Cloud Computing And Thin Clients

Advertise on CloudTweaks

Cloud Computing and Thin Clients

When I began looking at thin client applications, I was pretty darned sure that the weight loss industry had come up with yet another way to separate overweight people from their money.

Introducing Thin Technology

Thin clients have been around for as long as there have been computers tied together in networks. The concept is pretty simple; individual users do not need full access to a computer to do their work, so rather than placing a fully functional computer on each desk, a thin client machine provides just the functionality needed to accomplish the necessary tasks.

Thin client systems are useful in some business and institutional settings. They have the advantage of keeping the major computing functions, processing and storage, in a safe, central location. There is also potential savings in software licensing, the software is licensed to the central computer but can be accessed from any of the thin client remote terminals.

From Thin Machines to Clouds

These benefits sound very similar to the claims made by cloud computing services, especially software as a service type applications. Although they are similar in many respects, there are some very important differences between thin client technology and cloud computing.

The most important difference is where the data and programming information are stored. As previously described, the data for the thin client is held on the institution’s central computer. Although it is accessible from any of the remote thin client terminals, it is relatively safe on the central machine where only a few technicians will have physical access.

Cloud Versatility

Cloud data is stored in “the cloud”, of course. The actual physical location of the cloud could be any of several large data centers around the world. The actual machinery is likely to be much simpler and more robust than an institution’s central server, and even more secure thanks to modern encryption.

The biggest attraction of the thin client model is that individual users can do their work on relatively simple, inexpensive equipment. However, all the thin client interface can do is work connected with the central computer. Cloud services can be accessed on any device that has a connection to the Internet, whether it is a laptop, desktop, netbook, tablet, or even a smartphone! When the cloud session is over, the interfacing equipment can be used for other computing tasks. Some cloud applications can even be used without the user being connected to the Internet.

By Peter Knight

CONTRIBUTORS

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
The Connected Car: The Unknown Hero of Automotive Innovation

The Connected Car: The Unknown Hero of Automotive Innovation

Connected Car Innovation Spanning the last decade, the automotive industry has seen an explosion of technological innovation which has, and ...
Common Cloud Mistakes - And How To Avoid Them

Common Cloud Mistakes – And How To Avoid Them

Common Cloud Mistakes One of the first lessons in order to avoid common cloud mistakes with anyone entering the tech ...
Cloud and the Convenience Solution

Cloud and the Convenience Solution

Cloud Mobility Buying a new phone is always an exciting endeavour. Whether you had just broken your phone (ouch) or ...
If Not Managed Correctly, The Cloud Can Cost An Organization

If Not Managed Correctly, The Cloud Can Cost An Organization

Cloud Application Management When organizations implement cloud applications, they do so as a means to be more efficient and in ...
Selfie Drone Privacy Issues

Space Invaders – Is That A Selfie Drone I See Before Me?

Selfie Drone Privacy Issues The growing concept of privacy is one that I find very interesting and this is where ...
Will Chatbots Finally Make Mobile Payments Popular?

Will Chatbots Finally Make Mobile Payments Popular?

The Future of Chatbots We’ve profiled several digital wallet platforms that aim to change how we make payments. Apple, Samsung, ...
What Is Two-Factor Authorization?

What Exactly Is Two-Factor Authorization?

What Is Two-Factor Authorization? Two-factor authorization. Most of us think we know what it is, but a recent news event ...

NEWS

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining ...
IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

Big Blue back on the attack, analysts cautious (Reuters) - IBM shares surged 5 percent on Wednesday after the world’s ...
Toyota to test self-driving, talking cars by about 2020

Toyota to test self-driving, talking cars by about 2020

TOKYO (Reuters) - Toyota Motor Corp (7203.T) on Monday said it would begin testing self-driving electric cars around 2020, which ...

CloudTweaks CONTRIBUTOR PROGRAM

The CloudTweaks thought leadership profile building program is free to join but requires a commitment of atleast 3 articles over a 12-month period. Articles must be vendor-neutral in nature, related to connected cloud technologies and written by an executive level business representative to be considered.

You can also contact us to hear more about our on-demand content and lead generation programs for 2018