SlideShare a Scribd company logo
1 of 1
Download to read offline
TYPES OF CLOUD
COMPUTING SERVICE
The three main types of cloud computing are infrastructure as a service,
platform as a service, and software as a service. Each type of cloud
provides different levels of control, flexibility, and control so you can
choose the right service for your needs. Cloud Computing Model
INFRASTRUCTURE AS A SERVICE (IAAS)
IaaS has cloud infrastructure. It usually provides access to networking
features, computing (virtual or dedicated hardware), and database
access. IaaS gives you the highest level of flexibility and control over
your IT infrastructure. It is most similar to existing IT infrastructure that
most IT departments and developers are familiar with.
www.sysvoot.com
There are three types of cloud computing. Each model represents a
different aspect of cloud computing.
PLATFORM AS A SERVICE (PAAS)
PaaS lets you manage the underlying infrastructure (which is hardware
and operating systems) and frees you to focus on deploying and
managing your applications. This helps you work more efficiently
because you don't have to worry about provisioning, licensing, software
maintenance, patches, or any other unnecessary heavy lifting. major
involvement in your business.
SOFTWARE AS A SERVICE (SAAS)
SaaS provides you with a complete product that is operated and
managed by a service provider. In most cases, people who refer to SaaS
are referring to end-user applications (such as webmail). With SaaS
offerings, you don't have to worry about maintaining the service or
managing the underlying infrastructure. You just have to think about
how to use this software.

More Related Content

Similar to Types of Cloud Computing Service

Azure fundamentals
Azure   fundamentalsAzure   fundamentals
Azure fundamentalsRaju Kumar
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Tyrone Systems
 
Azure fundamentals-170910113238
Azure fundamentals-170910113238Azure fundamentals-170910113238
Azure fundamentals-170910113238ScottSmith574468
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
azure-fundamentals-170910113238.pptx
azure-fundamentals-170910113238.pptxazure-fundamentals-170910113238.pptx
azure-fundamentals-170910113238.pptxabhijeet hapase
 
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformdescribing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformCuneiform Consulting Pvt Ltd.
 
3.cloud service delivery models
3.cloud service delivery models3.cloud service delivery models
3.cloud service delivery modelsDrRajapraveen
 
PSee Solutions
PSee SolutionsPSee Solutions
PSee SolutionsKatieDew2
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Integra: Cloud Technologies Decision Tree (Infographic)
Integra: Cloud Technologies Decision Tree (Infographic)Integra: Cloud Technologies Decision Tree (Infographic)
Integra: Cloud Technologies Decision Tree (Infographic)Jessica Legg
 

Similar to Types of Cloud Computing Service (20)

Azure fundamentals
Azure   fundamentalsAzure   fundamentals
Azure fundamentals
 
Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models
 
Azure fundamentals-170910113238
Azure fundamentals-170910113238Azure fundamentals-170910113238
Azure fundamentals-170910113238
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
azure-fundamentals-170910113238.pptx
azure-fundamentals-170910113238.pptxazure-fundamentals-170910113238.pptx
azure-fundamentals-170910113238.pptx
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformdescribing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
 
3.cloud service delivery models
3.cloud service delivery models3.cloud service delivery models
3.cloud service delivery models
 
types of cloud.pptx
types of cloud.pptxtypes of cloud.pptx
types of cloud.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
PSee Solutions
PSee SolutionsPSee Solutions
PSee Solutions
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Rama1
Rama1Rama1
Rama1
 
C loud seminar
C loud  seminarC loud  seminar
C loud seminar
 
Integra: Cloud Technologies Decision Tree (Infographic)
Integra: Cloud Technologies Decision Tree (Infographic)Integra: Cloud Technologies Decision Tree (Infographic)
Integra: Cloud Technologies Decision Tree (Infographic)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Intoduction of cloud computing
Intoduction of cloud computingIntoduction of cloud computing
Intoduction of cloud computing
 

More from Sysvoot Antivirus

Managed IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdfManaged IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdfSysvoot Antivirus
 
What is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdfWhat is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdfSysvoot Antivirus
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfSysvoot Antivirus
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfSysvoot Antivirus
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfSysvoot Antivirus
 
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdfSysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdfSysvoot Antivirus
 
How to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdfHow to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdfSysvoot Antivirus
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfSysvoot Antivirus
 
Latest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdfLatest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdfSysvoot Antivirus
 
How to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdfHow to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdfSysvoot Antivirus
 
5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdfSysvoot Antivirus
 
Top 10 Malware May 2022 .pdf
Top 10 Malware May 2022 .pdfTop 10 Malware May 2022 .pdf
Top 10 Malware May 2022 .pdfSysvoot Antivirus
 
Windows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdfWindows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdfSysvoot Antivirus
 
What is Identity and Access Management.pdf
What is Identity and Access Management.pdfWhat is Identity and Access Management.pdf
What is Identity and Access Management.pdfSysvoot Antivirus
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdfSysvoot Antivirus
 
What is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdfWhat is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdfSysvoot Antivirus
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular SpywareSysvoot Antivirus
 
Why are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for CybersecurityWhy are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for CybersecuritySysvoot Antivirus
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdfSysvoot Antivirus
 

More from Sysvoot Antivirus (20)

Managed IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdfManaged IT Service Provider in New York.pdf
Managed IT Service Provider in New York.pdf
 
What is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdfWhat is Paas Benefit of Paas.pdf
What is Paas Benefit of Paas.pdf
 
Benefit of SaaS.pdf
Benefit of SaaS.pdfBenefit of SaaS.pdf
Benefit of SaaS.pdf
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdf
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdf
 
Properties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdfProperties of Salesforce CRM.pdf
Properties of Salesforce CRM.pdf
 
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdfSysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
Sysvoot - Characteristics Of Service Model Of Cloud Computing.pdf
 
How to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdfHow to Choose Managed IT Service Provider.pdf
How to Choose Managed IT Service Provider.pdf
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
 
Latest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdfLatest Cyber Attacks and Trends That You Should Know.pdf
Latest Cyber Attacks and Trends That You Should Know.pdf
 
How to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdfHow to Use a Firewall For The Best Protection.pdf
How to Use a Firewall For The Best Protection.pdf
 
5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf5 Main Aspects of IoT Impact on Cybersecurity.pdf
5 Main Aspects of IoT Impact on Cybersecurity.pdf
 
Top 10 Malware May 2022 .pdf
Top 10 Malware May 2022 .pdfTop 10 Malware May 2022 .pdf
Top 10 Malware May 2022 .pdf
 
Windows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdfWindows vs Mac Which to Choose.pdf
Windows vs Mac Which to Choose.pdf
 
What is Identity and Access Management.pdf
What is Identity and Access Management.pdfWhat is Identity and Access Management.pdf
What is Identity and Access Management.pdf
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
What is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdfWhat is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdf
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
 
Why are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for CybersecurityWhy are Proxy Servers Important for Cybersecurity
Why are Proxy Servers Important for Cybersecurity
 
What Are Social Engineering Attacks .pdf
What Are Social Engineering Attacks  .pdfWhat Are Social Engineering Attacks  .pdf
What Are Social Engineering Attacks .pdf
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

Types of Cloud Computing Service

  • 1. TYPES OF CLOUD COMPUTING SERVICE The three main types of cloud computing are infrastructure as a service, platform as a service, and software as a service. Each type of cloud provides different levels of control, flexibility, and control so you can choose the right service for your needs. Cloud Computing Model INFRASTRUCTURE AS A SERVICE (IAAS) IaaS has cloud infrastructure. It usually provides access to networking features, computing (virtual or dedicated hardware), and database access. IaaS gives you the highest level of flexibility and control over your IT infrastructure. It is most similar to existing IT infrastructure that most IT departments and developers are familiar with. www.sysvoot.com There are three types of cloud computing. Each model represents a different aspect of cloud computing. PLATFORM AS A SERVICE (PAAS) PaaS lets you manage the underlying infrastructure (which is hardware and operating systems) and frees you to focus on deploying and managing your applications. This helps you work more efficiently because you don't have to worry about provisioning, licensing, software maintenance, patches, or any other unnecessary heavy lifting. major involvement in your business. SOFTWARE AS A SERVICE (SAAS) SaaS provides you with a complete product that is operated and managed by a service provider. In most cases, people who refer to SaaS are referring to end-user applications (such as webmail). With SaaS offerings, you don't have to worry about maintaining the service or managing the underlying infrastructure. You just have to think about how to use this software.