Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

Cloud computing is the delivery of computing services , including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

There are three main types:

• Infrastructure as a service (IaaS)
• Platform as a service (PaaS)
• Software as a service (SaaS)

Examples of Cloud Computing —

The main types of cloud computing include software as a service, platform as a service, and infrastructure as a service. Serverless computing, also known as function as a service (FaaS), is also a popular method of cloud computing for businesses. SaaS or Software as a Service.

Benefits of cloud computing —

• Reduced IT costs. Moving to cloud computing may reduce the cost of managing and maintaining your IT systems.

• Scalability.

• Business continuity.

• Collaboration efficiency.

• Flexibility of work practices.

• Access to automatic updates

The  most obvious uses of cloud computing is the mobility that it brings, both to the recreational user, as well as to the corporate and business user. Many of us are already familiar with some cloud computing services, like Google Docs, or even email services.

Five characteristics of cloud computing
On-demand self-service.

• Cloud computing resources can be provisioned without human interaction from the service provider.

• Broad network access.

• Multi-tenancy and resource pooling.

• Rapid elasticity and scalability. 

• Measured service.

Google Drive is a cloud-based storage solution that allows you to save files online and access them anywhere from any smartphone, tablet, or computer. … Drive also makes it easy for others to edit and collaborate on files.

Disadvantages of cloud computing

• Data loss or theft.

• Data leakage.

• Account or service hijacking.

• Insecure interfaces and APIs.

• Denial of service attacks.

• Technology vulnerabilities, especially on shared environments.

Categories: Courses, Learning, Tech

Tagged as: