Professional Documents
Culture Documents
Graphic designers to create visuals for the site such as logos, layouts and buttons
Internet marketing specialists to help maintain web presence through strategic solutions on targeting
viewers to the site, by using marketing and promotional techniques on the internet. SEO writers to
research and recommend the correct words to be incorporated into a particular website and make the
website more accessible and found on numerous search engines. Internet copywriter to create the
written content of the page to appeal to the targeted viewers of the site. User experience (UX)
designer incorporates aspects of user-focused design considerations which include information
architecture, user-centered design, user testing, interaction design, and occasionally visual design.
1. DISCIPLINE
WEB DEVELOPER WEB DESIGNER
More technical in nature Usually creative in nature
Web designers are usually creative types with a knack for realizing the bigger picture and
understanding the clients’ vision. They get a better hold of this vision and transform this into an
aesthetically carved design to please millions of potential viewers. Most web designers study typography
and the graphical aspects of a website. Web developers, on the other hand, are more technical in nature
who transforms those designs into live websites. They use web tools and languages to develop the
design and functionality of a website. Developers usually write codes in multiple languages.
2. JOB
WEB DEVELOPER WEB DESIGNER
Building user-friendly websites Refers to aesthetic elements of
based on clients specifications website
Web designers’ job is to understand the client’s requirements and develop an information
hierarchy to help guide the design process, mostly related to graphics design and aesthetic portion of
the website. They use many different basic design principles to build a visually appealing layout for a
better user experience – from a balanced website design and color correction to clean navigation and
usability. Web development is more about probability and utility which determine the success or failure
of a website. Visual hierarchy is one of the fundamental principles of web design in web building project.
3. RESPONSIBILITY
WEB DEVELOPER WEB DESIGNER
They transform those They transform ideas into
designs(web designs) into fully visually appealing designs
functional websites
Web designers are responsible for the design and layout of the website, usually the graphical
aspects of a website. The main job of a web designer is to maintain a perfect balance between the
aesthetic elements of a website and its usability. In simple terms, a web designer works to transform a
simple idea into a visually appealing design. If a designer’s role is related to how the website looks on
the outside, then a developer’s role is to work on the functionality of a website to see how it works.
Web developers are usually responsible for designing, coding and modifying the different aspects of a
website according to the client’s specifications.
4. PRINCIPLES
WEB DEVELOPER WEB DESIGNER
Refers to the functionality of Refers to how the website looks
the website, on how it works on the outside
Web design is the first step which encompasses several different aspects of the web building
process including web layout, web graphics design, website structure, navigation ergonomics, website
structure, color, texts, fonts, imagery, and more. Web development is rather a broad term refers to the
steps involved in developing websites for the internet or an intranet. It is a well documented step-by-
step instruction that need to be followed from start to finish to in order accomplishing a web building
project.
5. TOOLS
WEB DEVELOPER WEB DESIGNER
Languages used are PHP, HTML, Tools include Adobe Photoshop,
Javascript, CSS, ColdFusion, Illustrator, DreamWeaver,
Python, Ruby, jQuery etc. Sketch etc.
Web designers help build the final layout of the website according to the client’s specifications
using software tools with almost no coding. The role of a designer is to use graphic design software
tools such as Adobe Photoshop, Illustrator, Sketch, or DreamWeaver to build the layout of a website to
enhance the user experience. A web developer’s role mainly involves coding in multiple languages
including (X)HTML, PHP, JavaScript, CSS, ASP.NET, ColdFusion, Python, Ruby, jQuery, etc. The objective
of a web developer is to create visually appealing websites with a user-friendly design that will feature a
clear navigation for a smooth user experience.
CLOUD COMPUTING
Cloud computing is the on-demand availability of computer system resources, especially data
storage and computing power, without direct active management by the user. The term is generally used
to describe data centers available to many users over the Internet. Large clouds, predominant today,
often have functions distributed over multiple locations from central servers. If the connection to the
user is relatively close, it may be designated an edge server.
Clouds may be limited to a single organization (enterprise clouds)), or be available to many organizations
(public cloud).
Cloud computing relies on sharing of resources to achieve coherence and economies of scale.
Advocates of public and hybrid clouds note that cloud computing allows companies to avoid or minimize
up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get
their applications up and running faster, with improved manageability and less maintenance, and that it
enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand. Cloud
providers typically use a "pay-as-you-go" model, which can lead to unexpected operating expenses if
administrators are not familiarized with cloud-pricing models.
The availability of high-capacity networks, low-cost computers and storage devices as well as the
widespread adoption of hardware virtualization, and autonomic and utility computing has led to growth
in cloud computing. By 2019, Linux was the most widely used operating system, including in Microsoft's
offerings and is thus described as dominant.[9] The Cloud Service Provider (CSP) will screen, keep up and
gather data about the firewalls, Intrusion identification or/and counteractive action frameworks and
information stream inside the network
Agility for organizations may be improved, as cloud computing may increase users' flexibility with re-
provisioning, adding, or expanding technological infrastructure resources.
Cost reductions are claimed by cloud providers. A public-cloud delivery model converts capital
expenditures (e.g., buying servers) to operational expenditure. This purportedly lowers barriers to entry,
as infrastructure is typically provided by a third party and need not be purchased for one-time or
infrequent intensive computing tasks. Pricing on a utility computing basis is "fine-grained", with usage-
based billing options. As well, less in-house IT skills are required for implementation of projects that use
cloud computing The e-FISCAL project's state-of-the-art repository contains several articles looking into
cost aspects in more detail, most of them concluding that costs savings depend on the type of activities
supported and the type of infrastructure available in-house.
Device and location independence enable users to access systems using a web browser regardless of their
location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided
by a third-party) and accessed via the Internet, users can connect to it from anywhere.
Maintenance of cloud computing applications is easier, because they do not need to be installed on each
user's computer and can be accessed from different places (e.g., different work locations, while travelling,
etc.).
Performance is monitored by IT experts from the service provider, and consistent and loosely coupled
architectures are constructed using web services as the system interface.
Productivity may be increased when multiple users can work on the same data simultaneously, rather
than waiting for it to be saved and emailed. Time may be saved as information does not need to be re-
entered when fields are matched, nor do users need to install application software upgrades to their
computer
Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing
suitable for business continuity and disaster recovery.
Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-
service basis in near real-time (Note, the VM startup time varies by VM type, location, OS and cloud
providers without users having to engineer for peak loads. This gives the ability to scale up when the
usage need increases or down if resources are not being used. Emerging approaches for managing
elasticity include the utilization of machine learning techniques to propose efficient elasticity models.
Security can improve due to centralization of data, increased security-focused resources, etc., but
concerns can persist about loss of control over certain sensitive data, and the lack of security for
stored kernels. Security is often as good as or better than other traditional systems, in part because
service providers are able to devote resources to solving security issues that many customers cannot
afford to tackle or which they lack the technical skills to address. However, the complexity of security is
greatly increased when data is distributed over a wider area or over a greater number of devices, as well
as in multi-tenant systems shared by unrelated users. In addition, user access to security audit logs may
be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain
control over the infrastructure and avoid losing control of information security.
Cloud computing poses privacy concerns because the service provider can access the data that is in
the cloud at any time. It could accidentally or deliberately alter or delete information. Many cloud
providers can share information with third parties if necessary for purposes of law and order without a
warrant. That is permitted in their privacy policies, which users must agree to before they start using
cloud services. Solutions to privacy include policy and legislation as well as end users' choices for how
data is stored. Users can encrypt data that is processed or stored within the cloud to prevent
unauthorized access. Identity management systems can also provide practical solutions to privacy
concerns in cloud computing. These systems distinguish between authorized and unauthorized users and
determine the amount of data that is accessible to each entity. The systems work by creating and
describing identities, recording activities, and getting rid of unused identities.
1. Load-balancing clusters: As the name implies, This system is used to distribute workload across multiple
computers. That system
distributes the processing load as possible across a cluster of computers.
2. High availability (HA) clusters: A high availability clusters (HA cluster) are the bunch of computers that
can reliably utilize for
redundant operations in the event of nodes failure in Cluster computing.
3. High performance (HP) clusters: This computer networking methodology use supercomputers and
Cluster computing to solve advanced computation problems.
1. Cost efficiency: In a Cluster computing Cost efficiency is the ratio of cost to output, that is the
connecting group of the computer as computer cluster much cheaper as compared
to mainframe computers.
2. Processing speed: The Processing speed of computer cluster is the same as a mainframe computer.
3. Expandability: The best benefit of Cluster Computing is that it can be expanded easily by adding the
additional desktop workstation to the system.
4. High availability of resources: If any node fails in a computer cluster, another node within the cluster
continue to provide uninterrupted processing. When a mainframe system fails, the entire system fails.