Project Description

Translator

Cloud-Technologien

EaaS/XaaS (Everything as a Service)

The user is provided with a computer infrastructure, usually virtual platforms (computers) connected to a network, which he independently configures for his own purposes.

IaaS (Infrastructure as a service)

The user is provided with a computer infrastructure, usually virtual platforms (computers) connected to a network, which he independently configures for his own purposes.

PaaS (Platform as a service)

The user is provided with a computer platform with an installed operating system, possibly with software.

SaaS (Software as a service)

This type of service is usually positioned as “software on demand”. This is software deployed on remote servers and can be accessed by the user via the Internet, and all updates and licenses for this software are regulated by the service provider. Payment in this case is made for the actual use of the software.

HaaS (Hardware as a Service)

In this case, the service user is provided with equipment, which he can use on a lease basis for his own purposes. This option allows you to save on the maintenance of this equipment, although in essence it is not much different from the IaaS type of service, except that you have bare equipment on the basis of which you deploy your own infrastructure using the most suitable software.

WPaaS (Workplace as a Service)

In this case, the company uses cloud computing to organize the workplaces of its employees, setting up and installing all the necessary software necessary for the work of the staff.

DaaS (Data as a Service)

The main idea of this type of service is that the user is provided with disk space, which he can use to store large amounts of information.

SECaaS (Security as a Service)

This type of service provides users with the ability to quickly deploy; products allow for the secure use of web technologies, the security of electronic correspondence, as well as the security of the local system, which allows users of this service to save on deployment and maintain the security of their own system.