Browse Definitions :

SearchCloudComputing

SearchCloudComputing.com provides IT professionals with real-world examples of how cloud computing is being used today. Learn who the key players are and how they rate against each other, how the technology works, and how you consume and pay for it. Plus, access case studies of successful deployments in the cloud with explanations of new business opportunities and how to tap into them.

View the complete archive of Cloud Computing news, research and expert advice.

Go to:  SearchCloudComputing

Recently on  SearchCloudComputing

Review the pros and cons of 8 common hybrid cloud use cases

Evaluate the following hybrid cloud use cases, as well as the common advantages and disadvantages that come with pairing on-premises architectures and different cloud models.

More Highlights
Definitions

Browse Cloud Computing Topics

App development

This section provides tips and best practices around the latest cloud application development tools and trends. Compare different development environments, such PaaS and low-code/no-code platforms, and learn whether, and how, to embrace development strategies such as DevOps and CI/CD. Also, read coverage of emerging technologies, such as AI, machine learning and serverless computing.

Recent Definitions

  • Microsoft Azure

    Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.

  • cloud computing

    Cloud computing is a general term for anything that involves delivering hosted services over the internet.

  • multi-cloud strategy

    A multi-cloud strategy is the procurement of cloud computing services from two or more public cloud providers. A multi-cloud strategy gives business and IT pros the ability to mix and match cloud services from different vendors.

Highlights

More App development Topics

Back to Top

Security strategies

Cloud computing security continues to be one of the biggest concerns and challenges for enterprises. Learn various best practices related to encryption, authorization and identity management to protect cloud infrastructure, data, applications and more. Evaluate various cloud provider-native and third-party security tools to protect critical workloads.

Recent Definitions

  • cloud computing

    Cloud computing is a general term for anything that involves delivering hosted services over the internet.

  • confidential computing

    Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.

  • cloud browser

    A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.

Highlights

More Security strategies Topics

Back to Top

App management

Explore tips and best practices for successfully managing cloud applications – from migration projects to monitoring performance after the move. In addition, get advice on how to best support third-party SaaS applications for end users, and when to use managed container services in the public cloud.

Recent Definitions

  • cloud ERP

    Cloud ERP is a type of enterprise resource planning (ERP) software that runs on a provider's cloud computing platform, rather than on premises in an enterprise's own data center.

  • What is cloud migration? An introduction to moving to the cloud

    Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

Highlights

More App management Topics

Back to Top

Infrastructure management

To optimize cloud workloads, IT teams need to plan for every step of the way. Explore the latest news, tips and analysis to manage cloud infrastructure resources, including those for compute, storage and networking -- from the initial design and build phase to monitoring in production.

Recent Definitions

  • What is cloud migration? An introduction to moving to the cloud

    Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • cloud computing

    Cloud computing is a general term for anything that involves delivering hosted services over the internet.

Highlights

More Infrastructure management Topics

Back to Top

Deployment models

Public, private, hybrid and multi-cloud computing models each bring their own set of advantages and challenges. The tips and advice in this section help enterprises assess public cloud and other cloud deployment models to determine the best fit for their current and future infrastructure needs.

Recent Definitions

Highlights

More Deployment models Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close