Uncategorized

Cloud Computing for Dummies

By Carlos Dos Santos, Head of Cloud and Cyber Security Liquid Intelligent Technologies SA

Without you knowing it, everybody has been using the proverbial ‘cloud.’ That Whatsapp you just sent; the recently updated Facebook status and the latest holiday picture shared on Instagram does not disappear into the ether – it lives and exists on the cloud.

But for those that use it, many are yet to understand what cloud, let alone cloud computing is. The cloud is the most disruptive computing revolution of our times, fostering dramatic changes in the technology we live with every day and how we use technology to transform business practices. As a result, cloud computing has become the engine of adaptive evolution.

But what is cloud computing? Simply put, cloud computing is a method of providing a set of shared computing resources that includes applications, computing, storage, networking, development, deployment platforms, and business processes. It turns traditional siloed computing assets into shared pools of resources based on an underlying internet foundation.

It comes in two basic forms – public and private. Public cloud is an IT model where on-demand computing services and infrastructure are managed by a third-party provider and shared with multiple organisations using the public internet. Public cloud makes computing resources available to anyone for purchase. Multiple users typically share the use of a public cloud. Web-based email and free services like the ones Google provides are the most familiar examples of public clouds.

Private cloud, on the other hand, is a cloud computing environment dedicated to a single customer. It combines many of the benefits of cloud computing with the security and control of on-premises IT infrastructure.

Most organisations use a combination of private computing resources (data centres and private clouds) and public services as a hybrid environment. The way you construct your hybrid computing environment is determined by the complexity of the workloads (an independent service of collection of code that can be executed) and how you want to optimise the performance of those workloads to support your constituents.

Cloud computing can be divided into three different categories:

SaaS (Software-as-a-Service) is the cloud’s largest and most developed service that provides software or a set of applications available in the cloud. This enables users to forego the traditional route of downloading and then storing bulky software on their hard drives. Instead, they download it to the cloud, which is stored and accessed via the internet, which helps preserve computer memory.

IaaS (Infrastructure-as-a-Service) provides the most basic, or raw, computing services, which means it requires a high level of IT expertise. This service provides a cloud server, or servers, and data storage space, for access to computing power but without the hassle of installation and maintenance.

PaaS (Platform-as-a-Service) helps eliminate the need to oversee much underlying hardware and operating tasks associated with running your application, such as software maintenance, capacity planning, and procuring equipment and supplies by enabling businesses to outsource many tasks associated with running their application. This way, users are free to focus on just the deployment of their application.

The kind of cloud deployment you should consider depends on your individual performance, security requirements, and specific business goals.

At Liquid Intelligent Technologies, we have seen that one of the main reasons for cloud service adoption by many organisations is the potential for cost savings. Cloud computing gives the freedom to use services as per the requirement and pay only for what you use. This technology has made it possible to run IT operations as an outsourced unit without investing extensively in an in-house resource.

Yet, one of the biggest questions that we still get asked about is how safe is the cloud and how well protected my data is? The answer – cloud security provides protection similar to IT security systems. This includes the protection of sensitive information, data leakage, and theft. However, because your information is stored online, there’s always the chance that it can be stolen, leaked, wiped, or lost.

Therefore, it is up to you as a user to control how your data is protected, which begins by selecting a quality cloud provider. At Liquid, we understand that security is a significant concern for customers utilising the cloud; therefore, we continuously improve our security offerings.

Aside from lower costs, fewer maintenance hassles, and quick and efficient management, cloud computing offers another significant advantage of mobility. Be it individual users or big companies, everyone using the cloud can access documents or mail that is not stored on one’s PC, as it is stored digitally. Location in such a situation ceases to matter and as long as one has internet services.

This technology is certainly going to continue growing and developing in the coming years. It has moved beyond being an option and has transformed into a way of doing business. By revolutionising every aspect of business performance, the cloud has accelerated innovation at a remarkable rate. What we see is that it is not easy and affordable to use the tools to drive digitalisation. If you are looking for innovative ideas and ways to grow and achieve your business goals, then the cloud is worth venturing into for future planning and opportunities.

Facebook
Twitter
LinkedIn
Email
Filter by
Blog filter
Trending now
Cyber Security in Zimbabwe
Strengthening digital defences: Top cyber security tips for Zimbabwe’s SMEs
Cyber security Rwanda
Cyber security lies at the core of Rwanda’s growth
Zambia’s economic growth
How smart cities can drive Zambia’s economic growth
Digital Transformation in Africa
Four aspects to consider when taking your SME online
Sign up to our newsletter
Contact us

We use cookies to help give you the best possible user experience. By using our site, you agree to the use of cookies by Liquid Intelligent Technologies and its selected partners. To find out more about our use of cookies and/or how you can disable them, please read our cookies statement.