Cloud Computing Terminology
What is Cloud Computing ?
Cloud Computing is the delivery of I T Information Technology resources ( hardware : computing, storing, networking & software : operating systems, middleware, virtualization, applications ) on demand over the internet with pay-as-you- go pricing model. Cloud computing services offers flexibility, scaling, support and is highly cost effective versus buying, upgrading, self managing I T resources.
Is Internet Cloud ?
No. Internet is communications network inter-connected to many computer networks around the world.
What is Cloud ?
Cloud is network of computer networks & comunication networks.
AI :
A Record :
Algorithm :
Analytics :
AntiVirus :
Apache :
APT :
Applications :
Application Allowlisting :
Application Migration :
Application Modernization :
Application Security :
AST :
Authentication :
Authorization :
Automation :
Availability Zone :
API :
Bare Metal Server :
Bit :
Byte :
Bandwidth :
Big Data :
Block Chain :
Backup :
Back End :
Botnets :
Business Intelligence :
Cache :
Client :
Cloud Automation :
Cloud as a Service :
Cloud Bursting :
Cloud Elasticity :
Cloud Hypervisor :
Cloud Infrastructure :
Cloud Migration :
Cloud Ops :
Cloud Repatriation :
Cloud Access Security Broker :
Cloud Security :
C Panel :
Cross Cloud :
cc TLD :
Command & Control Communications :
Control Panel :
CPU :
CDN :
C Name :
CI/CD :
Cybersecurity :
Container :
Container Run Time :
Co-Location :
Cluster :
CWE :
DAST :
Dashboard :
Database Sharding :
Data Portability :
Data Exfiltration :
Data Loss Prevention :
Disk Space :
Domain :
Domain Parking :
Domain Auction :
Database :
Downtime :
Developer :
DevOps :
DevSecOps
Data Centre :
DDOS :
DNS :
Dedicated Server :
Decrypt :
Disaster Recovery :
Distributed Computing :
Distributed Cloud :
Docker :
Edge Computing :
Edge Cloud :
Encrypt :
Ethernet :
Ethical Hacking :
End Point Security :
Enterprise Security :
Fault Tolerance :
Federated Network :
Firewall :
Flow Network Security :
Front End :
Gateway :
Geo Affinity :
Geo-Redundancy :
Grid Computing :
Hacking :
Hadoop :
Hop :
Hosting :
Hub :
Hybrid Cloud :
Hybrid VDI :
Hyper Convergence :
HTTPS :
I T Infrastructure :
IoT :
ISP :
IP Address :
Internet :
Internet Exchange Point :
Intranet :
IaaS :
ICANN :
IEEE :
Intrusion Protection Systems :
IOPS :
Kubernetes :
Latency :
Lift & Shift :
LAN :
Load Balancing :
Machine Learning :
Machine Learning :
Malware :
Mail Server :
Metadata :
Micro-segmentation :
Middleware :
Mirroring :
Multi Cloud :
MX Record :
Name Servers :
Natural Language Processing :
Networking :
Network Access Control :
Network Management Software :
Network Security :
Neural Networks :
NOC :
Operating System :
Optical Cables :
Optical Transceivers ;
On Demand :
On Premise :
Open-Source :
OWASP :
Pay-as-you-go :
PaaS :
Perimeter Firewall :
Plesk :
Phishing :
Private Cloud :
Privacy Protection :
Proxy :
Public Cloud :
Quantum Computing :
Qubit :
RAM :
Ransomware :
Real Time :
ROM :
Root Access :
Router :
RunTime Environment :
SAST :
SD-WAN :
Self Detecting :
Self Healing :
Self Configuring :
Server :
Service Provider :
Security Threat :
Session Optimization :
Serverless :
SOA :
Software Defined Data Centre :
Storage :
Shared Hosting :
SaaS :
Scaling :
SLA :
Stack :
Scanning :
Shared Fate :
Switch :
SSD :
SSL :
SSH :
Subdomain :
Subnet :
Thin Client :
Threat Actors :
Throughput :
TLD :
TTL :
TXT Record :
UI :
Unified Threat Management :
URL :
UX :
Uptime :
Updates :
VPN :
VPS :
Vendor Lock In :
Virtual Machine :
Virtual Private Cloud :
Virtualization :
Vulnerabilty Management :
WAF :
WAN :
Website :
WWW :
Wi-Fi :
Wireless Networks :
Work Load Security :
Yottabyte :
Zero Trust Network Access :