Cloud Computing Simplified

Cloud Computing Simplified

Understanding the idea behind cloud computing is simple. Long before the term cloud computing was even invented, we had all been using some form of it. If you’re an online gamer playing games like WoW or Eve, the basic idea of cloud computing is used there. Their servers hold information (not that which is stored on your own computer), which makes the games you have installed work correctly. This is where the big difference is. You do not install any programs on your computer; they are rather hosted on a computer either at your company or a third-party provider.

Some of the old file-sharing programs that existed years ago were forms of cloud computing as well. Data, movies, pictures and music were hosted by other computers. You logged in and were able to watch, listen or view the data from the comfort of your own home, while someone else hosted it. But now cloud computing has taken off and gone to the next level—a system of computers linked up together hosting, serving and storing data so users can use that data without even needing to install or upgrade their own machines. This is a concept that many of us who have been using the Net for a while already understand and have been using to some degree, but now the cat is out of the bag, so to speak, and it has become the new “in” thing.

To better understand what you are reading, try out Google docs. This program, even if basic, is a prime example of cloud computing. They host the data (which at this time is spreadsheets and word documents) and the programs, and you are able to open, use, save and download the data as needed. Now, if you have an old computer system, some programs simply would not run on your computer. But with cloud computing, the age of your computer system is never an issue. Your computer becomes a keyboard and monitor only, as all the heavy lifting is done by the server computer.

Now think about that for a moment—think about 20 or 50 computers all linked together. That massive amount of computing power is all at your fingertips. Do you want to have every song ever recorded at your fingertips? Or every book… or every anything? You can! Facebook games are a similar idea to cloud computing; they do the heavy lifting, while you just sit there and enjoy playing the game. Pretty simple, right? Well, expand that idea even further. Think what your company IT department could do with that information—that ability. Think of the wasted man-hours spent updating each and every computer; think of the money spent to make sure each and every computer had the proper software. Now take that cost away; take away the man-hours. What could your IT department be doing right now? Developing new programs and ideas, and doing what you wanted them to do in the first place, before they were distracted by every issue under the sun.

By Emma Joseph

Visit CloudTweaks each week as Emma helps take the complexity out of the cloud…

Sorry, comments are closed for this post.

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…