Posts

Showing posts with the label Cloud Computing

What Makes a Security Plan?

      Hello, and welcome back to my blog. This week, I would like to quickly discuss the levels that go into making a security plan. These types of plans are an important tool for IT departments and Cybersecurity Administrators to design a plan that will help protect or slow down an attack on the network.     Of course, security plans can vary from company to company; however, their purpose remains the same, with threats looming every day. With IT managers adjusting in response to the ever-changing threats, the created security plan must be designed to stop or slow down any attempt to breach network defenses. Below we will look at the principal components of a security plan and what they entail.    Separate Networks              As the name suggests, having more than one network can protect company assists from hackers and the like. The reason being is that having every computer on one network would lead to issues if that subsequent work were to fail, which would stop operati

Public vs. Private Clouds: A quick look at the Pros and Cons

Hello, and welcome back to my blog! This week we will be discussing the positive and negative sides of using public and private clouds.         For many small businesses, turning to the cloud would seem like a daunting and challenging task. Just thinking about the many different types of Cloud services and various companies that offer them would take time to sort out what you want and how to make the change.       I will cover the pros and cons of using public and private clouds in the hopes that you will come away with a little bit more knowledge on the matter than when you arrived. Of course, if you would like to know more about the different types of cloud services outside of these two, I am about to discuss, here is a link to one of my earlier postings here,  Link      So, let us go and dive into what these two types of cloud services are. If you have heard of companies like Google, Microsoft, and Amazon, you may also know that they offer paid or free cloud services. Other vendors

What is Cloud gaming?

  Hello, and welcome back to my blog! This week, we will be talking about gaming through the cloud and Internet speeds. If you have been following your favorite tech blogger on YouTube or have been in the loop of the world of gaming, you may have heard of the topic regarding gaming through the use of the cloud. If not, do not worry. You are not alone in this topic, as many may not have heard of this yet. But how does this work? I am glad you asked because the way this would work is this, instead of playing a game on your favorite console or PC, you would play your game over the internet. That game would is located on a server in a data center located in a far-off place. What you are doing is sending commands through the internet with your console controller or keyboard and mouse as you would if you had the game playing on your PC or console. You could call this remote gaming as you are accessing the game from somewhere else. This is not like playing a multiplayer game on your PC

Outsourcing vs. Cloud Computing, a quick look

 This week we will discuss an exciting topic of outsourcing and cloud computing.   To understand what the two are, let’s look at both and how they benefit or hinder a company.    Outsourcing , as we come to know it, is the method where a company hires a third-party provider who then performs a specific task or function on behalf and for the benefit of a business. This method can perform functions that cloud computing cannot do or does not execute.    Cloud computing  is the practice of using a network of remote servers that are hosted over the internet to manage, store, and process data, rather than doing so on a local server or a personal computer.                                             *Cloud computing is not the same as outsourcing*  The difference between the two is that cloud computing can do computing between different machines at different locations and combine the data from one application to another.  While outsourcing is where a business hires someone to do

The Different Types of Cloud Models

       This week we will discuss the different types of cloud models. These are Public, Private, Community, and Hybrid cloud models, which will thoroughly go into some detail with examples of what they are and how they are used.        For many, some of us used cloud storage, either for work or personal use. A majority of users that store their photos, music, or documents may be using a private cloud, such as Apple's iCloud Drive, Microsoft's One Drive, or Google's Drive, to name a few.        However, large companies may use services, such as Amazon Web Services or Services from Google that are suited for business logistics. These services will have different features than your regular cloud services.        Whether it be for personal use or business, cloud services can vary on what features are available. Let us look at the different types of cloud models and how they are used.        In total, there are four types of cloud models: Public, Private, Community, and

Using Cloud Computing: What to consider

        Many users who access applications through the Cloud seem to do so without understanding the complications that can arise if something were to go wrong. However, the benefits of using apps from the Cloud, such as iCloud, for example, which allows apple users access applications like Keynote and Pages, can create documents easily from any desktop with a web browser. The benefits of these types of services can be easy to use, be cost-efficient, and where backup and recovery can be quickly made. These hosting services can also offer another benefit, which is 24/7 support as well.      Unfortunately, there are some downsides to these types of services. As many businesses may use services already, the biggest issue is trusting these services with your business's sensitive data. There have been cases where Software as a Service or SaaS providers have been targeted by hackers more frequently and have been easily compromised. This can be troublesome as this service is the most ta