Unit 5 Cloud Computing
Cloud computing is the provision of technological services such as:
servers, comprehensive analysis, network administration, databases
storage of information and software through internet systems. The
cloud providers charge according to the nature of the business and the
specificity of the package.
Types of services:
The wide range of services offered by thecloud computing companieshimself
can be classified into three basic types:
Infrastructure as a Service (IaaS). IaaS provides users
access to primary computing resources, such as the ability to
processing, data storage capacity, and connectivity
in network.
Platform as a Service (PaaS). The provider offers access to a
cloud-based environment in which users can create and distribute
their own applications.
Software as a Service (SaaS). SaaS providers offer
application level services tailored to a wide variety of
business needs, such as marketing automation or the
business analysis.
Design patterns:
These design patterns are useful for creating reliable applications,
scalable and secure in the cloud.
Each pattern describes the problem it faces, the considerations about
its application and an example based on Microsoft Azure. Most of the
patterns are important for all distributed systems, whether they are
hosted on Azure as well as on other cloud platforms.
Cache-aside Pattern:Load data on demand into a cache from a
storage source.
Circuit Breaker Pattern:This pattern is useful for scenarios where
it requires the ability to handle failures when the time for
Resetting a service or resource can be very variable.
Compensating Transaction Pattern:The following pattern is used for when
a series of steps carried out must be undone, which together
They signify a consistent and determined operation.
Competing Consumers Pattern:The pattern allows a system to process
several messages at the same time to optimize time, to improve
scalability and to balance the workload.
Compute Resource Consolidation Pattern:Consolidate multiple tasks or
operations in a single computing unit.
Command and Query Responsibility Segregation (CQRS) Pattern:
Separate the operations that read data from those that update, by
the use of interfaces.
External Configuration Store Pattern:This pattern can provide
opportunities for the management and control of configuration data more
easy.
Federated Identity Pattern:This pattern can simplify development,
minimize the need for user management and improve the
user experience of the application.
Gatekeeper Pattern:Protect applications and services through the use of
from a dedicated host instance that acts as an intermediary between
the clients and the application or service.
Index Table Pattern:This pattern can improve performance of
query, by allowing applications to retrieve more quickly the
data from a data warehouse.
Leader Election Pattern:This pattern can help ensure that the
tasks do not conflict with each other, causing an abundance of resources
shared.
Service standards:
Platforms:
DROPBOX
We can access Dropbox through its website or by installing its
application.
2. ONEDRIVE
If you have a Microsoft account, such as Hotmail, you will already have this.
storage without the need to register.
3. GOOGLE DRIVE
4. BOX
MEGA
It has encryption for file uploads to increase security, being the
the user is the sole responsible for sharing content.
6. AMAZON CLOUD DRIVE
Focused perhaps on Kindle users, it offers 5GB of storage.
free.
7. ICLOUD DRIVE
8. SURDOC
9. ORANGE CLOUD
10. SUGARSYNC
11. MEDIAFIRE
12. CUBBY
Security:
Cloud security is a sub-domain of information security. It
it refers to the existence of many policies, technologies, and forms of control
intended to protect data in the cloud.
Cloud security allows these activities to be carried out more efficiently.
Data is protected in data centers. As some countries require
that data is stored within the country, it may be useful for you to choose a partner
that has several data centers around the world.
Data storage often requires certain compliance requirements regarding
everything to store credit card numbers or health information. Many
cloud providers offer third-party audit reports for
guarantee that they have internal processes and their effectiveness when it comes to
manage the security in the facilities where your data is stored.
Private Cloud:
Private clouds are groups of virtual resources obtained from systems
administered by the people who use them, which can be distributed and assigned
automatically through a self-service interface. It is dedicated to a
single organization.
Public Cloud:
The public cloud is virtual groups developed from hardware that
belongs to and is operated by a third-party company, which provides and
automatically assign to multiple clients through an infrastructure of
self-service. It is for more than one organization.
IBM
Service virtualization: