upload
Gartner, Inc.
Industria: Consulting
Number of terms: 1807
Number of blossaries: 2
Company Profile:
Gartner delivers technology research to global technology business leaders to make informed decisions on key initiatives.
Public cloud computing is a style of computing where scalable and elastic IT-enabled capabilities are provided as a service to external customers using Internet technologies—i.e., public cloud computing uses cloud computing technologies to support customers that are external to the provider's organization. Using public cloud services generates the types of economies of scale and sharing of resources that can reduce costs and increase choices of technologies.From a government organization's perspective, using public cloud services implies that any organization (in any industry sector and jurisdiction) can use the same services (e.g., infrastructure, platform or software), without guarantees about where data would be located and stored.
Industry:Technology
Cloud printing services (CPS) are hosted cloud computing offerings that enable users to print documents and other materials on any device associated with the cloud. Users create content with any software tool they want and transfer the file to a cloud printing service provider via whatever device they choose, which then routes the file to a cloud-attached printer at a location selected by the user. CPS may be open (hosted by a company that enables other enterprises to use its hardware, software and network to produce printed materials) or closed (a proprietary network that is available to only the enterprise's customers).Cloud printing enables end users, whether professional buyers or consumers, to have documents printed without being encumbered by actual printing equipment and still have it delivered where and when they want it. Technology providers may enable CPS as part of a managed print services (MPS) offering.
Industry:Technology
Cloud security gateways are on-premises or cloud-based security policy enforcement points placed between cloud service consumers and cloud service providers to interject enterprise security policies as the cloud-based resources are accessed. Cloud security gateways consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, security token mapping, encryption, tokenization, logging, alerting, API control and so on.
Industry:Technology
Cloud-based grid computing involves using computers in a public cloud service, or a hybrid of public cloud and internally owned computers, to collectively accomplish large tasks, such as derivative risk analysis, candidate drug screening and complex simulations. We do not include grids that use private cloud or traditional in-house servers only, which we instead cover as "grid computing not using public cloud computers."
Industry:Technology
A cloud access security broker (CASB) is an on-premises, or cloud-based security policy enforcement point, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on.
Industry:Technology
Cloud encryption gateways provide cloud security proxy (typically at the application level), which performs encryption, tokenization or both on an item-by-item basis as data flows through the proxy. The obfuscated (encrypted or tokenized) data can then be stored in a cloud-based software-as-a-service (SaaS) application, such as salesforce.com. Cloud encryption gateways typically provide a choice of various encryption and tokenization algorithms, depending on the strength of protection required and how much format preservation is necessary (for example, to preserve sorting).
Industry:Technology
Capacity overdrafting or cloudbursting are interchangeable terms that refer to the ability to acquire more capacity from a different cloud infrastructure automatically when the primary cloud infrastructure is overloaded. This will increase the risk that an internally implemented, progressively customized private cloud strategy won't allow for easy portability or transition into providers' future public cloud services.
Industry:Technology
In the service provider view, cloud service elasticity is the ability to increase or decrease the amount of system capacity (for example, CPU, storage, memory and input/output bandwidth) that is available for a given cloud service on demand, in an automated fashion. This gives their customers the perception of unlimited capacity. From the consumer and RTI perspectives, cloud service elasticity is an automated means to increase or decrease a specific service capacity in response to increasing or scheduled demand changes.
Industry:Technology
Grid computing refers to using computers managed by more than one organization, whether internal or external, to collectively accomplish large tasks, such as derivative risk analysis, candidate drug screening or complex simulations. The management domains can be separate companies, separate divisions of one company, or different data centers and operating organizations inside one company. The computers involved can be dedicated to the grid, or they can contribute spare cycles to run grid work; grid computing also applies to a private cloud used to run grid workloads. Grid computing does not include the use of public cloud-based computers, either partially or fully. We refer to those situations as cloud-based grid computing.
Industry:Technology
Cloud file sharing refers to a range of cloud services that allows people to store and synchronize documents, photos, videos and other files in the cloud—and share them with other people. These services also allow users to share and synchronize data among multiple devices for a single owner. These services are accessible through desktops, notebooks, smartphones and media tablets, and provide a simple mechanism for synchronizing data across multiple devices.
Industry:Technology
© 2024 CSOFT International, Ltd.