One of the economic sectors with the greatest degree of changing technology is the communication industry. Cloud service providers have seen an increase in demand for their services after corporations started realizing the power of clouds in enhancing customer interaction. In this era of computer integration in the corporate sector, it is paramount that firms be prepared to change to remain competitive in the economy.
The concept of cloud computing is still in the developmental stages and much has to be learned about how to use it efficiently. It is essentially a model that enables sharing of a pool of computing resources while managing access and starvation issues. This calls for a system that will be able to handle user requests without the need for human assistance.
Remote access should be supported so that users can operate from heterogeneous thick or thin clients without experiencing technical hitches. The resources owned by the provider are geographically distributed but they appear as one pool to the customer. The customer makes use of resources such as processors, memory or files without knowing their physical location. Above all, the system must have a means of service restriction depending on the access rights of a user account.
The capabilities a given system offers to its client can be described by various paradigms. For instance Software as a Service (SaaS) models depict a scenario where a user applies a program that has been stored on a server by the provider. Another model called the Platform as a Service (PaaS) allows clients to make use of applications that have been created by other clients.
Based on the access rights defined for a particular cloud, various deployment models result. A private cloud is only accessible to entities of an organization which claims ownership of the resources located at their premises or at a separate location. In some instances, they may be run by a third party just like collocation services.
Groups of consumers affiliated to some given organizations use community clouds. Public clouds are meant for the general population and managed by business, academic or governmental organizations. These categories can also be combined in various proportions to form the hybrid clouds as long as some form of standardization is adopted to support application portability.
The idea of a mainframe serving thin clients was established in the late fifties and has played a significant role in the development of present day architectures. These forms of distribution are associated with better efficiency, performance and reliability in the event of accidental data loss. Maintenance operations also tend to be less hectic in contrast to a setting where applications to be checked are installed on each computer in a network. With distribution, firms can take advantage of favorable business environments in a distant location.
Cloud service providers always find themselves under attacks from groups concerned about the security of data on transit. Various techniques of encryption have been tried to thwart the effort of system hackers. So large is the insecurity issue that terms such as malicious insiders, bug developers and password eavesdroppers have been coined. Nevertheless, this technology is bound to grow in popularity as the usage of computers is on the rise.
The concept of cloud computing is still in the developmental stages and much has to be learned about how to use it efficiently. It is essentially a model that enables sharing of a pool of computing resources while managing access and starvation issues. This calls for a system that will be able to handle user requests without the need for human assistance.
Remote access should be supported so that users can operate from heterogeneous thick or thin clients without experiencing technical hitches. The resources owned by the provider are geographically distributed but they appear as one pool to the customer. The customer makes use of resources such as processors, memory or files without knowing their physical location. Above all, the system must have a means of service restriction depending on the access rights of a user account.
The capabilities a given system offers to its client can be described by various paradigms. For instance Software as a Service (SaaS) models depict a scenario where a user applies a program that has been stored on a server by the provider. Another model called the Platform as a Service (PaaS) allows clients to make use of applications that have been created by other clients.
Based on the access rights defined for a particular cloud, various deployment models result. A private cloud is only accessible to entities of an organization which claims ownership of the resources located at their premises or at a separate location. In some instances, they may be run by a third party just like collocation services.
Groups of consumers affiliated to some given organizations use community clouds. Public clouds are meant for the general population and managed by business, academic or governmental organizations. These categories can also be combined in various proportions to form the hybrid clouds as long as some form of standardization is adopted to support application portability.
The idea of a mainframe serving thin clients was established in the late fifties and has played a significant role in the development of present day architectures. These forms of distribution are associated with better efficiency, performance and reliability in the event of accidental data loss. Maintenance operations also tend to be less hectic in contrast to a setting where applications to be checked are installed on each computer in a network. With distribution, firms can take advantage of favorable business environments in a distant location.
Cloud service providers always find themselves under attacks from groups concerned about the security of data on transit. Various techniques of encryption have been tried to thwart the effort of system hackers. So large is the insecurity issue that terms such as malicious insiders, bug developers and password eavesdroppers have been coined. Nevertheless, this technology is bound to grow in popularity as the usage of computers is on the rise.
No comments:
Post a Comment