Browse Definitions :
Definition

volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.

The volunteer cloud model combines public-resource computing and cloud compute infrastructure for a distributed cloud that takes the place of centralized systems in a data center. Because these projects use participants’ resources at irregular times when their computers are idle, a volunteer cloud must be flexible and tolerant of variable capabilities.

Generally, volunteer cloud computing involves groups of people who donate their resources because they believe in the goals of a given cloud project. Nevertheless, promoting and motivating support for voluntary cloud computing projects can be one of a project’s greatest challenges. Some volunteer projects, such has [email protected] have tried paying volunteers for their resource donations; other projects have tried other incentives to participate, such as gamification.

This was last updated in August 2015

Continue Reading About volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close