Cloud Computing

Cloud computing . It is a computer system based on the use of the Internet through remote data centers to manage information services and applications, that is, programs ( software ), as well as to remotely store data.


[ hide ]

  • 1 Advantages
  • 2 Work regime
  • 3 Disadvantages
    • 1 Malicious Computer Programs
  • 4 Document system and electronic applications
  • 5 From the cloud on the Internet to small local clouds
  • 6 Sources


We can enumerate many advantages of cloud computing solutions, first of all the reduced IT costs, scalability, flexibility of work practices, collaboration efficiency and business continuity. Using cloud technology your business will really be highly flexible as your employees will have the opportunity to have seamless access to the data from anywhere on the planet and anytime they will need it.

Cloud computing allows individuals and businesses to manage files and use applications without having them installed on the hard drives of any computer with Internet access. This technology offers, in theory, a much more efficient use of resources, such as storage, memory , processing and use of bandwidth, by providing only the resources necessary to operate at all times.

Work regime

By using this option, the information is stored in a remote site, which forces you to connect to it whenever you need to use those data stored in “the cloud”. Without connection you simply cannot work with that modality. The speed of operation of the communication system then determines the rate of data transfer to and from the remote server used by this technology. In this part, the availability of bandwidth intervenes once again.


There is no doubt about the danger involved in using this system, since in the first place the stored data is doubly exposed to a whole series of malicious actions, ranging from the theft of information to the introduction of malicious programs to monitor operation. from computers. Important information to know about “cloud” dangers For many users of computer systems, the existence of various malicious software is still a secret.

Malicious computer programs

Among them are known as keyboard impulse loggers, called in English Keyboard Loggers , whose objective is to record stroke by stroke when and how each key is pressed. The information is saved in a secretly opened data file on the machine itself, and then they send all that data to an email address to be used by cybercriminals.

In another variant, the malicious program saves the data in a file that is accessed remotely without the owner of the computer noticing that the information is on its way to cyberspace. With these keyboard impulse recorders associated with storage and communication programs, millions of dollars have been fraudulently obtained through the criminal manipulation of passwords to access bank accounts, achieving these results without using the so-called “cloud storage ” The use of “the cloud” makes information traveling to and from remote file servers even more vulnerable, even when using advanced encryption techniques. Whoever saves the data in the cloud can appropriate it in an instant.servers , which would leave the remote user in a disastrous reality, if he has not made local backups in secure media of all the information, or has implemented an intelligent information dispersion system to enable recovery.

Document system and electronic applications

Google Docs cloud application

A simple example of “cloud” computing is the electronic document and application system known as Google Docs / Google Apps . To use it, it is not necessary to install software or have a server, you just need a fast and reliable Internet connection to be able to use any of its services.

The server and the management software are in “the cloud” (Internet) and, of course, in full control by Google and all the United States government spy agencies to which Google, like other providers , is obliged to deliver copies of everything stored.

All data is directly managed by the service provider, in this case Google . In this way, it is much simpler for the consumer to enjoy the benefits associated with cloud computing, of course, with all the aforementioned risks. Information technology thus becomes a service technology, which is consumed in the same way that we consume electricity or water in our homes. Of course, the most recent revelations about the existence of complex electronic totalization spy programs such as the so-called PRISM , from the National Security Agency; NSA , from the USA, have shaken the managers of a large number of entities such as governments and companies, as well as individual users. The information released by the computer expert Edgard Snowden confirmed, and in great detail, how PRISM snoops in the traffic of computer networks, performing, among other functions, automated analysis of connections and targeting, in particular, the entire movement information to and from “the cloud”.

From the cloud on the Internet to small local clouds

From the cloud on the Internet to small local clouds, a step with some logic But not all has been lost, many administrators of computer networks of medium and large size, apply the use of servers on the network itself, without going out at all to surf the Internet . By giving good support to these servers, providing them with data protection through redundancy, and applying “mirror” techniques, there is no doubt that “the little cloud” can be very beneficial to simplify work and play a similar role. which are nowadays called “thin clients”. For unsuspecting users who continue to use “cloud computing” without implementing a long and complex list of protection measures, the supposedly white and almost transparent cloud can be converted into a cumulus nimbus,


by Abdullah Sam
I’m a teacher, researcher and writer. I write about study subjects to improve the learning of college and university students. I write top Quality study notes Mostly, Tech, Games, Education, And Solutions/Tips and Tricks. I am a person who helps students to acquire knowledge, competence or virtue.

Leave a Comment