[go: up one dir, main page]

0% found this document useful (0 votes)
17 views4 pages

Unit 5 Cloud Computing

Cloud computing provides technological services like servers and databases over the internet, with pricing based on business needs. It includes three main service types: IaaS, PaaS, and SaaS, along with various design patterns for application reliability and scalability. Security is crucial in cloud computing, with private and public clouds serving different organizational needs and compliance requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

Unit 5 Cloud Computing

Cloud computing provides technological services like servers and databases over the internet, with pricing based on business needs. It includes three main service types: IaaS, PaaS, and SaaS, along with various design patterns for application reliability and scalability. Security is crucial in cloud computing, with private and public clouds serving different organizational needs and compliance requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit 5 Cloud Computing

Cloud computing is the provision of technological services such as:


servers, comprehensive analysis, network administration, databases
storage of information and software through internet systems. The
cloud providers charge according to the nature of the business and the
specificity of the package.

Types of services:

The wide range of services offered by thecloud computing companieshimself


can be classified into three basic types:

Infrastructure as a Service (IaaS). IaaS provides users


access to primary computing resources, such as the ability to
processing, data storage capacity, and connectivity
in network.

Platform as a Service (PaaS). The provider offers access to a


cloud-based environment in which users can create and distribute
their own applications.

Software as a Service (SaaS). SaaS providers offer


application level services tailored to a wide variety of
business needs, such as marketing automation or the
business analysis.
Design patterns:

These design patterns are useful for creating reliable applications,


scalable and secure in the cloud.
Each pattern describes the problem it faces, the considerations about
its application and an example based on Microsoft Azure. Most of the
patterns are important for all distributed systems, whether they are
hosted on Azure as well as on other cloud platforms.

Cache-aside Pattern:Load data on demand into a cache from a


storage source.
Circuit Breaker Pattern:This pattern is useful for scenarios where
it requires the ability to handle failures when the time for
Resetting a service or resource can be very variable.
Compensating Transaction Pattern:The following pattern is used for when
a series of steps carried out must be undone, which together
They signify a consistent and determined operation.

Competing Consumers Pattern:The pattern allows a system to process


several messages at the same time to optimize time, to improve
scalability and to balance the workload.

Compute Resource Consolidation Pattern:Consolidate multiple tasks or


operations in a single computing unit.

Command and Query Responsibility Segregation (CQRS) Pattern:


Separate the operations that read data from those that update, by
the use of interfaces.

External Configuration Store Pattern:This pattern can provide


opportunities for the management and control of configuration data more
easy.

Federated Identity Pattern:This pattern can simplify development,


minimize the need for user management and improve the
user experience of the application.

Gatekeeper Pattern:Protect applications and services through the use of


from a dedicated host instance that acts as an intermediary between
the clients and the application or service.

Index Table Pattern:This pattern can improve performance of


query, by allowing applications to retrieve more quickly the
data from a data warehouse.

Leader Election Pattern:This pattern can help ensure that the


tasks do not conflict with each other, causing an abundance of resources
shared.
Service standards:

Platforms:

DROPBOX

We can access Dropbox through its website or by installing its


application.

2. ONEDRIVE

If you have a Microsoft account, such as Hotmail, you will already have this.

storage without the need to register.

3. GOOGLE DRIVE

4. BOX

MEGA

It has encryption for file uploads to increase security, being the


the user is the sole responsible for sharing content.

6. AMAZON CLOUD DRIVE

Focused perhaps on Kindle users, it offers 5GB of storage.


free.

7. ICLOUD DRIVE

8. SURDOC

9. ORANGE CLOUD

10. SUGARSYNC

11. MEDIAFIRE

12. CUBBY

Security:

Cloud security is a sub-domain of information security. It


it refers to the existence of many policies, technologies, and forms of control
intended to protect data in the cloud.
Cloud security allows these activities to be carried out more efficiently.
Data is protected in data centers. As some countries require
that data is stored within the country, it may be useful for you to choose a partner
that has several data centers around the world.
Data storage often requires certain compliance requirements regarding
everything to store credit card numbers or health information. Many
cloud providers offer third-party audit reports for
guarantee that they have internal processes and their effectiveness when it comes to
manage the security in the facilities where your data is stored.
Private Cloud:
Private clouds are groups of virtual resources obtained from systems
administered by the people who use them, which can be distributed and assigned
automatically through a self-service interface. It is dedicated to a
single organization.

Public Cloud:

The public cloud is virtual groups developed from hardware that


belongs to and is operated by a third-party company, which provides and
automatically assign to multiple clients through an infrastructure of
self-service. It is for more than one organization.

IBM

Service virtualization:

You might also like