Documente Academic
Documente Profesional
Documente Cultură
2 - Cloud computing
Using and sharing resources and services over the Internet
Uses
o Storing files online and using programs that run servers on the internet
o Most of the time paying a subscription fee
o Accessing computing resources or software
Charges
o Most services have limited online storage which is free
o Any extra storage can be used after subscribing to the service
Online storage – backup
Meant for having data that is copied and used when previous data being worked on is
corrupted
E.g. Carbonite, Acronis, CrashPlan…
Not meant to be accessed frequently, like when syncing files
More secure than syncing services
o Data can be encrypted/decrypted
How it works
o Selected folders are backed up to your drive
o Any files with changes made are saved as duplicate copies online
Requires more storage than syncing, less data traffic used
More file versions available
Charges
o Most backup services charge per user/computer used than per size of backup
Media repositories
Charges
o There is usually an annual fee with extra charges for special features
Cloud applications
123D Catch
o Allows you to take photos of a real-world object and convert it into a 3D digital
object for use in 3D software
Microsoft Photosynth
o Allows multiple photos taken at different angles, at the same location, to be stitched
and made into a pan-able, zoom-able, mega- panorama/3D view of the scene
These services use powerful online servers that do high processing power
o Integrated products
Combination of cloud-based software and locally installed software
e.g. Office 365
Can be installed on many devices
Cloud versions can be used on any computer with a browser
Documents can be accessed locally or in the cloud
o SaaS in gaming
MMORPGs (Massive Multiplayer Online Role-Playing Games)
Run locally but you play online
You may need to pay a monthly subscription fee
Data is in risk of being lost when the company goes out of business, you may get a warning
Make use of good security to protect data from hackers
Make use of good backup policies
Not have more customers than their resources can handle