Cloud Computing And Thin Clients

Cloud Computing and Thin Clients

When I began looking at thin client applications, I was pretty darned sure that the weight loss industry had come up with yet another way to separate overweight people from their money.

Introducing Thin Technology

Thin clients have been around for as long as there have been computers tied together in networks. The concept is pretty simple; individual users do not need full access to a computer to do their work, so rather than placing a fully functional computer on each desk, a thin client machine provides just the functionality needed to accomplish the necessary tasks.

Thin client systems are useful in some business and institutional settings. They have the advantage of keeping the major computing functions, processing and storage, in a safe, central location. There is also potential savings in software licensing, the software is licensed to the central computer but can be accessed from any of the thin client remote terminals.

From Thin Machines to Clouds

These benefits sound very similar to the claims made by cloud computing services, especially software as a service type applications. Although they are similar in many respects, there are some very important differences between thin client technology and cloud computing.

The most important difference is where the data and programming information are stored. As previously described, the data for the thin client is held on the institution’s central computer. Although it is accessible from any of the remote thin client terminals, it is relatively safe on the central machine where only a few technicians will have physical access.

Cloud Versatility

Cloud data is stored in “the cloud”, of course. The actual physical location of the cloud could be any of several large data centers around the world. The actual machinery is likely to be much simpler and more robust than an institution’s central server, and even more secure thanks to modern encryption.

The biggest attraction of the thin client model is that individual users can do their work on relatively simple, inexpensive equipment. However, all the thin client interface can do is work connected with the central computer. Cloud services can be accessed on any device that has a connection to the Internet, whether it is a laptop, desktop, netbook, tablet, or even a smartphone! When the cloud session is over, the interfacing equipment can be used for other computing tasks. Some cloud applications can even be used without the user being connected to the Internet.

By Peter Knight

Sorry, comments are closed for this post.

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud-Enabled Managed Hosting: 5 Things A Cloud Provider Should Offer

Cloud-Enabled Managed Hosting: 5 Things A Cloud Provider Should Offer

Cloud-Enabled Managed Hosting The IT industry moves at light speed fueled by constant change and advancement. No area of IT has been affected more by this change than the hosting and managed service space. Advancement in the cloud and its delivery models of IaaS and SaaS have caused a monumental shift in the way IT…

Simple And Recommended SaaS Security Tips

Simple And Recommended SaaS Security Tips

SaaS Security Tips Most people and companies are now using a significant amount of SaaS solutions. Companies are running sales support software, they are file sharing, collaborating and using e-mail programs and a lot more in the cloud. However, that usage also leads to concerns about the security of those solutions. How safe are they? What…

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud The growth of cloud based business support systems has been staggering, and while some major software houses have quickly positioned themselves as forerunners in the move to the Cloud, there are several high-flying companies that have so far failed to provide small businesses with the level…

Insider Threats and Sensitive Data in the Cloud

Insider Threats and Sensitive Data in the Cloud

The Age of Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that cloud security had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all industries and regions) believed that the cloud was as secure or more secure than their…

Are You SURE You Are Ready For The Cloud?: Financial

Are You SURE You Are Ready For The Cloud?: Financial

Are You Cloud Ready: Financial In my previous article, I discussed several different points about moving to the cloud. A lot of companies do it for many reasons, but the majority of them in my experience normally come down to two major reasons: 1) Financial 2) Security of business. The security tab isn’t the same…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising