increase the possibility of a business or individual becoming a victim of fraud.&lt;/span&gt;&lt;span style="color: #222222;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style="color: #222222;"&gt;Posterita is an&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.posterita.com/" target="_blank"&gt;&lt;span style="color: #1155cc;"&gt;inventory management system&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #222222;"&gt;&amp;nbsp;that allows chain stores and single stores to manage every aspect of their operations via an easy-to-use web-based platform.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;  &lt;/span&gt;&lt;/div&gt;</description><link>http://cloudbyuchit.blogspot.com/2012/08/does-cloud-computing-hold-security-risks.html</link><author>noreply@blogger.com (Anonymous)</author></item></channel></rss>