Posts tagged ‘Elastic Compute Cloud’
Update in Amazon Web Services:
2 high cpu instance types : 64 bits – Double Extra Large с 34.2 GB RAM, and 13 ECU (4 virtual cores *3.25 EC2 compute Unit=ECU), 64-bit platform
and Quadruple Extra Large – 68.4 GB of RAM/ 26 ECU (8 virtual cores* 3.25 ECU) : New EC2 High-Memory Instances
Instance prices changes ( us-east is still cheaper thatn eu-west ) : Amazon EC2 – Now an Even Better Value
New service for relational DB ( provisioning, scaling and other nice things ) : Introducing Amazon RDS – The Amazon Relational Database Service
Security stuff : Vulnerability identified in Amazon’s cloud computing
Amazon EC2 – Ubuntu at google groups
5 years ago Amazon announced Amazon Simple Queue Service – top points of AWS for last 5 years
Posted by Alexey Bokov on October 28, 2009 at 3:11 pm under compute grid, ec2, linux.
Tags: administration, Amazon EC2, aws, compute cloud, Elastic Compute Cloud, ubuntu, work
Comment on this post.
Sun Grid Engine’s top engineer Richard Hierlmeier wrote article ( and some bash scripts which implements it – btw why you not to put it them onto your cvs? ) about using SDM in compute cloud ( here’s EC2 as example, I suppose that GoGrid can be used also without too many changes ) – Using SDM Cloud Adapter to Manage Solaris Zones.
Posted by Alexey Bokov on July 7, 2009 at 12:03 pm under administration, compute grid, ec2.
Tags: administration, Amazon EC2, bash, compute cloud, Elastic Compute Cloud, hedeby, qconf, SGE, Solaris, sun, work
Comment on this post.
Sun released new version of Sun Grid Engine – 6.2 Update 3. That’s new:
upd. Also there’s new Sun Studio 12 Update 1 is available too.
Posted by Alexey Bokov on June 23, 2009 at 1:52 pm under compute grid, ec2.
Tags: Amazon EC2, Elastic Compute Cloud, SGE, Solaris, sun, work
Comment on this post.
The central idea we were working on was this idea of de-localized information — information for which I didn’t care what computer it was stored on. It didn’t depend on any particular computer. I didn’t know the identities of other computers in the ensemble that I was working on. I just knew myself and the cybersphere, or sometimes we called it the tuplesphere, or just a bunch of information floating around. We used the analogy — we talked about helium balloons. We used a million ways to try and explain this idea – hn Markoff and Clay Shirky talk to David Gelernter – Lord of the Cloud
Posted by Alexey Bokov on June 22, 2009 at 9:09 pm under compute grid, useful links.
Tags: compute cloud, Elastic Compute Cloud, interesting, video, work
Comment on this post.
Stallman dismisses cloud computing as industry bluster. “It’s stupidity. It’s worse than stupidity: it’s a marketing hype campaign,” he said – huh, i agree that anything which contain “cloud” keyword have too much marketing stuff , but it’s not really stupid. There’s too much marketing stuff in this area ( and goGrid’s guys are the very first for this ‘too much marketing’ ), but let’s look on amazon ec2 – it’s really great amazing thing – last 7 years my work related with various size cluster’s, and last year my “server provider” is amazon – and I may say that amazon is much convenient than any company-owned-datacenter. For my it’s big deal when I can get 100 servers for 10 mins and run some job on them. There’s too much marketing noise in cloud industry, but it works and it works almost fine.
ps. Another point for cloud computing – it’s Steve Ballmer on defining the cloud.
Posted by Alexey Bokov on June 9, 2009 at 1:16 pm under compute grid, humor, internet, stuff.
Tags: Add new tag, Amazon EC2, compute cloud, Elastic Compute Cloud, interesting, internet, Solaris, sun
Comment on this post.
Guys from Amazon posts in Amazon Web Services Blog interesting document – AWS Security White Paper.
Main points –
- there’s no backup for data ( EBS, S3, anything), but all data redundantly stored in multiple physical locations
- for EC2 they have four security levels – host OS ( access : only AWS administrators ), guest OS ( access : only customers, AWS admins can’t log onto guest OS ), Firewall ( indirectly configured by customers, AWS admins also have access ) , Amazon EC2 API ( access : only customers ).
- all guest OS running by hypervisor XEN – so instances have no direct access to hardware resources, and can’t read-write any data which owned another instances – including network packets, disk devices and memory.
- network traffic ( for different instances ) can not be sniffed, external DDoS secured by firewal, port scanning inside network prohibited by Acceptable Use Policy ( customer will be blocked for this, I suppose ), instances can’t use IP spoofing ( because of hypervisor Xen :-). Anyway, Amazon reccomend to use SSL for network connections.
- Security in S3 and SimpleDB based in ACL ( access control list ) – only data owner may edit access permission.
- All data in S3 and SimpleDB stored ‘as is’ without any encryption. If you want to be more secure – you should store encrypted data – “Encrypting before sending to SimpleDB guarantees that no party, including AWS, has access to sensitive customer data”. Once you delete data from S3 or SimpleDB all external links to them will be unaccessible – “area is then made available only for write operations and the data is overwritten by newly stored data”. S3 and SimpleDB nodes use SSL for network connection, so there’s no chances for Man-In-The-Middle attack.
Posted by Alexey Bokov on September 11, 2008 at 12:42 pm under ec2.
Tags: Amazon EC2, EBS, Elastic Compute Cloud, security, Simple Storage Service, SimpleDB
Comment on this post.