Wednesday, April 24, 2019
Cloud Computing Research Paper Example | Topics and Well Written Essays - 750 words - 4
defame Computing - Research Paper ExampleCloud computation can involve the implement of web applications, mobile applications, data centers and another(prenominal) virtual services. This form of online work out emerged around the year 1960 with the creation of the Advanced Research Projects Network (Mohamed, 2009). Today, cloud computation is being follow in major businesses and organizations as a way of increasing efficiency and reducing operational costs.Cloud computing has three main models of application. The first model, Software as a Service (SaaS), entails the use of package applications provided by a SaaS provider (Sridhar, 2009). In this model, a client obtains access to the software applications through the use of a web browser. Another model is Platform as a Service(PaaS). This involves the provision of a platform on which the client can create and deploy their own applications. The last onrush is al-Qaida as a Service(IaaS). In this model, the client is only prov ided with the physical computing resources and they create their own platform and applications.Businesses and organizations can benefit from cloud computing in several ways. Use of cloud computing services translates to reduced operational costs, since hardware or software resources or both are acquired by the service provider depending on the cloud computing model in use. In addition to this, other services such as backup and recovery plans, security implementations and hardware maintenance routines are interpreted care of by the service provider. A business that relies on a cloud computing approach therefore saves on the time and funds that would have been used in the accomplishment of these services.Security is a major concern in cloud computing. Cloud computing is vulnerable to malware injection attacks in which a hacker creates a malicious service implementation module or virtual system exemplification and tricks the cloud system into trusting it as a genuine module (Jensen, 2 009). Denial of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.