Alibaba Cloud , also known as Aliyun ( Chinese : 阿里云 ; pinyin : Ālǐyún ; lit. 'Ali Cloud'), is a cloud computing company, a subsidiary of Alibaba Group . Alibaba Cloud provides cloud computing services to online businesses and Alibaba's own e-commerce ecosystem. Its international operations are registered and headquartered in Singapore .
37-530: Alibaba Cloud offers cloud services that are available on a pay-as-you-go basis, and include elastic compute , data storage , relational databases , big-data processing , anti-DDoS protection and content delivery networks (CDN). It is the largest cloud computing company in China, and in Asia Pacific according to Gartner . Alibaba Cloud operates data centers in 24 regions and 74 availability zones around
74-773: A 14-hour-long DDoS attack, peaking at 453.8 Gbit/s. In July 2015, the Alibaba Group invested US$ 1 billion in Alibaba Cloud. A month later, Alibaba Cloud's first Singapore data center opened, and Singapore was announced as Alibaba Cloud's overseas headquarters. Two US data centers went online in October 2015, and that same month MaxCompute took the lead in the Sort Benchmark, sorting 100 TB data in 377s compared with Apache Spark 's previous record of 1406s. The Alibaba Cloud Computing Conference
111-437: A data storage tier of an elastic application might add and remove data storage VMs due to cost and performance requirements, varying the number of used VMs. Thus, additional information is needed in monitoring elastic applications, such as associating the logical application structure over the underlying virtual infrastructure. This in turn generates other problems, such as how to aggregate data from multiple VMs towards extracting
148-438: A specific application component. Elastic applications can allocate and deallocate resources (such as VMs) on demand for specific application components. This makes cloud resources volatile, and traditional monitoring tools which associate monitoring data with a particular resource (i.e. VM), such as Ganglia or Nagios , are no longer suitable for monitoring the behavior of elastic applications. For example, during its lifetime,
185-436: Is able to adapt to workload changes by provisioning and de-provisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible". Elasticity is a defining characteristic that differentiates cloud computing from previously proposed distributed computing paradigms, such as grid computing . The dynamic adaptation of capacity, e.g., by altering
222-460: Is free of charge and can be applied for by any German institution. The UP KRITIS (UP stands for implementation plan) is a public-private cooperation between operators of critical infrastructures (KRITIS), their various associations and the responsible governmental agencies such as the BSI. It addresses eight of the nine critical infrastructure sectors. The sector "state and administration" is covered by
259-513: Is located in Bonn and as of 2024 has about 1,700 employees. Its current president, since 1 July 2023, is former business executive Claudia Plattner, who took over the presidency from Arne Schönbohm. BSI's predecessor was the cryptographic department of Germany's foreign intelligence agency ( BND ). BSI still designs cryptographic algorithms such as the Libelle cipher and initiated the development of
296-465: Is the German upper-level federal agency in charge of managing computer and communication security for the German government . Its areas of expertise and responsibility include the security of computer applications, critical infrastructure protection , Internet security , cryptography , counter eavesdropping , certification of security products and the accreditation of security test laboratories. It
333-636: The Gpg4win cryptographic suite. The BSI has a similar role as the Unlike those organizations, BSI is focused on IT security rather than being part of an organisation with a more general IT standards remit. BSI is separate from Germany's signals intelligence , which is part of the military and the foreign intelligence service ( BND ). The BSI's scope of duties is defined by the German Federal Office for Information Security (BSI Act). The aim of
370-695: The Log4Shell bug. In September 2022, Alibaba Cloud announced a $ 1 billion pledge to upgrade its global partner ecosystem. Alibaba Cloud has 25 regional data centres globally. The Data Center in Germany is operated by Vodafone Germany (Frankfurt) and certified with C5. Alibaba Cloud provides cloud computing IaaS , PaaS , DBaaS and SaaS , including services such as e-commerce , big data , Database , IoT , Object storage (OSS), Kubernetes and data customization which can be managed from Alibaba web page or using aliyun command line tool. AnalyticDB
407-837: The Malaysia data center commenced operations in October. That same month, the company partnered with Elastic and launched a new service called Alibaba Cloud Elasticsearch. Alibaba Cloud India data center commenced operations in December 2017. In addition, Alibaba Cloud received the C5 standard certification from the German Federal Office for Information Security (BSI) for its data centers in Germany and Singapore. In February 2018, Alibaba Cloud’s Indonesia data center commenced operations. The company's first data center opening in
SECTION 10
#1732800866537444-708: The Philippines in June 2021. Alibaba Cloud unveiled the ARM-based Yitian 710 chip, designed in-house, for use in its data centers in October 2021. On November 24, 2021, the bug Log4Shell was disclosed to Apache by Chen Zhaojun of Alibaba Cloud’s Security Team. On December 22, 2021, the Chinese Ministry of Industry and Information Technology suspended a partnership with Alibaba Cloud for "failure in reporting cybersecurity vulnerabilities" related to
481-469: The BSI include informing and sensitizing citizens to the safe use of information technology, mobile communication media and the Internet. The BSI therefore offers online content specially tailored to the needs of citizens ( BSI für Bürger ). The website covers topics and information on IT and Internet security in a way that is understandable even for technical laypersons. In addition to providing information,
518-549: The BSI is the promotion of information and cyber security in order to enable and promote the use of secure information and communication technology in government, business and society. For example, the BSI develops practice-oriented minimum standards and target group-specific recommendations for handling IT and Internet security. The BSI is also responsible for protecting the IT systems of the federal government. This involves defending against cyber attacks and other technical threats against
555-622: The German Association for Information Technology, Telecommunications and New Media (Bitkom). As a members-only association major players in the field of cyber security in Germany aim to provide up-to-date and valid information on threats in cyberspace and supports the exchange of information, experience and best practices between participants. More than 6,800 institutions as of 2023 belong to the Alliance for Cyber Security, including 180 partner companies and 110 multipliers. Participation
592-655: The Green Book, ITSEC and the Common Criteria. The BSI is a national authority in the field of cryptography, which draws up recommendations and technical guidelines for cryptographic procedures and is involved in the development of international cryptographic standards. The IT Baseline Protection Catalog, or IT-Grundschutz , is a collection of enterprise security guidelines established by the office, which serve to identify and combat security-relevant vulnerabilities in IT environments. With introduction and catalogs,
629-619: The IT systems and networks of the federal administration. Once a year, the BSI reports on this to the Committee on Internal Affairs of the German Bundestag. The tasks of the BSI include: The BSI is the central certification body for the security of IT systems in Germany (computer and data security, data protection). Testing and certification is possible with regard to the standards of the IT-Grundschutzhandbuch,
666-584: The UP BUND and activities on state and municipal level. The goal of the UP KRITIS cooperation is to maintain the supply of critical infrastructure services in Germany. All organizations based in Germany that operate critical infrastructures in Germany, national professional and industry associations from the KRITIS sectors and the responsible authorities can participate in UP KRITIS upon application. The tasks of
703-422: The behavior of the application component running on top of those VMs, as different metrics might need to be aggregated differently (e.g., cpu usage could be averaged, network transfer might be summed up). When deploying applications in cloud infrastructures (IaaS/PaaS), requirements of the stakeholder need to be considered in order to ensure proper elasticity behavior. Even though traditionally one would try to find
740-446: The collection comprises more than 4,800 pages and serves companies and authorities as a basis for obtaining certification according to IT-Grundschutz. By obtaining certification, a company demonstrates that it has taken appropriate measures to protect its IT systems against IT security threats. Nationales Cyber-Abwehrzentrum (National Cyber Defence Centre), Cyber-AZ is a cooperative institution of German authorities at federal level for
777-617: The defense of electronic attacks on IT infrastructures of the Federal Republic of Germany and its economy. It was launched on April 1, 2011 and is located at the BSI. The center is a core element of the Cyber Security Strategy adopted by the German government in 2011. It aims to optimize operational cooperation and coordinate protection and defense measures. This is based on a holistic approach that brings together
SECTION 20
#1732800866537814-566: The establishment of a second availability zone. Alibaba Cloud also achieved two new certifications overseas: Singapore Multi-Tier Cloud Security (MTCS) standard Level 3, and the Payment Card Industry Three-Domain Secure ( PCI 3DS ). The company partnered with Vodafone Germany in November 2016 for Data Center operations and to provide cloud services to German and European companies. Alibaba became
851-561: The first. Chinese cloud service provider to pass ISO27001:2005 (Information Security Management System). In January 2013, Alibaba Cloud merged with HiChina (founded by Xiangning Zhang ) for the www.net.cn business as one of the largest acquisitions in the company's history at the time. In August of that year, ApsaraDB architecture supported 5000 physical machines in a single cluster. The company’s Hong Kong data center went online in May 2014, and in December of that year, Alibaba Cloud defended
888-678: The globe. As of June 2017, Alibaba Cloud is placed in the Visionaries' quadrant of Gartner 's Magic Quadrant for cloud infrastructure as a service , worldwide. Alibaba Cloud was founded in September 2009, and R&D centers and operation centers were opened in Hangzhou , Beijing , and Silicon Valley . In November 2010, the company supported the first Single's Day (11.11) Taobao shopping festival, with 2.4 billion PageViews ( PV ) in 24 hours. Two years later, in November 2012, it became
925-716: The impact lower level control has upon higher level ones and vice versa (e.g., controlling virtual machines, web containers, or web services in the same time), as well as conflicts which may appear between various control strategies from various levels. Elastic strategies on Clouds can take advantage of control-theoretic methods (e.g., predictive control has been experimented in Cloud scenarios by showing considerable advantages with respect to reactive methods). German Federal Office for Information Security The Federal Office for Information Security ( German : Bundesamt für Sicherheit in der Informationstechnik , abbreviated as BSI )
962-731: The official cloud services provider of the Olympics in January 2017. A month later, in February, the company became a founding Member of the EU Cloud Code of Conduct. In June 2017, Alibaba Cloud was placed in the Visionaries quadrant of Gartner's Magic Quadrant for Cloud Infrastructure as a Service, Worldwide. Alibaba Cloud partnered with Malaysia's Fusionex in September 2017 to provide cloud solutions in Southeast Asia , and
999-497: The optimal trade-off between cost and quality or performance, for real world cloud users requirements regarding the behavior are more complex and target multiple dimensions of elasticity (e.g., SYBL ). Cloud applications can be of varying types and complexities, with multiple levels of artifacts deployed in layers. Controlling such structures must take into consideration a variety of issues, an approach in this sense being rSYBL . For multi-level control, control systems need to consider
1036-441: The service cannot serve its users with a good service. In the above example, under-provisioning the website may make it seem slow or unreachable. Web users eventually give up on accessing it, thus, the service provider loses customers. On the long term, the provider's income will decrease, which also reduces their profit. One potential problem is that elasticity takes time. A cloud virtual machine (VM) can be acquired at any time by
1073-484: The service provider often has to pay for the resources that are allocated to the service. For example, an Amazon EC2 M4 extra-large instance costs US$ 0.239/hour. If a service has allocated two virtual machines when only one is required, the service provider wastes $ 2,095 every year. Hence, the service provider's expenses are higher than optimal and their profit is reduced. Under-provisioning , i.e., allocating fewer resources than required, must be avoided, otherwise
1110-490: The use of computing resources , to meet a varying workload is called "elastic computing". In the world of distributed systems , there are several definitions according to the authors, some considering the concepts of scalability a sub-part of elasticity, others as being distinct. Let us illustrate elasticity through a simple example of a service provider who wants to run a website on an IaaS cloud. At moment t 0 {\displaystyle t_{0}} ,
1147-467: The user; however, it may take up to several minutes for the acquired VM to be ready to use. The VM startup time is dependent on factors, such as image size, VM type, data center location, number of VMs, etc. Cloud providers have different VM startup performance. This implies any control mechanism designed for elastic applications must consider in its decision process the time needed for the elasticity actions to take effect, such as provisioning another VM for
Alibaba Cloud - Misplaced Pages Continue
1184-440: The various threats in cyberspace: Cyber espionage, cyber spying, cyber terrorism and cyber crime. The goal is a rapid exchange of information, rapid assessments and concrete recommendations for action derived from these. The Alliance for Cyber Security, or Allianz für Cyber-Sicherheit , is an initiative of the German Federal Office for Information Security (BSI). It was launched 2012 in public–private partnership cooperation with
1221-421: The website and the resource requirements of the web server , it might be that ten machines are needed. An elastic system should immediately detect this condition and provision nine additional machines from the cloud, so as to serve all web users responsively. At time t 2 {\displaystyle t_{2}} , the website becomes unpopular again. The ten machines that are currently allocated to
1258-495: The website are mostly idle and a single machine would be sufficient to serve the few users who are accessing the website. An elastic system should immediately detect this condition and deprovision nine machines and release them to the cloud. Elasticity aims at matching the amount of resource allocated to a service with the amount of resource it actually requires, avoiding over- or under-provisioning. Over-provisioning , i.e., allocating more resources than required, should be avoided as
1295-399: The website is unpopular and a single machine (most commonly a virtual machine ) is sufficient to serve all web users. At moment t 1 {\displaystyle t_{1}} , the website suddenly becomes popular, for example, as a result of a flash crowd , and a single machine is no longer sufficient to serve all users. Based on the number of web users simultaneously accessing
1332-751: Was also held in October 2015 in Hangzhou and attracted over 20,000 developers. A month later, in November, the company supported the 11.11 shopping festival with a record of $ 14.2 billion transactions in 24 hours. Alibaba Cloud partnered with SK Holdings C&C in April 2016 to provide cloud services to Korean and Chinese companies.A month later, the company formalized a joint venture with SoftBank to launch cloud services in Japan that utilize technologies and solutions from Alibaba Cloud. In June 2016, Alibaba Cloud expanded its data center operations in Singapore with
1369-450: Was first released in May, 2018, and the latest version 3.0 was released in 2019 On April 26, 2019, TPC published TPC-DS benchmark result of AnalyticDB. In 2019, a paper about the system design of AnalyticDB was published in VLDB conference 2019. List of academic alliances: Elasticity (cloud computing) In computing , elasticity is defined as "the degree to which a system
#536463