Browse Definitions :
Definition

volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.

The volunteer cloud model combines public-resource computing and cloud compute infrastructure for a distributed cloud that takes the place of centralized systems in a data center. Because these projects use participants’ resources at irregular times when their computers are idle, a volunteer cloud must be flexible and tolerant of variable capabilities.

Generally, volunteer cloud computing involves groups of people who donate their resources because they believe in the goals of a given cloud project. Nevertheless, promoting and motivating support for voluntary cloud computing projects can be one of a project’s greatest challenges. Some volunteer projects, such has [email protected] have tried paying volunteers for their resource donations; other projects have tried other incentives to participate, such as gamification.

This was last updated in August 2015

Continue Reading About volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close