Featured Post
IaaS...or ...Cloud Computing
- Get link
- X
- Other Apps
By
Rishoo Mittal
-
The IaaS an acronym, stands for 'Infrastructure as a service' which we hear very frequently in the tech streets these days. The leading tech companies having good wealth in form of money and infrastructure are trying to provide their customers with the best services possible to increase their revenues. The IaaS in other technical words could be stated as cloud computing. The IT companies are moving these days with a mindset that the data which a user holds could be stored on a network(Cloud) instead of storing it on his personal computer. By storing the data on the cloud the user can excess it remotely from wherever he has a internet access for himself. Therefore, making his storage and accessibility of data easy. The above description gives you a bit of glimpse about the topic to understand it in much detail we need to understand the meaning of the two main words i.e. Cloud + Computing..
Cloud Computing:
The cloud here in this context means that the data of the user is stored by the user in the secondary devices(hard disks or solid state drives) which are connected to a server. The server is present in a location where user might not be present but, the user can remotely access his data via internet. Hence, making the data access easy for user wherever he is present in the whole world. The data is abstracted from the devices by sending request to the server and the data is fetched to the user.
IaaS:
Therefore, to make the cloud computing a success the companies need a good infrastructure so that they can give user the best services and his data remains secured. The companies are providing these infrastructure to the user by charging them some amount of money hence, earning a good revenue.The IaaS involves a tedious implementation process as a company needs a lot of wealth to store such an enormous amount of user data.
In this changing world of technology the people have started moving on to accept the cloud computing as they need an access to their data in every art the globe. Hence, ripping off the inculcates in mind about whether their data will remain secure.
The leading companies which have moved to provide users with IaaS are.
To gain indepth knowledge in cloud computing we need to study and go through cloud engineering.
Related Posts
Facebook in SIM Card
By
Rishoo Mittal
-
How about Facebook comes embedded inside a SIM card you buy from your nearby store. Yeah its true...a Dutch digital security company Gemalto has made it possible and has announced Facebook for SIM card at the annual world congress in Barcelona. The company has achieved this by shrinking the facebook into such a small size that it can be stored in SIM. Therefore, enabling people to enjoy the Facebook on their GSM networks without a data plan.In doing so, Gemalto is offering Facebook to millions of mobile phone users regardless of their handset type. The app uses Class 2 SMS to ensure compatibility with the most basic handsets and networks. Class 2 SMS messages are delivered direct to the SIM without the user being involved, and then the application running on the SIM can tell the handset to alert the user. Gemalto did not reveal any release details, but emerging markets where data plans are ridiculously expensive, or simply not available, is likely the target audience.
Microsoft To Issue Emergency Fix For Windows .LNK Flaw
By
Rishoo Mittal
-
Microsoft will issue an out-of-band patch on Monday for a critical vulnerability in all of the current versions of Windows. The company didn't identify which flaw it will be patching, but the description of the vulnerability is a close match to the LNK flaw that attackers have been exploiting for several weeks now, most notably with the Stuxnet malware. The advance notification from Microsoft on Friday said that the company is patching a critical vulnerability that is being actively exploited in the wild and affects all supported Windows platforms. The LNK flaw in the Windows shell was first identified earlier this month when researchers discovered the Stuxnet worm spreading from infected USB drives to PCs. Stuxnet has turned out to be a rather interesting piece of malware as it not only uses the LNK zero day vulnerability to spread, but it had components that were signed using a legitimate digital certificate belonging to Realtek, a Taiwanese hardware manufacturer.
Downloading icloud photos using icloudpd on linux, windows or mac
By
Rishoo Mittal
-
iCloud Photo Backup Guide Downloading icloud photos using icloudpd on linux, windows or mac icloudpd is a third-party command-line tool to download all your iCloud Photos automatically. Install icloudpd Install Python3 and pip: sudo apt update sudo apt install python3 python3-pip Install icloudpd: pip3 install icloudpd Download iCloud Photos Create a directory for your photos (e.g., /mnt/backup_photos ): mkdir -p /mnt/backup_photos Run icloudpd to download your photos: icloudpd --directory /mnt/backup_photos --username your_apple_id Authenticate: You’ll be prompted to enter your Apple ID password. If Two-Factor Authentication (2FA) is enabled, you’ll need to enter a verification code sent to your Apple devices. Let icloudpd sync all your phot...
How to Convert Microsoft WMA and Rhapsody WMA to iPod
By
Rishoo Mittal
-
People all around the world have a preference on iPod, and today I found the reasons: In the official company FAQ, Apple says that: iPod is designed to provide the best-quality sound. iPod has a powerful 60 mW amplifier so it can deliver audio as loud as you want. It also has a 20 Hz to 20 kHz frequency response, which means you can hear distortion-free music at the lowest or highest pitches. Besides, it can skip the protection. iPod has a memory cache. It is made up of solid-state memory, that means it has no mechanical or moving parts, hence it is not affected by movement of the device. iPod skip protection works by preloading up to 25 minutes of music to the cache at a time. iPod plays music from the memory cache instead of the hard drive, so even rigorous activities won't cause music to skip. You can also remove the "gaps" between songs on the iPod. What formats does iPod support ? '''AAC''' (M4A, M4B, and M4P up to 320 Kbps) ...
EAV versus Row modeling
By
Rishoo Mittal
-
Following are main features/downsides EAV has over classic row modeling technique. A row-modeled table is homogeneous. I t will always carry same type of data in contrast to EAV modeled table where this cannot be an issue. The data type of the value column/s in a row-modeled table is pre-determined by the nature of the facts it records. In contrast, in an EAV table, the conceptual data type of a value in a particular row depends on the attribute in that row. A Row modeling technique data increase only in one direction i.e. from Upside-down whereas in EAV data model data increase in both directions i.e. from upside down as well as from left-right. Other Related Links: EAV(Entity-Attribute Value) Model EAV versus Row modeling Downsides of EAV data model over class row model Opting classic row modeling or EAV data modeling?
Comments
Post a Comment
Let's discuss and learn more