Skip to main content

Cloud computing on AWS

 CLOUD COMPUTING ON

AMAZON WEB SERVICES(BASICS)

AWS(Amazon Web Service) is a cloud service platform that enables users to access on demand services like database storage, virtual cloud server, networking et., AWS is a platform that offers flexible, reliable, scalable, easy-to-use and cost-effective cloud computing solutions.

AWS is a combination of three services:

  • Infrastructure as a service(IaaS)
  • platform as a service (PaaS)
  • software as a service(SaaS)
History of AWS:

AWS service has been created and discovered its cloud platform in the year 2006. In 2012 holds first customer event, in 2015 it reveals revenues achieved of nearly $4.8 billion and In 2019 offers nearly 100 cloud services.

Some of the important AWS services:
  • Compute
  • storage 
  • Database
  • Networking
  • Messaging 
  • Management tools
Some of the Companies using AWS services:
  • Instagram
  • Netflix
  • Pinterest
  • Dropbox
  • Talk box
Application of AWS services:
  • Social Networking
  • Search Engines
  • Storage, backup
  • Application hosting
  • Website host
  • Chatbot integrating with applications
Advantages of AWS services:
  • Cost-effective service that allows you to pay only for what you use, without any up-front or long-term commitments.
  • Offers hybrid capabilities.
  • It allows users and organizations to familiar with OS, databases, models etc.,
  • You are allowed cloud access quickly with limitless capacity.
  • Offers centralized billing and management.
Disadvantages of AWS service:
  • For accessing immediate assistance, you'll have to pay for that.
  • Some issues related to computing such as limited control, downtime and backup protection
Tips to learn any new technology:

"Practice makes the man perfect" As the quote says, whatever technology you study or learn you need to do practice and must implement in practical manner or hands on exercise. Obviously it works for you to evolve in the technology.

                                                                                                                                       -RD✌

Comments

Post a Comment

Popular posts from this blog

ETHICAL HACKING

  ETHICAL HACKING E thical H acking is a structured hacking performed to expose vulnerabilities in a system, using a tools and techniques with organizations knowledge.  The act of hacking is defined as the process of finding a set of vulnerabilities in a target system and systematically exploiting them. Ethical hacking as a discipline discerns itself from hacking by adding a vital element to the process. The process becomes a legal activity and since the hacker takes permission prior to hacking into system, it is legally made sure that he has no malicious intent. This is normally performed by making the ethical hacker sign contracts that legally bind him to work towards the improvement of the security of the company. ETHICAL HACKER: An Ethical hacker is a computer security specialist, who hacks into a system with the consent or permission of the owner to disclose vulnerabilities in the security of the system in order to improve it.  Types of Hackers: White hat hackers Bla...

Linux OS introduction

 LINUX OPERATING SYSTEM Linux Introduction:   L INUX is an operating system or a kernel distributed under an open-source license. It is one of popular version of UNIX operating system. Linux was designed considering UNIX compatibility Its functionality list is quite similar to that of UNIX. Components of Linux System: Linux OS has primarily three components; 1. Kernel: It is the core part of Linux. It is responsible for all major activities of this operating system. It consists of various modules and it interacts directly with the underlying hardware. 2. System Library: These libraries implement most of the functionality of the operating system and do not requires kernel module's code access rights. 3. System utility: These programmes are responsible to do specialized, individual level tasks. Basis Features: Some of the features of Linux OS are: Portable Open source Multi-user Multiprogramming Hierarchical file system Security... etc., courtesy: Pinterest Benefits of Using L...

5G TECHNOLOGY

  5G TECHNOLOGY Source : Google 5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects and devices. 5G wireless technology is meant to deliver higher multi Gbps peak data speeds, ultra low latency, more reliability, massive network capacity, increased availability, and a more uniform users.  Higher performance and improved efficiency empower new user experiences and connects new industries. 5G is based on OFDM, a method of modulating a digital signal across several different channels to reduce interference.                                                                     Source : Google 5G usage: Enhanced mobile bro...