Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 15 July 2011

What Is Cloud Computing? Defining the Cloud

Posted on 12:25 by Unknown
The term of “cloud computing” is rather new, although it has been nearly a decade since cloud computing services were first used. The fact is that only few years ago the potential of this area was realized and suitable name found by IT specialists. Nevertheless this expression still says nothing for a decent user. The easiest way to understand the essence of this powerful conception is to explain both of the words separately. For a long time, the word “cloud” has been used as the synonym of Internet, especially in flowcharts or diagrams. Meanwhile, the word “computing” is usually associated with all kind of activities on computer. By coupling these two terms together we get a cloud computing, which, according to previous explanations, stands for computing through internet and is very close to actual meaning.

In general, the essence of cloud computing is the way of keeping information. In traditional computing, we store all data and programs on our PCs and normally we can access them only through the same computer unless you allow remote access. Whereas in cloud computing all necessary data and programs are stored in the service provider’s information centre and thereof they can be accessed from any PC with an Internet connection. In many cases you don’t even have to download and install any applications to your computer, because they are already in the “cloud”.



The illustration of cloud computing

At this point it is very important to understand the differences between classic client-service model and cloud computing as these concepts may look similar to someone. There are three distinct characteristics which should be discussed in this case: elasticity, flexibility and maintenance. For example, when you buy a traditional web hosting service, all the details are defined in advance: the amount of space for your website bandwidth size, the number of databases you are able to configure and so on. However, when you order a similar service from the “cloud”, you can use as much or as little space and resources as you need at that moment – it is elastic. Moreover, you pay only for the actual consumption of services (it is like on demand self-service) and you don’t have to care neither about maintenance nor about tools for using it – the service is fully managed by the provider. All you need is computer with sufficient Internet connection.

In addition, the cloud computing model is broadly divided into two deployment models (private or public) and three service models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).
A private cloud supplies hosted services to particular organization or limited number of people and can be managed by them or a third party. A public cloud is available to anyone on the Internet or a large industry group and is owned by a service provider (for example, Amazon Web Services). Sometimes, when an organization, which sells cloud services, creates its own private cloud from public cloud resources, the result is called a virtual private cloud. However, despite of the deployment model, the goal of cloud computing is still the same – to ensure convenient and secure access to massive computing resources and endless scalability.

Infrastructure-as-a-Service (IaaS), as the name implies, provides infrastructure or actual servers and storage to a buyer. This means that consumers are able to use as much capacity as they need, however the responsibility for installing operating system and all the required applications should be taken by themselves. One of the best examples of this cloud model is Amazon Web Services (AWS), which allows accessing and configuring their virtual servers and storage. IaaS supports the PaaS and SaaS layers. This provides a high degree of autonomy but increases complexity.

Platform-as-a-Service (PaaS) provides the same services like Infrastructure-as-a-Service (IaaS), but in addition installs the platforms on top of the hardware and takes care of maintaining them. Please note that the main difference between IaaS and PaaS is the amount of control over the system available to users of the services. IaaS provides total control, PaaS typically provides no control. This enables consumers to create or acquire applications by using software and product development tools over the Internet. However, it should be taken into account, that question of standards for interoperability or data portability in the cloud is still open, and therefore some cloud service providers may not allow moving created software out of his platform. The examples of PaaS are GoogleApps and Force.com.

Software-as-a-Service (SaaS) is similar to Platform-as-a-Service (PaaS), but has even more limitations. SaaS provides access to various kinds of software managed by vendor and interacts with the consumer though a front-end portal. Of course, the software may intern according to the company needs or activities and can be reached from anywhere in the world simply by Internet. For this reason, SaaS is a very broad market with many capabilities. Some of the best known examples of SaaS are Web-based emails (Gmail, Yahoo Mail, Hotmail, etc.) and Google Docs.

Although these three service models of cloud computing, which were described above, are still relevant, some experts presumes that very soon everything will be offered as a single package with the possibility to choose what end-user really needs. Whether these predictions will come true or not, one thing can be said for sure – a cloud computing will play more and more important role in meeting the needs of organizations and private customers.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Cloud Computing | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • Remove RiskTool.Win32.BitCoinMiner (Uninstall Guide)
    RiskTool.Win32.BitCoinMiner is a risk tool or potentially unwanted application that may use your computer's resources to generate bitco...
  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Remove Rattlingsearchsystem.com (Uninstall Guide)
    Rattlingsearchsystem.com is a ZeroAccess/Sirefef rootkit-related browser hijacker that redirects users to shady websites while searching on...
  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • Remove TR/ATRAPS.Gen2, removal instructions
    Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different...
  • Remove Ask Search and Ask Toolbar (Uninstall Guide)
    Ask Search and Ask Toolbar are very often incorrectly classified as virus/spyware that may cause search redirects. The majority of us pref...
  • Remove Windows Attention Utility (Uninstall Guide)
    Windows Attention Utility is a rogue security application that generates misleading warnings about nonexistent viruses and attempts to lure...
  • Remove "System Check" (Uninstall Guide)
    System Check is malicious software posing as Windows system utility. Although, it may look like a real thing, it isn't! You are actuall...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ►  2013 (173)
    • ►  December (6)
    • ►  November (13)
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ►  June (31)
    • ►  May (25)
    • ►  April (15)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (11)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ▼  2011 (239)
    • ►  December (8)
    • ►  November (18)
    • ►  October (21)
    • ►  September (24)
    • ►  August (28)
    • ▼  July (32)
      • How can I tell if my computer is infected?
      • How do I know if I have spyware on my computer?
      • Remove "Your computer is infected with Spyware!" A...
      • Norton AntiVirus ENHANCED PROTECTION MODE
      • Microsoft Defender ENHANCED PROTECTION MODE
      • Microsoft Security Essentials ENHANCED PROTECTION ...
      • McAfee ENHANCED PROTECTION MODE
      • Dr.Web ENHANCED PROTECTION MODE
      • Comodo ENHANCED PROTECTION MODE
      • Avira AntiVir ENHANCED PROTECTION MODE
      • Remove "Avast ENHANCED PROTECTION MODE" Trojan (Un...
      • Remove "Your codec version is too old" (Uninstall ...
      • How to Remove Total Protect (Uninstall Guide)
      • How to Remove Zentom System Guard (Uninstall Guide)
      • Remove www5.antimalware-lab.com (Uninstall Guide)
      • Remove Jucheck.exe Trojan (Uninstall Guide)
      • How to Remove BlueFlare Antivirus (Uninstall Guide)
      • What Is Cloud Computing? Defining the Cloud
      • IaaS - Cloud Computing
      • PaaS - Cloud Computing
      • SaaS - Cloud Computing
      • How to Remove Scour (Uninstall Guide)
      • How to Remove System Repair (Uninstall Guide)
      • Are there any safe adult websites that won't give ...
      • Remove Windows XP Fix, Windows Vista Fix or Window...
      • "System process at address 0x3BC3 have just crashe...
      • How to Remove Anti-Malware Lab (Uninstall Guide)
      • How do I block a website on Google Chrome?
      • How to Remove Personal Shield Pro (Uninstall Guide)
      • How to Create a Strong Password
      • Remove Windows Supervision Center (Uninstall Guide)
      • Remove TR/VB.Agent.20480.A (Uninstall Guide)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile