Cloud Computing Knowledge Base
Cloud computing (“the cloud”) is one of the leading technology topics in the world. Cloud computing, sometimes called on-demand computing, uses the Internet to provide shared computing resources and storage of records or documents. The term covers everything from emailing or photo sharing to hosting the entire computing infrastructure of a global corporation from remote data centers. If you're unsure about what Cloud Computing is, you are probably among the 95% of people that are already using cloud services, like online banking and social networks, but don't realize it. An example of a Cloud Computing provider is Google's Gmail. Gmail users can access files and applications hosted by Google via the internet from any device.
The data in the cloud is stored on many physical and/or virtual servers that are hosted by a third-party service provider. An example of a cloud computing file storage provider is Microsoft One Drive in which files can be accessed from any device via the Internet.
The three most popular Technology models are Public Cloud - Computing resources, provided by a cloud, have been adopted by various organizations and enterprises, through the public Internet. Cloud providers ensure that there is a kind of separation for the resources that are used by different enterprises and organizations. It is based on the standard cloud computing model. The service provider builds resources - the applications and storage. These resources are available to the public through the Internet. Private Cloud - Cloud infrastructure is, entirely, owned by the enterprise and maintained, either, by the enterprise or a third party. It can be located either on-site or off-site. Hybrid Cloud - Hybrid cloud is considered to be the combination of any type of cloud model mentioned above, connected by a standardized technology. It is a combination of, on and off premises. Hybrid cloud offers best of both the worlds and performs distinct functions within the same organization.
Infrastructure as a Service (IaaS) - It is the delivery of computing infrastructure as a service. IaaS is using an existing infrastructure which can be adopted on a pay-per-use scheme. Platform as a Service (PaaS) - Providers deliver not only infrastructure but also middleware (databases, messaging engines etc.) and solution stacks for the application, build and development and deploy. Software as a Service (SaaS) - Applications, which are hosted by a provider on a cloud infrastructure. These applications are accessed over the network or they are accessed over a program interface, for instance, web services.
Some common services that are hosted in the cloud are hosted email like Office 365, provided by Microsoft; cloud storage, provided by companies like Microsoft One Drive. These services, applications and files are stored in the cloud and can be accessed by users via any device (including mobile devices).
Cloud computing can significantly reduce the cost and complexity of owning and operating computers and networks. If an organization uses a cloud provider, it does not need to spend money on information technology infrastructure, or buy hardware or software licenses. Cloud services can often be customized and flexible to use, and providers can offer advanced services that an individual company might not have the money or expertise to develop.
While no storage solution is 100% safe, cloud storage providers can offer a safer and more accessible place for companies to store data than traditional computing methods. Depending on the service contract, duplicate copies of the companies' data can be stored on servers located in different geographies and protected by backup power supplies in the case of a disaster.
In the current scenario, organizations agree that cloud technology enforces the best security policies. These policies ensure that the unauthorized parties do not get access to your data and are not able to modify them. You, no more, have to fear about losing your data. Cloud technology ensures proper protection of data and information. It, also, ensures that cloud networks and connections are secure. Evaluating security controls on physical infrastructure and facilities is a high priority task for Cloud computing. It enforces privacy policies and manages security terms in the cloud SLA. With the adoption of cloud technology services, you can be pretty assured that your data remains safe, regardless of what happens to your infrastructure.
Cloud Enterprise Resource Planning (ERP) enables a company’s accounting, operations management, reporting and other business processes to run in the cloud.
Cloud ERP has been proven to reduce costs in many ways because it :
- avoids upfront costs for all computing infrastructure such as hardware and data servers
- Reduces IT support services because IT is in the cloud
- Eliminates paying upfront for application software licenses
- Shrinks the cost of maintaining and supporting those applications
- Paying only for the computing resources needed
- A fixed rate so companies can use their cash on other business initiatives
- Enjoying the confidence that the data has been backed up
- Avoiding attacks on the company’s server because the data in not stored locally,
- Accessing the system from anywhere makes it easy for a company to expand geographically
RFID Knowledge Base
RFID is Radio Frequency Identification is the wireless use of radio-frequency electromagnetic field to transfer data for the purposes of automatically identifying which a technology that employs a microchip with an antenna to broadcasts its unique identifier and location to receivers.
• A small electronic data carrying device called a transponder or RFID tag that is attached to the item to be identified/tracked. • A reader that communicates with the tag using radio frequency signals • A host data processing system that contains the information of the identified item and distributes the information between other remote data processing systems.
• Cost reductions • Improved efficiencies in processing accuracy • Automated real-time inventory data collection and management visibility • Expedited tracking of finished goods and improved productivity • Expanded visibility and automatic recording of all inventory movement
• The LF band covers frequencies from 30 KHz to 300 KHz. • The HF band ranges from 3 to 30 Mhz. • The UHF frequency band covers the range from 300 MHz to 3 GHz.
Radio waves bounce off metal and are absorbed by water at ultra-high frequencies. That makes tracking metal products or those with high water content problematic, but good system design and engineering can overcome this shortcoming. Low- and high-frequency tags work better on products with water and metal. There are applications in which low-frequency RFID tags are actually embedded in metal auto parts to track them.
Time Division Multiple Access (TDMA) is a technique used in order to prevent reader collision (when a signal from one reader interfere with the signal from another reader where coverage overlap). With this technique the readers are instructed to read at different times rather than both trying to read at the same time. This ensures that they don’t interfere with each other but the system has to be set up that if one reader reads a tag another reader does not read it again.
• The speed and proximity required for products to successfully pass the read/write heads. • Data size • Distance • Temperature and moisture • Materials used