Purging residual data from instance resources before they are re-allocated.
在重新分配实例资源之前,彻底清除其中的残留数据。
2
The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。
3
First, management is simplified, IT staff can be reduced or re-allocated, and, most importantly, users can be sure that their information will be available.