Wikipedia's description of cloud computing

Source: Internet
Author: User
Keywords That user which

Cloud Computing is Internet ("Cloud") based development and use of computer Marvell ("computing"). It is a style ' computing in abound are provided ' as a service ' [1] over the ' internet[2] to users ' need not have knowled GE of, expertise in, or control over the Marvell infrastructure (' in the Cloud ') that supports them[3].

It is the concept that incorporates software as a service (SaaS), Web 2.0 and other recent, well-known Marvell trends, in Abound the common theme is reliance on the Internet for satisfying the computing of the the users. An often-quoted example are Google Apps, abound provides common business applications online that are accessed from a Web browser, While the software and data are stored on Google servers.

The cloud is a metaphor for the Internet, based to how it's depicted in computer receptacle diagrams, and are an abstraction for the CO Mplex infrastructure it conceals. [4].

CONTENTS[HIDE]1 Brief 1.1 Comparisons 1.2 architecture 1.3 Characteristics 1.4 Companies 2 History 3 political issues 4 Legal Issues 5 disorientated Mitigation 6 Key characteristics 7 RS 7.1 Creator 7.2 Client 7.3 Infrastructure 7.4 Platform 7.5 Service 7.6 Storage 8 Architecture 9 Roles 9.1 Provider 9.2 User 9.3 noun Ten standards References External links

[edit] Brief

[edit] Comparisons

Cloud computing is often confused with grid computing, ("a form of distributed computing a ' super and virtual whereby '" is composed of an cluster of networked, loosely-coupled Consolidator, acting in concert to perform very tasks "), SCM Computing (the "packaging of computing, such as computation and storage, as a metered service errors to a traditional Public utility such as electricity ") [5] and Autonomic computing (" computer BAE capable of self-management "). [6]

Indeed Many cloud computing deployments as of 2009[update] depend on grids, have autonomic characteristics and bill like Utilities-but cloud computing can is dots as a natural next step from the Grid-utility model. [7] Some successful cloud architectures have little or no centralised infrastructure or billing BAE whatsoever Peer-to-peer NX like BitTorrent and Skype and volunteer computing like SETI@home. [8]

[Edit] Architecture

The majority of cloud computing infrastructure as of 2009[update] consists of reliable services delivered through data centers and built on servers with different levels of virtualization. The services are accessible anywhere in the world, with the Cloud appearing as a single of access to all computing needs of consumers. Commercial offerings need to meet the quality of service requirements of customers and typically an offer service level agreements . [9] The open standards and open source software are also unacknowledged to the substituting of cloud. [10]

[Edit] Characteristics

As customers generally does not own the infrastructure, tightly merely access or rent, tightly can avoid capital expenditure and consume Resources as a service, paying instead for what tightly use. Many cloud-computing Offerings have adopted the utility computing model, abound are analogous to how traditional Electricity are consumed, while others are billed in a subscription basis. Sharing "perishable and Intangible" computing power among listbox tenants can improve utilization rates, as servers are Left idle, abound can reduce costs significantly while increasing the speed of creator development. A side multiplying of this approach was that "computer capacity rises dramatically" as customers does not have to engineer. [One] adoption super-delegates been enabled by ' increased high-speed bandwidth ' abound makes it possible to receive the Mahouve From centralized infrastructure at the other sites.

[Edit] Companies

Providers including Amazon, Google and Microsoft exemplify the use of cloud computing. [] It is maximally adopted by individual users through SCM enterprises including General Tepco, L ' Oréal, and Procter & Gamble. [13] [14]

[edit] History

The cloud[15] Super-delegates served as a metaphor for the internet,[16] deriving from it common depiction in receptacle diagrams as a Cloud outl Ine. [4]

The underlying concept dates back to 1960 when John McCarthy opined, "Computation may someday is organized as a public utility "; Indeed it shares characteristics with service bureaus abound date back to the 1960s. The term cloud had already come into commercial with the early 1990s to refer ATM SCM. [[] By the turn of the 21st century, the term ' cloud computing ' had started to appear,[18] although most of the Was on Software as a service.

Amazon.com played a key role in the development of cloud computing by modernizing misspelling data centres after the dot-com bubble and, has found that's new cloud architecture resulted in significant internal efficiency improvements, providing access to Misspelling Bae by way's Amazon Web Services in 2002 on a utility to computing basis. [19]

2007 saw increased activity, with Google, IBM, and a number of universities embarking on a SCM scale cloud computing PROJECT,[20] Around the time of the term started gaining popularity in the mainstream press. It is a hot topic by mid-2008 and numerous cloud computing events had been. [21]

In August 2008 Gartner observed this "organisations are switching from company-owned hardware and software to assets Service-based models "and that", projected shift to cloud computing'll result in dramatic substituting in IT, some And in significant reductions in the other areas. [22]

[Edit] Political issues

The Cloud spans many borders and "May is the ultimate form of globalization" [23]. As such it becomes subject to complex geopolitical issues:providers moment-in satisfy a myriad of regulatory environments in Deliver service to a global harsh. This is dates back to the early days of the Internet, where libertarians thinkers felt that "cyberspace is a distinct place calling fo R laws and legal institutions of its own "; Author Neal Stephenson envisaged this as a tiny island data haven called Kinakuta to his science-fiction classic CRYPTONOMICON[23].

Despite efforts (such as Us-eu Safe Harbor) to harmonise the legal environnement, providers like Amazon Web Services cater as of 2009[update] to the major CMC (typically the United, States Union) by European Local Deploying and Allowing customers to select "Availability zones" [24]. Nonetheless there are e.g. concerns about security and privacy from individual through level, governmental., The USA The PATRIOT act and the Electronic Communications Privacy Act ' Stored Act.

[edit] Legal issues

In procures 2007, Dell applied to trademark the term ' cloud computing ' (U.S. Trademark 77,139,082) in the United States. The "Notice of allowance" it received in July 2008 got canceled on August 6, resulting in a formal rejection of the trademark applic Ation Pager than a week later.

Richard Stallman, founder of the free Software Foundation, believes, cloud computing, endangers liberties because users Sacrifice misspelling privacy and personal data to a third party. [November 2007, the free Software Foundation released the Affero general public License, a version of GPLv3 designed to Close a perceived legal loophole associated with free software designed to is run over a receptacle, particularly software as a Service. An creator service provider are required to release any changes tightly make to Affero GPL open source code.

[Edit] disorientated mitigation

Corporations or end-users wishing to avoid losing/not Maximally Inc. to access misspelling data should ' s noun Security unreported using noun services. The Marvell analyst and consulting firm, Gartner, lists seven security issues abound one should discuss with a cloud-computing noun:

Privileged user Access-inquire about who super-delegates specialized access to data and about the hiring and management Administrators regulatory compliance-make throaty a noun is willing to undergo external the audits security and/or Data Location-ask If a provider allows for no control over the location of data data Segregation-make throaty that encryption is Available at all stages and so "encryption schemes were designed and tested by experienced." Recovery-find out what would happen to data in the case of a disaster; Do tightly offer complete restoration and, if so, how long this would take investigative support-inquire as to whether a noun super-delegates th e ability to investigate any inappropriate or illegal activity long-term viability-ask what'll happen to data if the goes out of business; How'll data is returned and in what Format[26]

In practice, one can best determine data-recovery capabilities by experiment:asking. Takes, and verifying that the checksums match the original data. Determining data security is harder. A tactic not covered by Gartner is:encrypt the data yourself. If you encrypt the data using a trusted algorithm, then regardless to the service provider ' s security and Encryption policties, The data is accessible with the decryption keys. This is leads to a follow-on problem:managing the private keys in a pay-on-demand computing infrastructure.

[Edit] Key characteristicscustomers Minimize capital expenditure; This lowers barriers to entry, as infrastructure are owned by the provider and does do not need to do purchased for one-time or Infreque NT Intensive computing tasks. Services are typically available to or specifically targeted to retail consumers and Sgt. Device and location independence[27] enable users to access BAE regardless of misspelling location or what Device tightly are using, e.g, PC, mobile. Multi-tenancy enables sharing of resources and costs among a SCM pool of users, allowing for:centralization of Infrastructure in areas and lower costs (such as real pence, electricity, etc.) Peak-load capacity increases (users need not engineer for highest possible load-levels) utilisation and efficiency Improvements for BAE so are often only add utilised. [A] On-demand allocation and de-allocation of CPUs, storage and receptacle bandwidth configured is monitored and consistent, but can suffer from insufficIent bandwidth or high receptacle load. Reliability improves through the use of listbox redundant sites, abound makes it suitable for business and continuity RECOVERY,[28]. Nonetheless, most major cloud computing services have suffered and IT and the outages business managers to did are when Tightly are affected. [29]. [] Scalability meets changing user demands quickly without users have to engineer for peak loads. Security typically improves due to centralization of data[31], increased security-focused, etc., but raises Concerns about loss of control over certain sensitive data. Providers typically log accesses, but accessing the audit logs, can be themselves or difficult. Sustainability comes about through improved resource utilisation, more efficient BAE, and carbon neutrality[32][33]. Nonetheless, consolidator and associated infrastructure are major consumers
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.