You are on page 1of 7

ELABORACION DE RESUMENES PARA

COMPRENDER TEXTOS BASICOS


EN INGLES

AUTOR:
JUAN CARLOS TRIANA JARAMILLO

SERVICIO NACIONAL DE APRENDIZAJE SENA

TECNOLOGO EN ANALISIS Y DESARROLLO DE SISTEMAS DE


INFORMACION
2020
Taller
Elaboración de resúmenes para la comprensión de textos en inglés

Reading for main ideas


Read the text Cloud Computing, available at SENA Library’s databases by
following the link below. To access the library, just login with your ID
number.

Dziak, M. (2016). Cloud Computing. Cloud Computing


(ELL), 1.

http://search.ebscohost.com.bdigital.sena.edu.co/login.as
px?direct=true&db=elr&AN=114488477&site=ell-live

Cloud computing are servers from the Internet responsible for attending to
requests at any time. You can access your information or service, through an
internet connection from any mobile device or landline located anywhere. They
serve their users from several hosting providers frequently distributed around
the world. This measure reduces costs, ensures a better uptime and that
websites are invulnerable to computer criminals, local governments and their
police raids.
The change offered by computing from the cloud is that it allows increasing the
number of services based on the network. This generates benefits both for
suppliers, who can offer, more quickly and efficiently, a greater number of
services, as well as for users who have the possibility of accessing them,
enjoying the 'transparency' and immediacy of the system and a model of
payment for consumption. Likewise, the consumer saves the salary costs or the
costs in economic investment (premises, specialized material, etc.).
Cloud Computing manages to provide these advantages, relying on a dynamic
technological infrastructure that is characterized, among other factors, by a high
degree of automation, a rapid mobilization of resources, a high capacity to
adapt to meet a variable demand, as well as advanced virtualization and a
flexible price depending on the consumption made, avoiding also the fraudulent
use of software and piracy.
Based on the previous reading, write the required information on the chart
below.

Topic: Cloud Computing

Writing a summary
Now, use the information related to the main idea you already identified
and the supporting details you extracted from the passage, to write a
summary of the text Cloud Computing. Use the following template to
guide your writing process. Remember that supporting details can be
used to make key points in your summary.
RTA: In other words, the definition of cloud computing is to offer services
through the connectivity and large scale of the Internet. Cloud computing
democratizes access to software resources at an international level, as it is a
software application that serves various clients. Multilocation is what
differentiates cloud computing from simple outsourcing and from older
application service provider models. Now, small businesses have the ability to
master the power of advanced technology in a scalable way.
Cloud computing offers individuals and businesses of all sizes the capacity of a
pool of computing resources with good maintenance, secure, easily accessible
and on demand, such as servers, data storage and application solution. This
gives companies more flexibility in relation to their data and information, which
can be accessed at any place and time, being essential for companies with
headquarters around the world or in different work environments. With a
minimum of management, all the software elements of cloud computing can be
dimensioned on demand, you only need an Internet connection.
In a simple way, cloud computing is a technology that allows remote access to
softwares, file storage and data processing through the Internet, being an
alternative to running on a personal computer or server local. In the cloud
model, there is no need to install applications locally on computers. Cloud
computing offers individuals and businesses the capacity of a pool of computing
resources with good maintenance, insurance, easy access and on demand.
Cloud computing uses a network layer to connect users' peripheral point
devices, such as computers, smartphones and portable accessories, to
resources centralized in the data center. Before cloud computing, reliable
software execution by companies offering services was only possible if they
could also pay for the maintenance of the necessary server infrastructure. In
addition, traditional software required, in general, a full team of IT professionals,
internal or external, to deal with the inevitable set of errors, service challenges
and upgrades. The concept of cloud computing is free of all those problems and
outdated requirements.

Bibliographic Information

Author(s) of article: Salesforce


Title of article: cloud computing
Name of magazine, newspaper, website, etc. containing the article:
https://www.salesforce.com/mx/cloud-computing/
Date article was published and page number: Salesforce was created in
1999
Summary Information

Briefly state the main idea or thesis presented in this article:


When Salesforce was created in 1999, it was the first business service to offer
business applications on a website, which eventually came to be called by the
cloud computing market. Since then, Salesforce has been the pioneer in this
type of service for small, medium and large companies.

Summarize the most important information, ideas, facts, etc. presented in


this article:
The change offered by computing from the cloud is that it allows increasing the
number of services based on the network. This generates benefits both for
suppliers, who can offer, more quickly and efficiently, a greater number of
services, as well as for users who have the possibility of accessing them,
enjoying the 'transparency' and immediacy of the system and a model of
payment for consumption. Likewise, the consumer saves the salary costs or the
costs in economic investment (premises, specialized material, etc.).
Cloud Computing manages to provide these advantages, relying on a dynamic
technological infrastructure that is characterized, among other factors, by a high
degree of automation, a rapid mobilization of resources, a high capacity to
adapt to meet a variable demand, as well as advanced virtualization and a
flexible price depending on the consumption made, avoiding also the fraudulent
use of software and piracy.
The concept of "cloud computing" is very broad, and covers almost all possible
types of online service, but when companies preach offering a utility hosted in
the cloud, they usually refer to any of these three modalities: software as a
service (for its acronym in English SaaS -Software as a Service-), Platform as a
Service (PaaS) and Infrastructure as a Service (IaaS).
Another of the key factors that have allowed to evolve to cloud computing have
been, according to the pioneer in British cloud computing Jamie Turner,
virtualization technologies, the development of the universal high-speed
bandwidth and universal standards of software interoperability Turner added:
"As cloud computing expands, its reach goes beyond a handful of Google Docs
users - we can only begin to imagine its scope and scope - almost anything can
be used in the cloud." .

Summary

Write the final version of your summary here.


Rta: Security in cloud computing can be as good or better than what existed in
traditional systems, because providers are able to provide resources that solve
security problems that many customers can not afford. However, security still
remains an important issue, when the data has a confidential nuance. This
delays the adoption of cloud computing to a certain extent.
Security as a service: In the cloud environment, security is provided by
providers. Two methods can be distinguished: The first method is that anyone
can change their delivery methods included in cloud services. The second
method is that cloud service providers provide security only as a cloud service,
with company security information.
Browser security: In the cloud environment, remote servers are used for
computing. The client nodes are used only for the entry / exit of operations, and
for the authorization and authentication of information in the cloud. A standard
web browser is a platform normally used for all the users of the world. This can
be cataloged in two different types: Software as a service (SaaS), Web
Applications, or Web 2.0. Transport Layer Security (TLS), is usually used for
data encryption and host authentication.
Authentication or identification: In the cloud environment, the basis for
access control is authentication, access control is more important than ever
since the cloud and all its data are accessible to everyone through the internet.
The Trusted Platform Module (TPM) is widely used and an authentication
system stronger than the username and password. Trusted Computing Groups
(TCG's) is a standard on user authorization and other real-time communication
security tools between the provider and the client.
Loss of governance: In cloud infrastructures, the client necessarily cedes
control to the provider (cloud provider) in several matters, which negatively
affect security. At the same time, the service level agreement does not usually
have the task of providing this type of services on the part of the cloud provider,
which leaves a breach in the security defenses.
Lock-In: This is a small offer in this type of tools, the procedures or standards
of data formats or service interfaces that could guarantee the data, the
applications and the portability service. This can make it difficult for the client to
migrate from one provider to another, or migrate the data and services back to
another computing environment. This introduces a particular dependence on
the cloud provider for the provision of the service, especially the portability of
the data, the most fundamental aspect.
Protection of data: Cloud computing puts data protection at risk for cloud
users and their providers. In many cases, it causes difficulties for the provider
(in the role of the information controller) to ensure the practical effectiveness of
managing the data of the cloud provider and to ensure that the data is on the
right track. This problem is usually aggravated in cases of multiple data
transfers, for example between federated systems. On the other hand, some
cloud providers provide information on their data-shelling practices. There are
also some offers of certifications in data processing, security activities, and data
controls that take place; example, the SAS70 certification. Internet data streams
are linked to malware and decoy packages to get the user into an unknown
participation in criminal activities.
Limitations: Some limitations that are delaying a bit to cloud computing are
some of the following:
Data loss / leakage: Having data in the Cloud has many advantages but can
be compromised in different ways. They can be modified or deleted without a
backup, they can be disconnected from their context or accessed by
unauthorized people.
Difficulty assessing the reliability of suppliers: If Cloud providers are part of
our society, viewed in a statistical way, someone from your staff or some
subcontractor may not be reliable. This is why good human resources
background research procedures, policies, and information security procedures
should be taken.
Strength of authentication mechanisms: In the cloud, there are a lot of data,
applications and stored resources. Cloud computing is very weak in
authentication mechanisms, so the attacker can easily obtain the client user
account and access the virtual machine.

You might also like