{"id":6496,"date":"2019-06-24T16:00:55","date_gmt":"2019-06-24T15:00:55","guid":{"rendered":"https:\/\/websitecopywritingservices.com\/blog\/?p=6496"},"modified":"2026-04-13T10:10:54","modified_gmt":"2026-04-13T09:10:54","slug":"cloud-computing-guide","status":"publish","type":"post","link":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/","title":{"rendered":"The Plain-English Guide to Cloud Computing: A One-Stop Resource for Tech Content Writers"},"content":{"rendered":"<section>\n<p style=\"display: inline; margin-bottom: 0\"><span class=\"mainPostimage\" itemprop=\"image\" itemscope=\"\" itemtype=\"https:\/\/schema.org\/ImageObject\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing.webp\" title=\"Must-Know Info to Crack This Content-Hungry Writing Niche\" alt=\"A Writer's Guide to Cloud Computing\" width=\"320\" height=\"214\" id=\"cloudPostimage\"><meta itemprop=\"url\" content=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing.webp\"><meta itemprop=\"width\" content=\"320\"><meta itemprop=\"height\" content=\"214\"><\/span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-mobile.webp\" title=\"Must-Know Info to Crack This Content-Hungry Writing Niche\" alt=\"A Writer's Guide to Cloud Computing\" width=\"500\" height=\"262\" id=\"cloudPostimage-mobile\"><\/p>\n<div class=\"menu-container\" id=\"cloud-menu\">\n<div class=\"menu-wrapper\">\n<p>QUICK LINKS<\/p>\n<div>\n \t\t\t<a style=\"padding-top: 13px;\" href=\"#promise\">What\u2019s in This Post?<\/a><a href=\"#audience\">Who Should Read This?<\/a><a href=\"#definition\">What Is Cloud Computing?<\/a><a href=\"#key-concepts\">Key Cloud Concepts<\/a><a href=\"#training\">Where to Learn More<\/a><a href=\"#cybersecurity\">Cybersecurity<\/a><a href=\"#big-data\">Big Data<\/a><\/p>\n<div class=\"last-item\"><a style=\"padding-bottom: 8px;\" href=\"#freelance-gigs\">How to Find Freelance Writing Gigs<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Fact: <\/strong>Niche copywriters are in big demand.<\/p>\n<p>And they get paid more.<\/p>\n<p>Why?<\/p>\n<p>Because most clients aren&#8217;t just looking for any writer.<\/p>\n<p>They want someone who understands their industry. Someone who can hit the ground running. Someone who can save them precious time and money.<\/p>\n<p>In other words, a low-maintenance writer who just gets on with the job with minimal guidance and assistance.<\/p>\n<p>So how do you make the move from a run-of-the-mill jack of all trades to a highly sought-after specialist copywriter?<\/p>\n<p>That&#8217;s how this post can help.<br \/>\n<!--more--><\/p>\n<p>Because it focuses on one of the most lucrative writing markets.<\/p>\n<p>Together, we&#8217;ll be taking a writer&#8217;s journey into <strong>cloud computing<\/strong>.<\/p>\n<p>We\u2019ll be putting you in the shoes of a real cloud user. We&#8217;ll encounter some of the IT challenges they face and how the cloud helps to overcome them. We&#8217;ll be learning practically everything a writer needs to break into this highly rewarding sector.<\/p>\n<p>But, before we jump in, let&#8217;s get a rundown of what we cover in this post.<br \/>\n<\/section>\n<section id=\"promise\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">What\u2019s in This Post?<\/h2>\n<\/div>\n<p><a href=\"#definition\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Cloud-Basics-Icon.webp\" alt=\"A simple drawing of a cloud\" width=\"70\" height=\"55\" class=\"promise-image\"><\/a><span class=\"promise-text\"><strong><a href=\"#definition\">The Basics of Cloud Computing<\/a>:<\/strong> We&#8217;ll take you through all the key cloud concepts, so you know what you\u2019re talking about when you land your first freelance client.<\/span><br \/>\n<a href=\"#training\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Learn-More-Icon.webp\" alt=\"A simple drawing of an academic mortarboard hat\" width=\"70\" height=\"55\" class=\"promise-image\"><\/a><span class=\"promise-text\"><strong><a href=\"#training\">Where to Learn More<\/a>:<\/strong> Here you&#8217;ll find a number of training courses and other learning resources to help develop your cloud computing knowledge.<\/span><br \/>\n<a href=\"#cybersecurity\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Cybersecurity-Icon.webp\" alt=\"A drawing of a protective shield with a padlock in the middle\" width=\"70\" height=\"55\" class=\"promise-image\"><\/a><span class=\"promise-text\"><strong><a href=\"#cybersecurity\">Cybersecurity<\/a>:<\/strong> The rapid growth of cloud computing has also opened new opportunities for writers specialising in cloud security. This introduction will give you a basic understanding of cybersecurity and how it differs in the cloud.<\/span><br \/>\n<a href=\"#big-data\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Big-Data-Icon.webp\" alt=\"A drawing of 3 database cylinders linked together\" width=\"70\" height=\"55\" class=\"promise-image\"><\/a><span class=\"promise-text\"><strong><a href=\"#big-data\">Big Data<\/a>:<\/strong> The cloud has been one of the key drivers behind the explosion in big data analytics. But what exactly is big data? We&#8217;ll explain everything you need to know and show you what makes big data different from traditional database technology.<\/span><br \/>\n<a href=\"#freelance-gigs\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Freelance-Gigs-Icon.webp\" alt=\"A drawing of a piece of paper with a pen writing on it\" width=\"70\" height=\"55\" class=\"promise-image\"><\/a><span class=\"promise-text\"><strong><a href=\"#freelance-gigs\">How to Find Freelance Writing Gigs<\/a>:<\/strong> In this section, you&#8217;ll get a few starting points on where to look for your first cloud computing client.<\/span><br \/>\n<\/section>\n<section id=\"audience\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">Who Should Read This?<\/h2>\n<\/div>\n<p>This post is aimed at writers interested in becoming a cloud content specialist.<\/p>\n<p>But it&#8217;s also useful to:<\/p>\n<ul class=\"blog\">\n<li><strong>Cloud service providers (CSPs)<\/strong> who need a fast-track guide for new in-house writers.<\/li>\n<li><strong>Sales and marketing professionals<\/strong> who already work in the sector but want a deeper understanding of the cloud.<\/li>\n<li>Technical <strong>PR consultants<\/strong> with clients in the cloud industry.<\/li>\n<li>Senior-level <strong>IT managers<\/strong> looking for a broad overview of the cloud.<\/li>\n<li><strong>Developers<\/strong> and <strong>operators<\/strong> who aren&#8217;t yet familiar with the cloud model of IT.<\/li>\n<\/ul>\n<\/section>\n<div id=\"IT-terms\">\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Cloud-Essentials-Icon.webp\" alt=\"Computer icon with a number 10 showing on the monitor\" width=\"70\" height=\"55\" class=\"essentials-image\"><\/p>\n<h2 class=\"essentials-heading\">10 Essential Computing Terms<\/h2>\n<\/div>\n<p>To make this post accessible to readers at any level, we&#8217;ve included a list of basic IT terms that are essential to your understanding of the cloud. If you&#8217;re already computer savvy, just move straight onto the next section.<\/p>\n<p>(You\u2019ll also find internal links throughout this post, so you can refer back to this glossary at any time.)<\/p>\n<p style=\"margin-bottom: 0em;\"><a href=\"javascript:void(0)\" onclick=\"showEssentials()\" id=\"showLink\">Show this section<span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><a href=\"javascript:void(0)\" onclick=\"hideEssentials()\" id=\"hideLink\">Hide this section<span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><\/p>\n<div id=\"essentialContent\">\n<p style=\"margin-top: 1.5em\">The following is a quick reference list for absolute beginners in IT. Don\u2019t worry if you forget some of the terms, as we link back to them at various points throughout the post.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"development\">1. Development<\/h3>\n<p>The collective process of developing software \u2013 covering everything from specification and application design to writing code (programming), testing and bug fixing.<\/p>\n<p>IT people also use the term <em>development<\/em> to refer to the department or team that develops and maintains applications.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"operations\">2. Operations<\/h3>\n<p>The people and processes involved in ensuring the smooth running of computer systems.<\/p>\n<p>The role of <em>operations<\/em> would typically include taking backups, monitoring system performance, maintaining printers, providing helpdesk support and scheduling batch jobs, such as monthly salary or customer billing runs.<\/p>\n<p>The term<em> operations<\/em> can also refer to the various internal tasks that a computer performs.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"server\">3. Server<\/h3>\n<p>A computer program that performs a specific task, providing a service to other computers or end users.<\/p>\n<p>A common example is a <strong>web server<\/strong>. Whenever you view a web page over the Internet, your browser sends a request to a web server, which responds by serving up the web page.<\/p>\n<p>Often the physical computer that hosts a server program is also called a <em>server<\/em>.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"data-centre\">4. On-Premises Data Centre<\/h3>\n<p>A company&#8217;s own IT facilities, which include in-house servers, network infrastructure and the buildings it uses to house them.<\/p>\n<p>The <em>on-premises data centre<\/em> characterises the traditional approach to IT. This contrasts with cloud computing, where you use an external cloud provider to host your applications instead of using your own facilities.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"memory\">5. Memory<\/h3>\n<p>In simple terms, <em>memory<\/em> is a high-speed storage component of a computer designed to hold information for temporary use. Data is only stored in <em>memory<\/em> for as long as your computer needs it to perform a specific function \u2013 such as loading an application or web page in your browser.<\/p>\n<p>Other terms used to refer to <em>memory<\/em> include <em>primary storage<\/em>, <em>main memory<\/em> and <em>random-access memory (RAM)<\/em>.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"storage\">6. Storage<\/h3>\n<p>A secondary memory component for retaining information over long periods. Whether used or not, data maintained in <em>storage<\/em> remains there until it\u2019s actively deleted.<\/p>\n<p>Storage media are designed to hold far more data than memory. But they come with a trade-off of slower access speed.<\/p>\n<p>The two main types of <em>storage<\/em> are the <strong>hard disk drive (HDD)<\/strong>, which uses traditional magnetic media, and <strong>solid-state drive (SSD)<\/strong>, which is based on newer microchip technology. SSD storage is faster but more expensive than HDD.<\/p>\n<blockquote style=\"background: #DEEAF7; border-left: none;\">\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Units-of-Measure-Callout.webp\" class=\"callout-image\" alt=\"Units of Measure Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Units of Measure<\/strong><\/div>\n<p>Storage and memory are generally measured in:<\/p>\n<ul class=\"block-quote\">\n<li><strong>Gigabytes (GB)<\/strong>: 1GB is slightly more than the storage capacity of a compact disc (CD).<\/li>\n<li><strong>Terabytes (TB): <\/strong>1TB = 1,024GB. This is slightly more than the storage capacity of 200 DVDs.<\/li>\n<li><strong>Petabytes (PB):<\/strong> 1PB = 1,024TB. Slightly more than the capacity needed to store 2,000 years of MP3 recordings.<\/li>\n<\/ul>\n<p>Petabytes are generally used to refer to the storage capacity of large computer networks rather than individual machines or components.\n<\/p><\/blockquote>\n<h3 class=\"cloud-heading-3\" id=\"cpu\">7. Central Processing Unit (CPU)<\/h3>\n<p>The <em>CPU<\/em> is both the workhorse and intelligent component of your computer.<\/p>\n<p>It executes the instructions given to it by the programs running on your machine. It performs calculations and logical operations. It accepts input from devices, such as a keyboard or mouse. And it also relays signals between other hardware components in your computer.<\/p>\n<p>A number of factors determine the performance capability of a <em>CPU<\/em>. One of the most significant is <strong>clock speed<\/strong>, which is the operating frequency or number of instruction cycles the <em>CPU<\/em> handles each second. Clock speed is measured in megahertz (MHz).<\/p>\n<blockquote style=\"padding-top: 2.4em; padding-bottom:1.2em; background: #DEEAF7; border-left: none;\">\n<p style=\"margin: 0; padding:0;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Desk-Analogy.webp\" alt=\"Annotated drawing of man sitting at a desk\" width=\"165\" height=\"142\" id=\"desk\"><\/p>\n<p style=\"margin-bottom: 1.3em;\">The best way to understand the difference between <em>memory<\/em>, <em>storage<\/em> and <em>CPU<\/em> is to visualise a computer as yourself working at a desk.<\/p>\n<p>The surface of the desk is like computer <em>memory<\/em>, as it&#8217;s the place where you put all the things you need to perform your immediate work. The set of drawers is like computer <em>storage<\/em>, as you use it to store items away until you need them. And you are the <em>CPU<\/em>, as you&#8217;re the one doing the work at the desk.\n<\/p><\/blockquote>\n<h3 class=\"cloud-heading-3\" id=\"cli\">8. Command-Line Interface (CLI)<\/h3>\n<p>A method of interacting with a computer using text-based commands.<\/p>\n<p>Until the late 1980s virtually all computers used a <em>CLI<\/em>. But, since the arrival of macOS and Windows, it has been largely superseded by the <strong id=\"gui\">graphical user interface (GUI)<\/strong> \u2013 the familiar desktop method by which we access our computers using icons and other visual indicators.<\/p>\n<p>Nevertheless, <em>CLIs<\/em> are still widely used by developers. This is because they&#8217;re quicker and more convenient for performing technical tasks, such as configuring your machine, working with programs and managing workflows.<\/p>\n<p>You can still access the <em>CLI<\/em> on modern home computers. Windows supports two CLI applications \u2013 <strong>Windows PowerShell<\/strong> and the older <strong>Command Prompt<\/strong>. The CLI tool provided in macOS is known as <strong>Bash<\/strong>, which you can access via the <strong>Terminal<\/strong> application.<\/p>\n<p>The following is a screenshot from a Bash terminal session on a Mac:<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Bash-macOS-Shell.webp\" alt=\"Screenshot from a Bash terminal session\" title=\"A Simple Echo Command That Instructs Linux to Display Some Text on Screen\" width=\"500\" height=\"295\" class=\"auto-scale-center\"><\/p>\n<h3 class=\"cloud-heading-3\" id=\"open-source\">9. Open-Source Software<\/h3>\n<p>Many applications are built using a type of computer code known as a <strong>compiled language<\/strong>. Whenever a developer creates a program using one of these languages, they have to compile it before they can run it. This process converts their <strong>source code<\/strong> into a lower-level machine language the computer can understand.<\/p>\n<p>Proprietary software, such as <strong>Microsoft Office<\/strong> and <strong>Adobe Creative Suite<\/strong> applications, keep their source code secret and only provide you with the compiled code.<\/p>\n<p>But <em>open-source software<\/em> is different. You can access and modify the source code, allowing you to adapt the software to work the way you want.<\/p>\n<p>Open-source products are typically the result of community-oriented projects, by which software is developed, tested and improved through collaborative participation. This often makes them more robust and secure than proprietary alternatives.<\/p>\n<p>Most <em>open-source software<\/em> is free to use. However, some enterprise-grade products, which offer extra features such as customer support and enhanced functionality, are licensed on a subscription basis.<\/p>\n<h3 class=\"cloud-heading-3\" id=\"linux\">10. Linux<\/h3>\n<p>An operating system just like Windows and macOS. It can run on pretty well any kind of hardware, including PCs and Macs, and is the underlying technology behind a vast array of devices \u2013 from <strong>Android phones<\/strong> and <strong>TVs<\/strong> to <strong>home appliances<\/strong>, <strong>web servers<\/strong> and the world&#8217;s fastest <strong>supercomputers<\/strong>.<\/p>\n<p><em>Linux<\/em> has become the platform of choice for application development because it is open source, free to use and highly flexible, stable and secure.<\/p>\n<p>It also comes in different versions known as <strong>distributions. <\/strong>Each distribution uses the same core Linux operating system, but may be geared towards a particular type of hardware or different goal.<\/p>\n<p>For example, <a href=\"https:\/\/www.ubuntu.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Ubuntu<\/a> puts a strong emphasis on ease of use, <a href=\"https:\/\/www.debian.org\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Debian<\/a> leans towards quality control and <a href=\"https:\/\/getfedora.org\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Fedora<\/a> focuses on innovation and compatibility with the latest technologies.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Ubuntu-Logo.png\" alt=\"Ubuntu Logo\" width=\"150\" height=\"125\"><\/p>\n<p class=\"wp-caption-text\">Ubuntu is the most <a href=\"https:\/\/www.zdnet.com\/article\/ubuntu-linux-continues-to-rule-the-cloud\/\" rel=\"noopener noreferrer\" target=\"_blank\">widely used Linux distribution<\/a> in the cloud<\/p>\n<\/div>\n<blockquote style=\"background: #DEEAF7; border-left: none;\">\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Further-Reading.webp\" class=\"callout-image\" alt=\"Book icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Further Reading<\/strong><\/div>\n<p><a href=\"https:\/\/sourceforge.net\/projects\/linuxcommand\/files\/latest\/download\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Linux-Command-Line-William-Shotts.webp\" alt=\"Book Cover of The Linux Command Line by William Shotts\" width=\"150\" height=\"199\" id=\"Shotts\"><\/a>Do you want to learn how to use the Linux command line? Or maybe just want to get a feel of how it works?<\/p>\n<p><em>The Linux Command Line<\/em> by William Shotts is a complete introduction to the CLI, taking you from an absolute beginner right through to a Linux power user.<\/p>\n<p>It&#8217;s more of a guided tour than a technical manual, with topics organised into digestible bite-size chunks. Packed with practical examples, it&#8217;s both great fun and ridiculously easy to read.<\/p>\n<p>You can purchase the book at <a href=\"https:\/\/nostarch.com\/linux-command-line-3e\" rel=\"noopener noreferrer\" target=\"_blaapink\">No Starch Press<\/a> or get the PDF version for FREE using this <a href=\"https:\/\/sourceforge.net\/projects\/linuxcommand\/files\/latest\/download\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">download link<\/a>.*<\/p>\n<p><span style=\"font-size: 0.8em;\">* This recommendation does NOT contain affiliate links.<\/span><\/p><\/blockquote>\n<p style=\"margin-bottom: 0em;\"><a href=\"#IT-terms\" onclick=\"hideEssentials()\" id=\"showLink\">Hide this section<span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><\/p>\n<\/div>\n<\/div>\n<section id=\"definition\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">What Is Cloud Computing?<\/h2>\n<\/div>\n<p style=\"margin-bottom: 2px;\">Difficulty level<\/p>\n<p><meter class=\"difficulty-level\" title=\"Difficulty Level: Easy\" min=\"0\" max=\"7\" value=\"2\">2 out of 7<\/meter><br \/>\nCloud computing is a HUGE business.<\/p>\n<p>The industry is growing exponentially and offers a wealth of opportunities for tech-savvy writers and bloggers.<\/p>\n<p>But what exactly is the cloud?<\/p>\n<p>Many people think of it in terms of file storage services, such as <strong>Dropbox<\/strong> or <strong>iCloud<\/strong>.<\/p>\n<p>But they&#8217;re only a tiny part of it.<\/p>\n<p>These services belong to a category of applications known as <a href=\"#saas\">Software as a Service (SaaS)<\/a> \u2013 which represents just one layer of the cloud as a whole.<\/p>\n<p>To see the bigger picture, we need to go back to the time when the cloud first started.<\/p>\n<h3 class=\"cloud-heading-3\">How the Cloud Began<\/h3>\n<p>Remember the dot-com revolution of the late 1990s and early 2000s?<\/p>\n<p>Online shopping giant Amazon was fast becoming a global retail empire, with a rapidly expanding product catalogue, customer base and network of merchant partners.<\/p>\n<p>One of the biggest challenges the company faced was how to expand its server network fast enough to meet the huge growth in demand.<\/p>\n<p>As a result, infrastructure development became central to Amazon&#8217;s business plan. It took a new shared approach to IT architecture, which helped to minimise unused server resources. And it developed a platform that could scale quickly, easily and cost effectively.<\/p>\n<p>Then Amazon started to realise other businesses could benefit from its new model of IT.<\/p>\n<p>So it set up the subsidiary company <a href=\"https:\/\/aws.amazon.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Amazon Web Services (AWS)<\/a> with the goal of delivering this vision. Companies would then be able to use the retailer&#8217;s IT infrastructure to host their own workloads. They&#8217;d be able to provision exactly the resources they needed instead of purchasing or renting an entire <a href=\"#server\" onclick=\"showEssentials()\">server<\/a>. And they&#8217;d also be able to scale their computing resources quickly and easily to meet demand.<\/p>\n<p>In 2006, the eCommerce giant then officially launched the first service that we know as public cloud today. This was initially just online <a href=\"#storage\" onclick=\"showEssentials()\">storage<\/a> but other computing services quickly followed.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Andy-Jassy.webp\" alt=\"Andy Jassy - CEO of AWS\" width=\"500\" height=\"339\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">Andy Jassy: CEO of AWS and a key figure behind the evolution of the cloud<br \/><span style=\"font-weight:normal; margin-top: 0.4em; display: block;\">(Image source: <a href=\"https:\/\/www.flickr.com\/photos\/jurvetson\/30270298030\" rel=\"noopener noreferrer\" target=\"_blank\">Steve Jurvetson<\/a>)<\/span><\/p>\n<\/div>\n<p>Although the concept of the cloud had dated back to the 1960s, the arrival of AWS marked an important turning point, where the term <em>cloud computing<\/em> came into widespread use.<\/p>\n<p>The difference between AWS and traditional types of server hosting wasn&#8217;t the physical hardware itself but rather the way in which the service was delivered.<\/p>\n<p>This new model of cloud computing was characterised by the following features:<\/p>\n<ul class=\"blog\">\n<li><strong>Self-service:&nbsp;<\/strong>You can access, modify and manage your IT resources on demand without involvement of the cloud service provider \u2013 either through a web-based console or the <a href=\"#cli\" onclick=\"showEssentials()\">CLI<\/a>.<\/li>\n<li><strong>Pay as you go (PAYG):<\/strong> You only pay for the resources you use and receive a monthly bill based on your metered consumption.<\/li>\n<li><strong>Elastic: <\/strong>You can scale your resources up or down quickly and easily as your needs change.<\/li>\n<\/ul>\n<blockquote><p>\n<img loading=\"lazy\" decoding=\"async\" style=\"float:left; padding-top:0.4em; padding-right:14px; padding-bottom:3em;\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/double-quotes.webp\" alt=\"Double quotes symbol\" height=\"25\" width=\"28\"><\/p>\n<p style=\"margin-top: 1.5em;\">Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing.<\/p>\n<p style=\"margin-left: 41px;\"><strong>\u2013 Amazon Web Services (AWS)<\/strong><\/p>\n<\/blockquote>\n<h3 class=\"cloud-heading-3\">The Big Three Cloud Providers<\/h3>\n<div style=\"margin-top:2.2em;\">\n<a href=\"https:\/\/aws.amazon.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/AWS-Logo.webp\" class=\"CSP-logos\" alt=\"AWS logo\" width=\"85\" height=\"48\"><\/a><\/p>\n<h4 style=\"font-style:normal; display: inline\" class=\"cloud-heading-4\">AWS<\/h4>\n<p>The first and by far the largest cloud service provider in the world. It is also the most sophisticated cloud offering, with a choice of services and features to meet virtually any IT requirement.<\/p>\n<\/div>\n<p>The platform is strongly oriented towards the self-service concept of the cloud and has a very similar look and feel to the parent company&#8217;s retail website. If you start writing about the cloud, much of your focus will be on AWS.<\/p>\n<div style=\"margin-top:2.2em;\">\n<a href=\"https:\/\/azure.microsoft.com\/en-gb\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Microsoft-Azure-Logo.webp\" class=\"CSP-logos\" alt=\"Microsoft Azure logo\" width=\"85\" height=\"46\"><\/a><\/p>\n<h4 style=\"font-style:normal; display: inline\" class=\"cloud-heading-4\">Microsoft Azure<\/h4>\n<p>The strongest challenger to Amazon&#8217;s dominance of the public cloud market. The platform offers strength in depth and is a particularly good fit for businesses that already use other Microsoft technologies.<\/p>\n<\/div>\n<p>Microsoft&#8217;s approach to service delivery reflects the company&#8217;s heritage as a traditional computing service provider, generating much of its business through product bundling and an established network of sales representatives.<\/p>\n<div style=\"margin-top:2.2em;\">\n<a href=\"https:\/\/cloud.google.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Google-Cloud-Platform-Logo.webp\" class=\"CSP-logos\" alt=\"Google Cloud Platform logo\" width=\"85\" height=\"53\"><\/a><\/p>\n<h4 style=\"font-style:normal; display: inline\" class=\"cloud-heading-4\">Google Cloud Platform<\/h4>\n<p>Google is a relative newcomer to the public cloud marketplace and doesn&#8217;t yet offer the same scope of services as its two main competitors.<\/p>\n<\/div>\n<p>Nevertheless, the vendor has built up a strong customer base on its core strength of innovation. It leads the way in many cutting-edge technologies, such as <a href=\"#big-data\">big data<\/a>, analytics and machine learning. Like Amazon, Google&#8217;s offering is highly geared towards its self-service online portal.<\/p>\n<h3 class=\"cloud-heading-3\">Three Delivery Models of the Cloud<\/h3>\n<p>As you learn and write more about the cloud, you&#8217;ll frequently come across the terms <em>Infrastructure as a Service (IaaS)<\/em>, <em>Platform as a Service (PaaS)<\/em> and <em>Software as a Service (SaaS)<\/em>.<\/p>\n<p>These represent the three basic categories or delivery models of cloud computing.<\/p>\n<p>They&#8217;re also known as the three layers of the cloud, as each category of service sits on top of the other, as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/IaaS-Icon.webp\" class=\"cloud-model-icon\" alt=\"Cloud with IaaS at Centre\" width=\"95\" height=\"54\"><strong>Infrastructure as a Service (IaaS):<\/strong> A category of cloud service, which provides you with the basic building blocks, such as servers, storage, networking resources and an operating system, for building your own virtual data centre in the cloud.<\/p>\n<p>All you really get is the raw ingredients for hosting your applications and that&#8217;s it. It&#8217;s down to you to configure and maintain your cloud environment \u2013 just as you would if it were your own on-premises <a href=\"#data-centre\" onclick=\"showEssentials()\">data centre<\/a>.<\/p>\n<p>IaaS offers you the freedom to customise your infrastructure to work the way you want. This is often important when you migrate existing applications to the cloud, as you may need to replicate your on-premises operating environment to make sure they work.<\/p>\n<p>Cloud service providers supplement their IaaS offerings with tools to manage your infrastructure. These include <strong>cost-monitoring<\/strong>, <strong>security<\/strong>, <strong>storage<\/strong> and <strong>backup and recovery<\/strong> services, many of which are also offered by third-party cloud partners.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/PaaS-Icon.webp\" class=\"cloud-model-icon\" alt=\"Cloud with PaaS at Centre\" width=\"95\" height=\"54\"><strong>Platform as a Service (PaaS):<\/strong> The second major layer or category of cloud service, built on top of IaaS, which provides developers with a pre-configured, fully managed environment for deploying code.<\/p>\n<p>PaaS speeds up the process of building applications by providing the frameworks developers need, such as a <strong>database management system<\/strong> or <strong>web server<\/strong>, for deploying their software. As a result, developers only need to worry about their code \u2013 without the headache of system configuration and maintenance.<\/p>\n<p>Some types of PaaS offering allow under-the-hood access to your underlying resources, such as the type and capacity of your storage. But others are <strong>serverless<\/strong>, where you don&#8217;t have any involvement with the underlying infrastructure.<\/p>\n<p>Despite the clear advantages, deploying your applications to PaaS increases the risk of <a href=\"#vendor-lock-in\">vendor lock-in<\/a>. This is where you become tied to a particular platform because of the difficulties involved in moving to another cloud vendor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/SaaS-Icon.webp\" class=\"cloud-model-icon\" alt=\"Cloud with SaaS at Centre\" width=\"95\" height=\"54\"><strong>Software as a Service (SaaS):<\/strong> The layer of the cloud we&#8217;re most familiar with, encompassing a vast array of new-generation applications and services, such as <strong>Dropbox<\/strong>, <strong>iCloud<\/strong>, <strong>Netflix<\/strong>, <strong>Microsoft Office 365&nbsp;<\/strong>and <strong>Adobe Creative Cloud<\/strong>.<\/p>\n<p>SaaS applications are cloud-based software built on top of either PaaS or directly on top of an IaaS environment. SaaS providers manage their applications centrally and grant access to their services over the Internet on a PAYG subscription basis.<\/p>\n<p>SaaS applications typically use a <strong>multi-tenant design<\/strong>, whereby a single instance of the software serves more than one customer at the same time. This contrasts with the traditional <strong>single-tenant model<\/strong> \u2013 where you purchase your own copy of the software and install it on your machine for your own exclusive use.<\/p>\n<div class=\"desktop-only\">\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/IaaS-vs-PaaS-vs-SaaS.webp\" alt=\"IaaS vs PaaS vs SaaS - Ease of Control vs Ease of Management\" width=\"665\" height=\"292\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">Easier cloud management comes at the cost of freedom and control<\/p>\n<\/div>\n<\/div>\n<div class=\"mobile-only\">\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/IaaS-vs-PaaS-vs-SaaS-Mobile.webp\" alt=\"IaaS vs PaaS vs SaaS - Ease of Control vs Ease of Management\" width=\"414\" height=\"681\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">Easier cloud management comes at the cost of freedom and control<\/p>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"key-concepts\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">Key Cloud Computing Concepts<\/h2>\n<\/div>\n<p style=\"margin-bottom: 2px;\">Difficulty level<\/p>\n<p><meter class=\"difficulty-level\" title=\"Difficulty Level: Easy\" min=\"0\" max=\"7\" value=\"2\">2 out of 7<\/meter><br \/>\nNow we\u2019re going to dig deeper into how the cloud actually works.<\/p>\n<p>Let\u2019s do this by running through some of the key cloud concepts:<\/p>\n<h3 class=\"cloud-heading-3\">Virtualisation<\/h3>\n<p>By and large, when you develop a new application, it&#8217;s good practice to deploy it to a separate physical <a href=\"#server\" onclick=\"showEssentials()\">server<\/a>.<\/p>\n<p>You do this for a number of reasons.<\/p>\n<p>For example, if you host all your workloads on a single server they compete for resources. So if one application experiences a spike in <a href=\"#cpu\" onclick=\"showEssentials()\">CPU<\/a> or <a href=\"#memory\" onclick=\"showEssentials()\">memory<\/a> consumption, it will slow down everything else running on the same server.<\/p>\n<p>What&#8217;s more, if one application crashes and you need to reboot your machine, all other applications go down with it.<\/p>\n<p>Using different servers also isolates your applications, which can help reduce the spread of malicious damage in the event of a security breach.<\/p>\n<p>But all this comes at a cost.<\/p>\n<p>Many servers end up being underused, wasting computing resources.<\/p>\n<div class=\"desktop-only\">\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Server-Sprawl.webp\" alt=\"Server Sprawl\" width=\"550\" height=\"175\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">A fleet of servers running at a fraction of their potential<\/p>\n<\/div>\n<\/div>\n<div class=\"mobile-only mobile-width60\">\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Server-Sprawl-Mobile.webp\" alt=\"Server Sprawl\" width=\"414\" height=\"801\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">A fleet of servers running at a fraction of their potential<\/p>\n<\/div>\n<\/div>\n<p>To overcome the issue, a new technology emerged known as <em>virtualisation<\/em>.<\/p>\n<p>This involves breaking up one larger physical machine into a number of smaller <strong>virtual machines <\/strong>\u2013 where the underlying physical machine is known as the <em><u>host<\/u><\/em> and the virtual machines known as <em><u>guests<\/u><\/em>.<\/p>\n<p>Each virtual machine is an isolated operating environment with its own allocated storage, memory and <a href=\"#cpu\" onclick=\"showEssentials()\">processing<\/a> capacity. It has its own operating system and works just like an actual physical computer or server.<\/p>\n<blockquote style=\"padding-top: 2em; padding-bottom: 0.2em;\">\n<p style=\"margin: 0; padding:0;\"><img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Mac-Windows-Virtualisation.png\" alt=\"Apple Mac with Windows Logo Displayed on Screen\" title=\"Apple Mac running Windows\" width=\"100\" class=\"parallels\"><\/p>\n<p style=\"margin-bottom: 1em;\">The concept of <em>virtualisation<\/em> is familiar to many Mac owners who use emulation software, such as <a href=\"https:\/\/www.parallels.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Parallels Desktop<\/a> and <a href=\"https:\/\/www.vmware.com\/products\/fusion.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">VMware Fusion<\/a>.<\/p>\n<p style=\"margin-bottom: 2em;\">These applications allow you to run Windows or <a href=\"#linux\" onclick=\"showEssentials()\">Linux<\/a> as a virtual machine within your Mac without rebooting it.<\/p>\n<\/blockquote>\n<p><em>Virtualisation <\/em>also comes in other forms. For instance, <strong>storage virtualisation<\/strong> unifies storage from completely separate physical devices into what appears to be a single storage appliance. However, server virtualisation is currently the most common example of the technology.<\/p>\n<h3 id=\"hypervisor\" class=\"cloud-heading-3\">Hypervisor<\/h3>\n<p>The software that creates, runs and manages virtual machines. There are two broad categories of <em>hypervisor<\/em>:<\/p>\n<ul class=\"blog\">\n<li><strong>Type 1 (native\/bare metal):<\/strong> The software runs directly on the host hardware.<\/li>\n<li><strong>Type 2 (hosted):<\/strong> The software runs on the host operating system.<\/li>\n<\/ul>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Native-vs-Hosted-Hypervisor.webp\" alt=\"Diagram Highlighting the Pros and Cons of Type 1 and Type 2 Hypervisors\" width=\"665\" height=\"720\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Native-vs-Hosted-Hypervisor-Mobile.webp\" alt=\"Diagram Highlighting the Pros and Cons of Type 1 and Type 2 Hypervisors\" width=\"414\" height=\"1762\" class=\"auto-scale-center\"><\/p>\n<h3 id=\"instance\" class=\"cloud-heading-3\">Instance<\/h3>\n<p>An<em> instance <\/em>is basically another name for a virtual machine. By and large, you can use the terms interchangeably. However, the term <em>instance<\/em> is far more strongly associated with the cloud.<\/p>\n<p><em>Instances<\/em> are one of the core services provided by public cloud vendors. They&#8217;re available in a wide variety of machine types, each with different amounts of CPU and memory suited to different price points and applications.<\/p>\n<p>Some types of <em>instance<\/em> provide integrated <strong>local storage<\/strong>, which comes as part of the machine. These specialist <em>instances<\/em> are targeted at applications where fast access to storage is essential. However, local storage is temporary, existing only as long as the <em>instance<\/em> is running.<\/p>\n<p>With other types of <em>instance<\/em>, you have to purchase external storage separately.<\/p>\n<p>Cloud service providers organise their <em>instances<\/em> into groups of different-sized machines, which share similar performance characteristics.<\/p>\n<p>For example, <strong>general-purpose instances<\/strong> provide a balanced mix of CPU and memory. By contrast, <strong>compute-optimised instances<\/strong> are aimed at applications that use a lot of processing power and come with a higher proportion of CPU.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Google-Standard-Instance-Family.jpg\" alt=\"List of Standard Machine Types on Google Cloud Platform\" title=\"Each Step Up in Instance Size Offers Twice the CPU and RAM Capacity\" width=\"665\" height=\"546\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">Google\u2019s family of general-purpose instances<\/p>\n<\/div>\n<p>You can manually launch an <em>instance<\/em> in two different ways \u2013 either through your cloud provider\u2019s online portal or through their <a href=\"#cli\" onclick=\"showEssentials()\">command-line interface (CLI)<\/a>.<\/p>\n<p>Once you&#8217;ve launched your machine, and it&#8217;s up and running in the cloud, you&#8217;ll need to set up a connection to it.<\/p>\n<p>You do this using a program on your computer known as an <a href=\"https:\/\/www.ucl.ac.uk\/isd\/services\/research-it\/research-data-services\/data-storage-service\/storage-access-guide\/what-ssh-and\" rel=\"noopener noreferrer\" target=\"_blank\">SSH client<\/a>, which allows two computers to communicate with each other over a secure connection.<\/p>\n<p>Cloud vendors provide you with the details you need to connect to your virtual machine, which include the IP address and SSH access credentials for the <em>instance<\/em>.<\/p>\n<blockquote itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\">\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Learn-More-Callout.png\" class=\"callout-image\" alt=\"Education Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Learn More<\/strong><\/div>\n<p><span itemprop=\"description\">Want to see how you launch and connect to an <em>instance<\/em> in practice? Then check out this YouTube video, which shows you how to spin up and connect to an Ubuntu <em>instance<\/em> on AWS<\/span>:<meta itemprop=\"duration\" content=\"PT22M6S\" \/><meta itemprop=\"name\" content=\"How to Launch an EC2 Instance on AWS\" \/><meta <meta itemprop=\"thumbnailUrl\" content=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2023\/01\/AWS-Console.jpg\" \/><meta itemprop=\"uploadDate\" content=\"2019-06-24T00:00:00+01:00\" \/><\/p>\n<p align=\"center\" id=\"instanceSpinup\"><iframe loading=\"lazy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/hPDL9yIlZEk\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen=\"\"><\/iframe><\/p>\n<\/blockquote>\n<p>By default, you communicate with your <em>instances<\/em> via the CLI. However, it&#8217;s also possible to access a virtual machine through a <a href=\"#gui\" onclick=\"showEssentials()\">graphical-user interface (GUI)<\/a> by using what&#8217;s known as <strong>remote desktop client software<\/strong>.<\/p>\n<h3 id=\"machine-image\" class=\"cloud-heading-3\">Machine Image<\/h3>\n<p>Imagine you could buy a home computer with all the applications and settings you want already configured and good to go.<\/p>\n<p>Just think how much time you&#8217;d save.<\/p>\n<p>You wouldn&#8217;t have to waste hours installing Microsoft Office, Adobe Acrobat Reader, Firefox, antivirus software, printer drivers or whatever else you need.<\/p>\n<p><em>Machine images<\/em> solve a very similar problem for public cloud users.<\/p>\n<p>They help developers hit the ground running by allowing them to launch an instance that&#8217;s preconfigured with the operating environment they need to build their applications.<\/p>\n<p>Basic <em>machine images<\/em> simply provide the operating system \u2013 usually either a <span>Linux<\/span> or Windows server. Some come preinstalled with a database management system. Others come with a full application stack that&#8217;s available for immediate deployment \u2013 such as a ready-to-use <a href=\"https:\/\/www.one.com\/en\/wordpress-hosting\/what-is-wordpress\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">WordPress<\/a> installation or eCommerce platform.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/AWS-Marketplace-Machine-Images.jpg\" alt=\"Screenshot from the AWS Marketplace\" width=\"665\" height=\"461\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">A selection of ready-to-use CMS machine images on the AWS Marketplace<\/p>\n<\/div>\n<p>In simple terms, a <em>machine image<\/em> is a snapshot or static copy of a virtual machine, which you can use as a template for creating new live instances.<\/p>\n<p>You can create snapshots of your own instances and use them as <em>machine images<\/em>. You can then use them to replicate the same operational setup over and over again.<\/p>\n<p>This can play a particularly useful role in system backups. Because if your instance fails you can replace it with a new one based on the same <em>machine image<\/em>.<\/p>\n<h3 id=\"microservices\" class=\"cloud-heading-3\">Microservices<\/h3>\n<p>A new <span id=\"distributed-computing\">distributed<\/span> approach to application design that&#8217;s particularly well suited to the cloud.<\/p>\n<p>Whereas traditional applications run on a single system, modern cloud applications are broken up into a series of smaller tasks known as <em>microservices<\/em>, each deployed to their own virtual machine.<\/p>\n<blockquote><p><strong>Containers<\/strong><\/p>\n<p>It&#8217;s also possible to deploy <em>microservices<\/em> to even smaller server environments known as containers. Containers are an emerging technology that use an alternative virtualisation approach to virtual machines.<\/p><\/blockquote>\n<p>You can tailor each virtual machine to the resource consumption of the specific <em>microservice<\/em>. For example, one task may consume a lot of memory, requiring a large memory-optimised instance. Another may have only modest resource overhead, requiring only a small general-purpose machine.<\/p>\n<p>You can also allocate the same <em>microservice<\/em> to more than one virtual machine and use a device known as a <strong>load balancer<\/strong> to distribute requests across your group of target instances.<\/p>\n<p>This speeds up your application by allowing it to serve more than one user at the same time. It also improves the resiliency of your application, as it can continue to serve requests if one of your <em>microservices<\/em> fails and needs a server reboot.<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Load-Balancing-Microservices.webp\" alt=\"A Load Balancer Distributing Requests to Cloud Microservices\" width=\"400\" height=\"430\" class=\"auto-scale-center\"><\/p>\n<h3 class=\"cloud-heading-3\">Vertical Scaling<\/h3>\n<p>Remember how we said you could scale your cloud resources quickly and easily as your requirements change?<\/p>\n<p>Well, you can do this in two different ways \u2013 either vertically or horizontally.<\/p>\n<p><em>Vertical scaling<\/em> means moving your workloads to larger or smaller virtual machines. This tends to be a more expensive scaling approach, as you&#8217;re tied to your cloud vendor&#8217;s fixed set of machine sizes. As a result, you often have to switch to a much larger machine just to accommodate a modest additional load.<\/p>\n<p>What&#8217;s more, you can only scale up to the largest instance size available, which isn&#8217;t much use if you have applications that handle particularly large workloads.<\/p>\n<p>Nevertheless, <em>vertical scaling<\/em> is the only viable option for many older applications that were designed to run on a single machine.<\/p>\n<h3 class=\"cloud-heading-3\">Horizontal Scaling<\/h3>\n<p>A method of scaling your infrastructure by adding or removing machines.<\/p>\n<p><em>Horizontal scaling<\/em> lends itself particularly well to modern distributed applications made up of smaller <a href=\"#microservices\">microservices<\/a> deployed to separate virtual machines.<\/p>\n<p>It is generally more cost-efficient than vertical scaling, as you can host your application on a network of smaller instances and scale in or out by much smaller increments. This gives you finer control over your resources and helps reduce your expenditure on unnecessary infrastructure.<\/p>\n<p>Most cloud vendors support <strong>auto scaling<\/strong> \u2013 a horizontal scaling feature, which automatically increases or decreases the number of instances in your cluster as the load on your application changes.<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Vertical-vs-Horizontal-Scaling.webp\" alt=\"Difference between Vertical and Horizontal Scaling\" width=\"500\" height=\"400\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Vertical-vs-Horizontal-Scaling-Mobile.webp\" alt=\"Difference between Vertical and Horizontal Scaling\" width=\"414\" height=\"2512\" class=\"auto-scale-center\"><\/p>\n<\/section>\n<section>\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">Advantages of the Cloud<\/h2>\n<\/div>\n<p>OK, we now understand the basics of cloud computing.<\/p>\n<p>But why exactly is it so popular?<\/p>\n<p>Let&#8217;s check out the main advantages it has to offer:<\/p>\n<div class=\"advantages-section\">\n<table style=\"font-size: 110%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Plus-Sign.png\" class=\"plus-sign\" alt=\"Green Plus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Lower Barrier to Entry<\/h3>\n<p>You don&#8217;t have to invest in expensive hardware to host your applications. So the financial risk of starting new IT projects is much lower. This makes the cloud particularly appealing to business start-ups and also helps drive innovation.<\/td>\n<\/tr>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Plus-Sign.png\" class=\"plus-sign\" alt=\"Green Plus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Faster Development<\/h3>\n<p>It can take weeks or months to procure new on-premises hardware. But you can provision cloud infrastructure at the click of a button.<\/p>\n<p>Moreover, the cloud has spawned a large ecosystem of new software development technologies. These are helping companies to build applications more quickly and efficiently, giving them a competitive edge over traditional IT users.<\/td>\n<\/tr>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Plus-Sign.png\" class=\"plus-sign\" alt=\"Green Plus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Reduced Running Cost<\/h3>\n<p>When you purchase an on-premises server, you have to make provision for spikes in demand and future growth. So you typically end up buying hardware with far greater capacity than you generally need.<\/p>\n<p>But, with the cloud, you just pay for what you need at any given time and only purchase extra capacity for temporary peaks in demand. This makes it a more efficient way to consume IT.<\/td>\n<\/tr>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Plus-Sign.png\" class=\"plus-sign\" alt=\"Green Plus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">High Availability and Reliability<\/h3>\n<p>If a centipede loses a leg, it still has plenty more to fall back on.<\/p>\n<p>Public cloud platforms work in a similar way. They use highly resilient distributed designs to ensure that, when a server goes down, their services continue to operate normally.<\/p>\n<p>By contrast, on-premises systems typically share the load between far fewer physical machines. This makes them more vulnerable to failure and lengthy downtime.<\/p>\n<p>What&#8217;s more, unlike traditional computer programs, you can roll out software updates and patches to a distributed cloud application without shutting it down completely.<\/td>\n<\/tr>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Plus-Sign.png\" class=\"plus-sign\" alt=\"Green Plus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Better Security<\/h3>\n<p>The leading cloud vendors have a wealth of security expertise at their disposal \u2013 far more than most companies can ever hope to provide in-house.<\/p>\n<p>That means they can offer more advanced protection than traditional IT environments through robust frameworks for securing your infrastructure.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"heading2-wrapper\" style=\"margin-top: 1.25em;\">\n<h2 class=\"cloud-heading-2\">Disadvantages of the Cloud<\/h2>\n<\/div>\n<p>For all the benefits of cloud computing, it still comes with a few drawbacks:<\/p>\n<div class=\"disadvantages-section\">\n<table style=\"font-size: 110%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Minus-Sign.png\" class=\"minus-sign\" alt=\"Red Minus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Complex Management<\/h3>\n<p>In a traditional on-premises data centre you only have to manage a relatively small number of servers.<\/p>\n<p>But cloud infrastructure is altogether different.<\/p>\n<p>It is a complex and dynamic IT environment, where users are continually spinning up, scaling and closing down instances as well as accessing other services, such as storage, load balancing and databases.<\/p>\n<p>They can easily rack up unnecessary costs by forgetting to shut down unused resources or provisioning far more infrastructure than they actually need. Operations and security teams can overlook the warning signs of a possible malicious attack. And failed backups can go unnoticed.<\/p>\n<p>To maintain visibility over the complex array of moving parts, many cloud users have to invest in sophisticated monitoring tools to keep a lid on costs, manage system performance and protect their data.<\/td>\n<\/tr>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Minus-Sign.png\" class=\"minus-sign\" alt=\"Red Minus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Slow Performance<\/h3>\n<p>A fast and reliable network connection is essential to the optimal performance of cloud-based applications \u2013 something the public Internet cannot guarantee.<\/p>\n<p>To overcome the problem, some customers use a <a href=\"https:\/\/searchcloudcomputing.techtarget.com\/tip\/Boost-public-cloud-reliability-through-direct-connections\" rel=\"noopener noreferrer\" target=\"_blank\">dedicated network connection<\/a>. This provides a faster, more reliable and more secure connection directly between their cloud and on-premises data centre.<\/p>\n<p>However, a dedicated network is far too expensive for most small-scale cloud operations and can only improve the performance of applications that rely on internal network traffic.<\/p>\n<p>Another reason for slow cloud performance is poor application design. This often happens when companies migrate their on-premises applications directly to the cloud without adapting them to suit their new operating environment.<\/td>\n<\/tr>\n<tr>\n<td class=\"bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Minus-Sign.png\" class=\"minus-sign\" alt=\"Red Minus Sign\" width=\"27\" height=\"27\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 id=\"vendor-lock-in\" class=\"bullet-heading-3\">Vendor Lock-In<\/h3>\n<p>Each cloud platform has its own specific protocols and technologies, which often make it difficult to switch to another provider.<\/p>\n<p>Not only that, but they also charge for transferring data out of their clouds. So customers may still feel tied to the same vendor, even in cases where switching is relatively simple.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/section>\n<section>\n<div class=\"heading2-wrapper\" style=\"margin-top: 1.25em;\">\n<h2 class=\"cloud-heading-2\">More Cloud Essentials<\/h2>\n<\/div>\n<p style=\"margin-bottom: 2px;\">Difficulty level<\/p>\n<p><meter class=\"difficulty-level\" title=\"Difficulty Level: Moderate\" min=\"0\" max=\"7\" value=\"3\">3 out of 7<\/meter><br \/>\n<a href=\"#training\">Skip this section<span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><\/p>\n<p>Let\u2019s finish our introduction to the cloud by exploring a few more important concepts.<\/p>\n<h3 id=\"failover\" class=\"cloud-heading-3\">Failover<\/h3>\n<p><em>Failover<\/em> is an operational backup measure that can help keep your systems running in the event of a cloud service outage.<\/p>\n<p>Although the leading cloud providers maintain levels of service availability few in-house IT departments can match, <a href=\"https:\/\/searchdisasterrecovery.techtarget.com\/definition\/cloud-outage\" rel=\"noopener noreferrer\" target=\"_blank\">service interruptions<\/a> can and do still happen.<\/p>\n<p>So, to maintain business continuity, mission-critical applications such as banking systems and large online retail stores use failover mechanisms that switch to a secondary standby cloud environment if their primary infrastructure fails.<\/p>\n<p>Different applications use different types of failover architecture depending on:<\/p>\n<ul class=\"blog\">\n<li><strong>Cost:<\/strong> A highly resilient and complex failover architecture is generally more expensive than a basic standby system.<\/li>\n<li><strong>Downtime:<\/strong> Some use cases will require 100% availability whereas others can tolerate a small amount of downtime to allow for recovery.<\/li>\n<li><strong>Performance:<\/strong> The secondary environment may have to meet the same level of performance as the primary system. Alternatively, it may be able to tolerate lower performance, as long as the application remains fully functional.<\/li>\n<\/ul>\n<p>Cloud vendors provide the means for <em>failover<\/em> through globally distributed networks of <strong>regions<\/strong> and <strong>availability zones<\/strong>.<\/p>\n<p>Regions are geographical groupings of data centres based in different physical locations across the world.<\/p>\n<div class=\"wp-caption aligncenter\"><a href=\"https:\/\/cloud.google.com\/about\/locations\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/google-cloud-regions.webp\" alt=\"Map of Google's Network of Cloud Regions across the World\" title=\"Click to Learn More about Google's Network of Cloud Locations\" width=\"550\" height=\"310\" style=\"max-width: 100%; height: auto;\"><\/a><\/p>\n<p class=\"wp-caption-text\">Google\u2019s network of cloud regions<\/p>\n<\/div>\n<p>Each region is made up of several physically separate data-centre locations known as <strong>zones<\/strong> or <strong>availability zones<\/strong>.<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Regions-vs-Availability-Zones.webp\" alt=\"Diagram Showing Two Cloud Regions, Comprising Two and Three Availability Zones Respectively\" width=\"550\" height=\"339\" class=\"auto-scale-center\"><\/p>\n<p>Cross-region <em>failover<\/em>, where you replicate an application across two different regions, provides a higher level of fault tolerance and stability than replication across two availability zones in the same region.<\/p>\n<p>However, it is more expensive. This is down to the cost of data transfer, which is generally higher between regions than between availability zones within a region.<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Simple-Failover-Architecture.webp\" alt=\"Behaviour of a Simple Failover System under Normal Operation and during an Outage\" width=\"665\" height=\"503\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Simple-Failover-Architecture-Mobile.webp\" alt=\"Behaviour of a Simple Failover System under Normal Operation and during an Outage\" width=\"414\" height=\"994\" class=\"auto-scale-center\"><\/p>\n<h3 id=\"DevOps\" class=\"cloud-heading-3\">DevOps<\/h3>\n<p><em>DevOps<\/em> is a concept that&#8217;s pretty hard to grasp at first. But, basically, it&#8217;s a new approach to IT that brings <a href=\"#operations\" onclick=\"showEssentials()\">operations<\/a> and <a href=\"#development\" onclick=\"showEssentials()\">development<\/a> more closely together towards a common goal.<\/p>\n<p>The role of operations is to keep IT systems running smoothly. The role of development is to push out new software, introducing new services and features as quickly as possible.<\/p>\n<p>But new software releases can be an operational headache, as they potentially undermine the stability and security of live computer systems. At the same time, development teams often feel innovation is being stifled by operations.<\/p>\n<p><em>DevOps<\/em> sets out to resolve the conflicting aims and objectives of the two IT functions \u2013 through a shared purpose of faster software development and improved application performance, security and reliability.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/DevOps.png\" alt=\"Venn Diagram with DevOps at the Intersection of Development and Operations\" width=\"300\" height=\"181\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">DevOps is a shared approach to application development and IT operations<\/p>\n<\/div>\n<p>The cloud and <em>DevOps <\/em>have a strong natural relationship with one another. This is because the architecture of cloud-based applications (the domain of development) is so closely intertwined with the underlying infrastructure (the domain of operations).<\/p>\n<p>Cloud vendors provide access to a wide range of tools to support <em>DevOps<\/em> practices. These come under a variety of different categories, which include:<\/p>\n<div class=\"devops-categories\">\n<table style=\"font-size: 108%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"devops-icon-set\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/DevOps-Collaboration-Icon.png\" class=\"devops-icon\" alt=\"Collaboration Icon\"><\/td>\n<td class=\"devops-text\">\n<h4 class=\"bullet-heading-4\">Collaboration<\/h4>\n<p>Solutions that facilitate communication, teamwork and project management in the planning, design, coding, testing and deployment process.<\/td>\n<\/tr>\n<tr>\n<td class=\"devops-icon-set\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/DevOps-Continuous-Integration-Icon.png\" class=\"devops-icon\" alt=\"Continuous Integration Icon\"><\/td>\n<td class=\"devops-text\">\n<h4 class=\"bullet-heading-4\">Continuous Integration (CI)<\/h4>\n<p>Code integration systems where developers working on the same project can merge their code changes into a central repository for regular testing.<\/p>\n<p>This makes it quicker and easier to identify bugs and coding conflicts, which become increasingly more difficult to resolve when coders work for longer periods in isolation.<\/td>\n<\/tr>\n<tr>\n<td class=\"devops-icon-set\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/DevOps-Continuous-Delivery-Icon.png\" class=\"devops-icon\" alt=\"Continuous Delivery Icon\"><\/td>\n<td class=\"devops-text\">\n<h4 class=\"bullet-heading-4\">Continuous Delivery (CD)<\/h4>\n<p>Automated software release systems that reduce the manual work involved in deploying new code to testing and live environments.<\/td>\n<\/tr>\n<tr>\n<td class=\"devops-icon-set\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/DevOps-Infrastructure-as-Code-Icon.png\" class=\"devops-icon\" alt=\"Infrastructure as Code (IAC) Icon\"><\/td>\n<td class=\"devops-text\">\n<h4 class=\"bullet-heading-4\">Infrastructure as Code (IaC)<\/h4>\n<p>Automated procedures that use templates for provisioning and managing infrastructure.<\/p>\n<p>You can use IaC tools to configure <a href=\"#machine-image\">machine images<\/a> and automatically roll out patches, updates and configuration changes to your servers.<\/p>\n<p>IaC tools help you provision and configure application environments more quickly, reliably and consistently than performing the same tasks manually.<\/td>\n<\/tr>\n<tr>\n<td class=\"devops-icon-set\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/DevOps-Continuous-Monitoring-Icon.png\" class=\"devops-icon\" alt=\"Continuous Monitoring Icon\"><\/td>\n<td class=\"devops-text\">\n<h4 class=\"bullet-heading-4\">Continuous Monitoring<\/h4>\n<p style=\"margin-bottom:0.4em;\">Products that help you quickly identify infrastructure and application issues that could impact the performance, security or stability of your IT systems.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h3 id=\"private-cloud\" class=\"cloud-heading-3\">Private Cloud<\/h3>\n<p>An <span>on-premises data-centre<\/span> environment in which shared pools of resources are virtualised in much the same way as the public cloud.<\/p>\n<p>A <em>private cloud<\/em> offers similar benefits to the public cloud, such as self-service provisioning, ease of scaling, higher levels of automation and more efficient use of hardware.<\/p>\n<p>An organisation will typically use a private instead of public cloud to:<\/p>\n<ul class=\"blog\">\n<li>Meet specific security requirements<\/li>\n<li>Comply with data privacy standards<\/li>\n<li>Maintain direct control over all its infrastructure<\/li>\n<\/ul>\n<p>However, building a <em>private cloud<\/em> is no easy challenge. So uptake is still relatively low compared with public cloud adoption.<\/p>\n<h3 id=\"hybrid-cloud\" class=\"cloud-heading-3\">Hybrid Cloud<\/h3>\n<p>An integrated environment of public cloud, private cloud and other on-premises infrastructure.<\/p>\n<p><em>Hybrid cloud<\/em> gives you the best of both worlds by offering more freedom to host applications based on cost, capacity, performance and regulatory requirements.<\/p>\n<p>For example, workloads that handle sensitive data may be better suited to your on-premises data centre. By contrast, an application with global reach would be a good fit for the public cloud.<\/p>\n<p>But one thing you should bear in mind.<\/p>\n<p><em>Hybrid cloud<\/em> isn&#8217;t simply a collective term for both public and private cloud environments. It implies some kind of orchestration or workload portability between them.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/03\/Hybrid-Cloud.png\" alt=\"Diagram of a Hybrid Cloud Containing a Private Cloud and Three Public Clouds\" width=\"410\" height=\"252\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">A hybrid cloud made up of more than one public cloud platform<\/p>\n<\/div>\n<p>Common use cases for <em>hybrid cloud<\/em> include:<\/p>\n<ul class=\"blog\">\n<li><strong>Cloud bursting:<\/strong> A method by which you offload some of your on-premises workload to the public cloud during peaks in demand.<\/li>\n<li><strong>Failover:<\/strong> An application architecture that uses private and public cloud as your primary and secondary environments respectively.<\/li>\n<li><strong>Data storage:<\/strong> A deployment where on-premises applications use cloud-based storage, which is easy to access from any company location in the world.<\/li>\n<\/ul>\n<p><em>Hybrid cloud<\/em> is often the stepping stone to wider public cloud adoption, providing a stopgap solution as companies gradually modernise their outdated systems.<\/p>\n<h3 id=\"multi-cloud\" class=\"cloud-heading-3\">Multi-Cloud<\/h3>\n<p>A wider umbrella term to describe two or more clouds that come under the same centralised management. A <em>multi-cloud<\/em> can be:<\/p>\n<ul class=\"blog\">\n<li><strong>Two or more public clouds:<\/strong> Without a <em><u>private<\/u><\/em> cloud.<\/li>\n<li><strong>A hybrid cloud:<\/strong> A <em><u>private<\/u><\/em> cloud and one or more <em><u>public<\/u><\/em> clouds.<\/li>\n<\/ul>\n<p>In other words, by definition, a hybrid cloud is also a <em>multi-cloud<\/em>.<\/p>\n<p>Like the hybrid model, the constituents of a <em>multi-cloud<\/em> may be integrated in some way. However, they don&#8217;t necessarily have to be.<\/p>\n<p>A multi-cloud environment helps you avoid the risk of putting all your IT eggs in one basket.<\/p>\n<p>You&#8217;re not reliant on a single cloud vendor. You can enhance protection against downtime by using different cloud providers in your <span id=\"failover\">failover<\/span> architecture. You can host each workload on the platform that&#8217;s best suited to your applications. And you can take advantage of the different pricing packages on offer.<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Public-vs-Private-vs-Hybrid-vs-Multi-Cloud.webp\" alt=\"Side-by-Side Comparison of the Four Types of Cloud\" width=\"575\" height=\"273\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Public-vs-Private-vs-Hybrid-vs-Multi-Cloud-Mobile.webp\" alt=\"Side-by-Side Comparison of the Four Types of Cloud\" width=\"414\" height=\"626\" class=\"auto-scale-center\"><\/p>\n<h3 id=\"api\" class=\"cloud-heading-3\">Application Programming Interface (API)<\/h3>\n<p>The means by which an application allows other programs to access selected parts of its internal functionality.<\/p>\n<p>An <em>API<\/em> is made up of two parts:<\/p>\n<ul class=\"blog\">\n<li><strong>Specification:<\/strong> A list of commands, known as <em>functions<\/em>, which developers can use to serve requests from other programs. Requests instruct the application to perform an action, such as retrieving, changing, adding or deleting data. An instance of a request is known as an <em>API call<\/em>, which must be in a format that conforms to the specification.<\/li>\n<li><strong>Interface:<\/strong> The actual software that executes API calls in line with the specification.<\/li>\n<\/ul>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/API.png\" alt=\"An API Acting as a Central Plug-In Point for External Applications\" width=\"300\" height=\"151\" class=\"auto-scale-center\"><\/p>\n<p><em>APIs<\/em> play a key role in the modern digital world by providing a way for different applications to talk to one another.<\/p>\n<p>For example, leading Internet players, such as <strong>Google,<\/strong> <strong>Facebook<\/strong> and <strong>Twitter<\/strong>, publish <em>APIs<\/em> so third-party developers can build applications and integrations that plug into their websites.<\/p>\n<p><em>APIs<\/em> are also a core component of the public cloud, allowing users to manage their cloud infrastructure programmatically through API calls from within their applications.<\/p>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/API-Key-Callout.png\" class=\"callout-image\" alt=\"Key Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">API Key<\/strong><\/div>\n<p>An API key is a&nbsp;form of secret token&nbsp;that some <em>APIs<\/em> use to authenticate requests. Their main purpose is to help prevent unauthorised users from gaining access and making changes to your data.<\/p><\/blockquote>\n<\/section>\n<section id=\"training\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">Where to Learn More<\/h2>\n<\/div>\n<p><a href=\"#cybersecurity\">Skip this section<span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><\/p>\n<p>So where do you learn more about cloud computing?<\/p>\n<p>Well that depends:<\/p>\n<ul class=\"blog\">\n<li><strong>If you&#8217;re still a relative newcomer: <\/strong>A formal training course will be the quickest and easiest way to learn.<\/li>\n<li><strong>If you&#8217;re already clued up on IT:<\/strong> You can go ahead and seek out your first writing assignment right now. Simply go where each project takes you, building up your cloud knowledge as you do so.<\/li>\n<\/ul>\n<p>In this section, we&#8217;ve compiled a list of learning resources for each of the two options.<\/p>\n<h3 class=\"cloud-heading-3\">Training<\/h3>\n<h4 class=\"cloud-heading-4\">Cloud Service Providers<\/h4>\n<p>Each cloud vendor offers both free online training and paid instructor-led courses, catering for all levels of expertise. Although beginner courses don&#8217;t require previous knowledge of the cloud, you&#8217;re generally expected to have some understanding of basic IT concepts.<\/p>\n<p>Some courses prepare you for certification exams. However, these are almost exclusively for cloud practitioners in technical roles.<\/p>\n<h5 class=\"cloud-heading-5\">AWS<\/h5>\n<p><a href=\"https:\/\/aws.amazon.com\/training\/course-descriptions\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/Cloud-Training-AWS.png\" class=\"training-logos\" width=\"150\" height=\"72\"><\/a>The AWS <a href=\"https:\/\/aws.amazon.com\/training\/course-descriptions\/\" rel=\"noopener noreferrer\" target=\"_blank\">training portal<\/a> contains a large library of free digital learning courses in five different languages. These are generally AWS-oriented with relatively few aimed at non-technical cloud professionals.<\/p>\n<p>To access content, you&#8217;ll need to sign in with a standard Amazon shopping account or, where applicable, an APN Partner account. These are distinctly separate from AWS accounts you use to access cloud services and the two different types of account aren&#8217;t linked in any way.<\/p>\n<h5 class=\"cloud-heading-5\">Microsoft Azure<\/h5>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/02\/Cloud-Training-Azure.png\" class=\"training-logos\" alt=\"Microsoft Azure Logo\" width=\"150\" height=\"75\"><\/a>Microsoft&#8217;s <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/\" rel=\"noopener noreferrer\" target=\"_blank\">learning zone<\/a> is well stocked with free online training resources in a wide variety of languages.<\/p>\n<p>Again, the vast majority of courses are specifically about Microsoft&#8217;s own cloud services. But you can also find several <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/browse\/?products=azure&amp;roles=business-user\" rel=\"noopener noreferrer\" target=\"_blank\">modules<\/a> on broader topics geared towards business users, writers, marketers and beginners.<\/p>\n<h5 class=\"cloud-heading-5\">Google Cloud Platform<\/h5>\n<p><a href=\"https:\/\/cloud.google.com\/training\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/Cloud-Training-Google-Cloud-Platform.png\" class=\"training-logos\" alt=\"Google Cloud Platform Logo\" width=\"150\" height=\"94\"><\/a>As with the other two leading cloud providers, most of the courses available through Google&#8217;s <a href=\"https:\/\/cloud.google.com\/training\" rel=\"noopener noreferrer\" target=\"_blank\">online training portal<\/a> are technically oriented.<\/p>\n<p>In addition to on-demand and instructor-led courses, it offers free <a href=\"https:\/\/cloud.google.com\/training\/free-labs\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">hands-on labs<\/a>. These give you guided tours of the platform, with step-by-step instructions to popular services and real-world use cases.<\/p>\n<p>To take a lab, you&#8217;ll need to create an account or sign in with your existing Google login details.<\/p>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Calendar-Callout.png\" class=\"callout-image\" alt=\"Calendar Icon\" width=\"30\" height=\"30\"><strong id=\"cloud-summits\" class=\"callout-heading\">Cloud Summits<\/strong><\/div>\n<p>Many leading players in the cloud computing business host regular conferences and events in major cities throughout the world. They&#8217;re a great opportunity to learn about the cloud, stay up to date with the latest technological developments and make new industry connections.<\/p>\n<p>Tickets generally don&#8217;t come cheap. However, <a href=\"https:\/\/aws.amazon.com\/events\/summits\/\" rel=\"noopener noreferrer\" target=\"_blank\">AWS Summits<\/a> are free to attend, take place in a wide choice of venues and offer a glut of talks, workshops and other learning activities.<\/p><\/blockquote>\n<h4 class=\"cloud-heading-4\" id=\"independent-training\">Independent Training Providers<\/h4>\n<p>One key advantage of vendor-neutral providers is that training material doesn&#8217;t just focus on one specific cloud platform \u2013 which means you can learn about all aspects of the cloud from a single place.<\/p>\n<p>However, no two training providers are the same. So it&#8217;s down to you to decide which suits you best.<\/p>\n<p>The following are three very different examples:<\/p>\n<h5 class=\"cloud-heading-5\">Cloud Academy<\/h5>\n<p><a href=\"https:\/\/cloudacademy.com\/\" id=\"trackAcademy\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/Cloud-Training-Cloud-Academy.png\" class=\"training-logos\" alt=\"Cloud Academy Logo\" width=\"150\" height=\"134\"><\/a><a href=\"https:\/\/cloudacademy.com\/\" id=\"trackAcademy\" rel=\"noopener noreferrer\" target=\"_blank\">Cloud Academy<\/a> is a highly sophisticated learning platform with a large catalogue of training resources covering all three main public cloud providers. It also offers a range of courses in complementary technologies, such as <a href=\"#DevOps\">DevOps<\/a>, machine learning and <a href=\"#big-data\">big data<\/a>.<\/p>\n<p>Cloud Academy caters mainly for business customers, who can customise learning paths to specific job roles and their company&#8217;s individual training needs. However, it also offers <a href=\"https:\/\/cloudacademy.com\/personal-trial\/\" id=\"trackAcademy\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">personal plans<\/a> for individuals.<\/p>\n<p>One of the key features of the platform is the wide range of hands-on labs, which give you practical experience of real-world cloud environments without having to set up an AWS, Azure or Google Cloud Platform account.<\/p>\n<p>Some of the material is also available as on-demand video, which you can watch on any device anywhere in the world.<\/p>\n<p>Pricing is based on a subscription model, where members get full access to all content on the platform.<\/p>\n<h5 class=\"cloud-heading-5\">A Cloud Guru<\/h5>\n<p><a href=\"https:\/\/acloud.guru\/\" id=\"trackGuru\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/Cloud-Training-Cloud-Guru.png\" class=\"training-logos\" alt=\"A Cloud Guru Logo\" width=\"150\" height=\"98\"><\/a><a href=\"https:\/\/acloud.guru\/\" id=\"trackGuru\" rel=\"noopener noreferrer\" target=\"_blank\">A Cloud Guru<\/a> is a more basic training portal, where each course is a series of easily-digestible streaming video lessons.<\/p>\n<p>A large proportion of the material currently focuses on AWS. But the company also offers a limited number of courses on Azure and Google Cloud Platform, as well as a range of other cloud technologies.<\/p>\n<p>The whole look and feel of A Cloud Guru is very youthful and informal. This won&#8217;t be to everyone&#8217;s taste. What&#8217;s more, the content is less detailed than other leading offerings. However, more importantly, it is easy to follow and to the point.<\/p>\n<p>A Cloud Guru caters for both individuals and business customers. You can purchase each course individually or pay a subscription to get unlimited access to the course catalogue.<\/p>\n<h5 class=\"cloud-heading-5\">QA<\/h5>\n<p><a href=\"https:\/\/www.qa.com\/\" id=\"trackQA\" rel=\"nofollow noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/11\/Cloud-Training-QA.png\" class=\"training-logos\" alt=\"QA Learning Logo\" width=\"150\" height=\"76\"><\/a><a href=\"https:\/\/www.qa.com\/\" id=\"trackQA\" rel=\"noopener noreferrer\" target=\"_blank\">QA<\/a> is a far more established training provider, offering both onsite training and more affordable online courses.<\/p>\n<p>The company caters particularly well for groups and those who learn better in an interactive classroom environment. It has learning centres across the UK, but can deliver onsite training to enterprise customers overseas. You can also join a live classroom via web conferencing from anywhere in the world.<\/p>\n<p>In addition, the company offers self-paced learning courses, which you can access anytime from any device. These use interactive software designed for individual learning.<\/p>\n<p>QA has a much wider choice of training across the full IT spectrum. So it&#8217;s your best bet if you need to supplement your cloud knowledge with skills such as coding and database query languages.<\/p>\n<h3 class=\"cloud-heading-3\">Other Learning Resources<\/h3>\n<p>Once you start writing about the cloud, you&#8217;ll find much of the information you need on the documentation pages of the leading cloud vendors. But you&#8217;ll often find no shortage of information elsewhere.<\/p>\n<p>The following are likely to be your most useful resources:<\/p>\n<div class=\"resources-section\" id=\"resources-section-1\">\n<div class=\"resource-light\">\n<h4 class=\"bullet-heading-4\">Reference Websites<\/h4>\n<p>The cloud computer industry has more than its fair share of technical terms and jargon. However, online IT reference sites<strong>, <\/strong>such as <a href=\"https:\/\/whatis.techtarget.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">WhatIs.com<\/a> and <a href=\"https:\/\/www.techopedia.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">Techopedia<\/a>, provide clear explanations to most of the terms you&#8217;re likely to encounter.<\/p>\n<p style=\"margin-bottom:0.25em;\">You&#8217;ll also find useful information on <a href=\"https:\/\/en.wikipedia.org\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Wikipedia<\/a> from time to time \u2013 although entries can be unnecessarily academic, pedantic and difficult to understand.<\/p>\n<\/div>\n<div class=\"resource-dark\">\n<h4 class=\"bullet-heading-4\">Online Magazines<\/h4>\n<p>Technology publications, such as <a href=\"https:\/\/www.computerweekly.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">Computer Weekly<\/a>, <a href=\"https:\/\/www.infoworld.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">InfoWorld<\/a> and <a href=\"https:\/\/www.cio.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">CIO<\/a>, offer high-level analysis of IT trends and issues.<\/p>\n<p>They&#8217;re a useful source of background information for content targeted at senior IT management level.<\/p>\n<p style=\"margin-bottom:0.25em;\">They&#8217;re also the place to find quotes for inclusion in white papers, as they accept guest contributions from leading authorities in the cloud computing industry.<\/p>\n<\/div>\n<\/div>\n<div class=\"resources-section\" id=\"resources-section-2\">\n<div class=\"resource-dark\">\n<h4 class=\"bullet-heading-4\">Q&amp;A Communities<\/h4>\n<p>By contrast with magazine-style websites, online forums, such as <a href=\"https:\/\/www.quora.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">Quora<\/a>, <a href=\"https:\/\/stackexchange.com\/sites#technology\" rel=\"noopener noreferrer\" target=\"_blank\">Stack Exchange<\/a> and <a href=\"https:\/\/www.reddit.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Reddit<\/a>, tend to focus on issues at ground level.<\/p>\n<p>Discussions can often provide information you cannot get anywhere else, as questions regularly come from everyday IT users about the practicalities of using the cloud.<\/p>\n<p style=\"margin-bottom:0.25em;\">You&#8217;ll also find a large number of questions from cloud beginners looking for someone to shed light on confusion about a specific technology.<\/p>\n<\/div>\n<div class=\"resource-light\">\n<h4 class=\"bullet-heading-4\">Free Online Books<\/h4>\n<p>eBook search engines, such as <a href=\"https:\/\/freecomputerbooks.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">FreeComputerBooks.com<\/a> and <a href=\"https:\/\/www.freetechbooks.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">FreeTechBooks<\/a>, list a huge number of free IT books, which you can download for free from the author&#8217;s or publisher&#8217;s website.<\/p>\n<p>You may have to dig quite deep to find the book you want, as neither website currently lists cloud computing as a main category on its home page.<\/p>\n<p style=\"margin-bottom:0.25em;\">Where possible, look for the most up-to-date books, as IT is a rapidly evolving industry \u2013 especially so in the field of cloud computing.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"cybersecurity\">\n<div class=\"heading2-wrapper\">\n<h2 id=\"cybersecurity\" class=\"cloud-heading-2\">Cybersecurity<\/h2>\n<\/div>\n<p style=\"margin-bottom: 2px;\">Difficulty level<\/p>\n<p><meter class=\"difficulty-level\" title=\"Difficulty Level: Fairly Hard\" min=\"0\" max=\"7\" value=\"4\">4 out of 7<\/meter><br \/>\n<a href=\"#big-data\">Skip this section<\/a><span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><\/p>\n<p>Technology is everywhere. And we&#8217;re using more and more of it.<\/p>\n<p>But more technology also means more opportunities for cybercriminals.<\/p>\n<p>As a result, the growth of cybercrime has been relentless. And it&#8217;s now <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-to-cost-the-world-8-trillion-annually-in-2023\" rel=\"noopener noreferrer\" target=\"_blank\">costing the global economy<\/a> trillions of dollars every year.<\/p>\n<p>At the same time, the supply of cybersecurity skills is struggling to keep up with demand. According to recent estimates by security training and certification body (ISC)<sup>2<\/sup>, the <a href=\"https:\/\/blog.isc2.org\/isc2_blog\/2018\/10\/cybersecurity-skills-shortage-soars-nearing-3-million.html\" rel=\"noopener noreferrer\" target=\"_blank\">worldwide shortage<\/a> of cybersecurity professionals is rapidly approaching three million.<\/p>\n<p>That&#8217;s a serious shortfall. But great news if you want to work in the cybersecurity industry \u2013 including freelance writing.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Global-Cybersecurity-Skills-Shortage.png\" alt=\"Shortage of Cybersecurity Skills across the World\" title=\"Estimated Shortfall of Cybersecurity Staff across the World\" width=\"491\" height=\"275\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">The global cybersecurity skills gap<br \/><span style=\"font-weight:normal; margin-top: 0.4em; display: block;\">(Image source: <a href=\"https:\/\/blog.isc2.org\/isc2_blog\/2018\/10\/cybersecurity-skills-shortage-soars-nearing-3-million.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">(ISC)<sup>2<\/sup><\/a>)<\/span><\/p>\n<\/div>\n<p>This section is a beginner&#8217;s guide to cybersecurity. It focuses on the knowledge you&#8217;ll need to take on your first writing assignment, as well as highlighting the key differences between on-premises and cloud-based security.<\/p>\n<h3 class=\"cloud-heading-3\">What Is Cybersecurity?<\/h3>\n<p>Cybersecurity is very broad in scope, ranging from very simple everyday protection measures, such as enforcing <strong>strong password <\/strong>policies, to advanced forensics requiring detailed knowledge of <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/cryptography\" rel=\"noopener noreferrer\" target=\"_blank\">cryptography<\/a>, computer networks, coding languages and operating systems.<\/p>\n<p>However, all aspects of cybersecurity share a common aim \u2013 to prevent malicious damage through unauthorised access to computers, servers, mobile devices, networks and electronic systems.<\/p>\n<p style=\"margin-bottom: 1em;\">The foundations of any robust cybersecurity strategy are made up of three essential components. These are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Cybersecurity-People.png\" class=\"cybersecurity-foundations\" alt=\"Headshot Icon\" width=\"30\" height=\"30\"><strong class=\"cybersecurity-foundations-heading\">People<\/strong>Cultivating a security mindset across your workforce by educating employees about their role in countering cyberthreats. For example:<\/p>\n<ul class=\"blog\" style=\"margin-bottom: 1em\">\n<li>Computer users should be aware of their everyday responsibilities, such as reporting suspicious email attachments and keeping sensitive data and login credentials confidential.<\/li>\n<li>Developers need to be aware of potential coding exploits and build resilience into their applications.<\/li>\n<li>Operations teams should enforce tight control over user access and privileges.<\/li>\n<li>Specialist cybersecurity staff need to keep up to date with the latest skills and cyberthreats.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Cybersecurity-Processes.png\" class=\"cybersecurity-foundations\" alt=\"Gears Icon\" width=\"30\" height=\"30\"><strong class=\"cybersecurity-foundations-heading\">Processes<\/strong>Developing, documenting and implementing appropriate security policies, frameworks and procedures. These typically include:<\/p>\n<ul class=\"blog\" style=\"margin-bottom: 1em\">\n<li>Classifying your data to help identify the level of protection it requires.<\/li>\n<li>Maintaining an <a href=\"https:\/\/www.gartner.com\/it-glossary\/identity-and-access-management-iam\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">identity and access management (IAM)<\/a> policy that limits access rights only to the systems and data users actually need.<\/li>\n<li>Keeping systems up to date with the latest security patches.<\/li>\n<li>Adopting a backup and recovery strategy to prevent data loss in the event of an attack.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Cybersecurity-Technology.png\" class=\"cybersecurity-foundations\" alt=\"Computer Icon\" width=\"30\" height=\"30\"><strong class=\"cybersecurity-foundations-heading\">Technology<\/strong>Providing the tools you need to secure your infrastructure, such as:<\/p>\n<ul class=\"blog\">\n<li>Monitoring and alerting tools to help you detect potential attacks.<\/li>\n<li>A firewall to prevent unsolicited traffic from entering or leaving your network.<\/li>\n<li>Automated workflows for deploying coding updates and managing configurations.<\/li>\n<li>A physical backup and recovery system.<\/li>\n<\/ul>\n<p>So now we&#8217;ve got the high-level overview out the way, let&#8217;s delve a little further.<\/p>\n<h3 class=\"cloud-heading-3\">Key Cybersecurity Concepts<\/h3>\n<p>The following are a few selected concepts to give you a feel for how cybersecurity works in general. They are equally important to both on-premises and cloud-based security.<\/p>\n<h4 id=\"password-hashing\" class=\"cloud-heading-4\">Password Hashing<\/h4>\n<p>A <u>one-way<\/u> cryptographic process that converts a password into an unreadable string of characters known as a <em>hash<\/em>. A good hashing algorithm will make it virtually impossible to convert a hash back to its original password.<\/p>\n<p>To make login systems more secure, password files only store passwords in hashed form.<\/p>\n<p>Whenever you enter your password on a website, the login system simply hashes it again and checks it against the version stored in the password file. If the two hashes match then it knows you&#8217;ve entered your password correctly.<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Password-Hashing.webp\" alt=\"Hash Function Converting Plain Text into an Unreadable String of Characters\" width=\"450\" height=\"252\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Password-Hashing-Mobile.webp\" alt=\"Hash Function Converting Plain Text into an Unreadable String of Characters\" width=\"414\" height=\"1253\" class=\"auto-scale-center\"><\/p>\n<h4 class=\"cloud-heading-4\">Brute-Force Attack<\/h4>\n<p>A trial-and-error method of gaining unauthorised access to systems, where a hacker makes repeated login attempts using different combinations of characters until they eventually hit upon the correct password, username or PIN.<\/p>\n<p>But this can take a HUGE amount of manual time and effort.<\/p>\n<p>So hackers use automated cracking software, which can perform more than a million guesses in just a second on a standard home laptop alone. Specially designed machines can run through billions of permutations a second.<\/p>\n<p>Login systems usually incorporate security measures to prevent <em>brute-force attacks<\/em> \u2013 such as locking you out after several unsuccessful login attempts or using some form of <a href=\"https:\/\/www.lifewire.com\/what-is-captcha-3486183\" rel=\"noopener noreferrer\" target=\"_blank\">CAPTCHA test<\/a> that prevents robots from completing online forms.<\/p>\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/reCAPTCHA.jpg\" alt=\"reCAPTCHA Checkbox\" width=\"350\" height=\"88\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">A reCAPTCHA checks you\u2019re human by tracking user behaviour in the background<\/p>\n<\/div>\n<p>To get around this, hackers need to steal the target password file first and then launch the <em>brute-force attack<\/em> offline.<\/p>\n<p>They also need to know what type of hashing function the login system uses. They can usually tell this from the length of the hashes. Alternatively, they may set up a dummy account and use the resulting hash to work out which algorithm created it.<\/p>\n<p>As password cracking is time-consuming and highly resource intensive, many hacking tools go for the low-hanging fruit before progressively working through all other combinations. For example, they may draw on:<\/p>\n<ul class=\"blog brute-force-techniques\">\n<li><strong>Dictionaries:<\/strong> Where the application tries every word in a list compiled from the dictionary.\n<p>The dictionary technique is often successful because so many people use everyday words that are easy to remember.<\/li>\n<li><strong>Rainbow tables: <\/strong>A huge and complex hash-reversing table, which the software uses to find plain-text possibilities that correspond to a hash.\n<p>Rainbow tables save having to hash each possible password, as the work has already been done in the table.<\/li>\n<li><strong>Common patterns:<\/strong> Using searches for common phrases and predictable keyword combinations, such as <em>letmein<\/em>, <em>qwerty<\/em> and <em>44556611<\/em>.\n<p>They can also exploit patterns in passwords with mixed upper-case, lower-case and numeric characters, such as <em>Mercedes77<\/em>, <em>Wyoming41<\/em> and <em>Watermelon53<\/em>, which all start with a capital letter and end with two digits.<\/li>\n<\/ul>\n<p>The longer your password and the more variation of character types, the longer it will take a hacker to crack it. And that means they&#8217;re far likelier to give up and move onto easier targets.<\/p>\n<table class=\"password-cracking\">\n<tbody>\n<tr>\n<th colspan=\"3\"><strong>Maximum Time to Crack a Password by Brute Force<\/strong><br \/>\n(At 15 Million Attempts per Second)<\/th>\n<\/tr>\n<tr>\n<td class=\"length\"><strong>Length<\/strong><\/td>\n<td class=\"complexity\"><strong>Complexity<\/strong><\/td>\n<td class=\"time\"><strong>Time<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"length\">4<\/td>\n<td class=\"complexity\">a\u2013z<\/td>\n<td class=\"time\">&lt; 1 second<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">4<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139 + symbols<\/td>\n<td class=\"time\">4.8 seconds<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">5<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z<\/td>\n<td class=\"time\">25 seconds<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">6<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139<\/td>\n<td class=\"time\">1 hour<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">6<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139 + symbols<\/td>\n<td class=\"time\">11 hours<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">7<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139 + symbols<\/td>\n<td class=\"time\">6 weeks<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">8<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139<\/td>\n<td class=\"time\">5 months<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">8<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139 + symbols<\/td>\n<td class=\"time\">10 years<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">9<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139 + symbols<\/td>\n<td class=\"time\">1000 years<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">10<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139<\/td>\n<td class=\"time\">1700 years<\/td>\n<\/tr>\n<tr>\n<td class=\"length\">10<\/td>\n<td class=\"complexity\">a\u2013z, A\u2013Z, 0\u20139 + symbols<\/td>\n<td class=\"time\">91,800 years<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">Data source: TopLine Strategies<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You should also avoid using the same password across each of your online accounts. Because once a hacker obtains the login details to one of your accounts they&#8217;ll have easy access to others.<\/p>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Padlock-Callout.png\" class=\"callout-image\" alt=\"Padlock Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Password Managers<\/strong><\/div>\n<p>Password management tools, such as <a href=\"https:\/\/www.lastpass.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">LastPass<\/a> and <a href=\"https:\/\/1password.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">1Password<\/a>, provide a secure central repository for storing all your different login credentials. They also offer security features, such as <strong>strong password<\/strong> generation and <strong>two-factor authentication (2FA)<\/strong>.<\/p>\n<p>A 2FA system secures your password vault by requiring an additional login step, such as entering a PIN sent to your mobile phone. This stops hackers from gaining access on the basis of your username and password alone.<\/p><\/blockquote>\n<h4 id=\"private-key-encryption\" class=\"cloud-heading-4\">Private-Key Encryption<\/h4>\n<p>A <u>two-way<\/u> cryptographic process that uses an encryption key to convert an electronic message into an unreadable string of characters known as <em>ciphertext<\/em>. The recipient can then convert the message back to its readable form using the same key.<\/p>\n<p><em>Private-key encryption<\/em> is highly efficient and plays an important role in securing communication over the Internet. However, the technology is rarely used in isolation.<\/p>\n<p>This is because both parties would first need to exchange the key over an unsecured connection. A hacker could potentially gain access to the key by intercepting the initial exchange. They could then use it to decrypt messages as well as encrypt and send new ones as if they were one of the original two parties.<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Private-Key-Encryption.webp\" alt=\"Diagram of How Private-Key Encryption Works\" width=\"450\" height=\"230\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Private-Key-Encryption-Mobile.webp\" alt=\"Diagram of How Private-Key Encryption Works\" width=\"414\" height=\"1433\" class=\"auto-scale-center\"><\/p>\n<p><em>Private-key encryption<\/em> is also known as <strong>symmetric encryption<\/strong> and <strong>secure-key encryption<\/strong>.<\/p>\n<h4 id=\"public-key-cryptography\" class=\"cloud-heading-4\">Public-Key Cryptography<\/h4>\n<p>A <u>two-way<\/u> cryptographic system that uses two types of key: a <strong>public key<\/strong> and a <strong>private key<\/strong>.<\/p>\n<p>You can share your public key&nbsp;with anyone. But private keys are always kept secret.<\/p>\n<p>Both the public and private key can perform encryption. However:<\/p>\n<ul class=\"blog\">\n<li><strong>When someone encrypts a message using your <u>public key<\/u><\/strong>: Only your <u>private key<\/u> can decrypt it.<\/li>\n<li><strong>When you encrypt a message using your <u>private key<\/u>:<\/strong> Anyone with your <u>public key<\/u> can decrypt it.<\/li>\n<\/ul>\n<p>These properties provide the basis of three very important applications of <em>public-key cryptography<\/em>: <strong>public-key encryption<\/strong>, <strong>digital signatures<\/strong> and <strong>digital certificates<\/strong>.<\/p>\n<h5 id=\"public-key-encryption\" class=\"cloud-heading-5\">Public-Key Encryption<\/h5>\n<p>With <em>public-key encryption<\/em>, two computers simply exchange each other&#8217;s public keys to set up a secure connection.<\/p>\n<p>To send someone a message, your computer encrypts it using the recipient&#8217;s public key. That message can be sent securely over an open network because only the intended recipient&#8217;s private key can decrypt it.<\/p>\n<p>In the same way, when someone sends you a message, their computer uses your public key \u2013 safe in the knowledge that only your private key can decrypt it.<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Public-Key-Encryption.webp\" alt=\"Diagram of How Public-Key Encryption Works\" width=\"450\" height=\"502\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Public-Key-Encryption-Mobile.webp\" alt=\"Diagram of How Public-Key Encryption Works\" width=\"414\" height=\"3291\" class=\"auto-scale-center\"><\/p>\n<p><em>Public-key encryption<\/em> plays an important role in the HTTPS protocol used by secure websites. Whenever you visit an HTTPS site, the web server and your browser automatically initiate a secure session by exchanging public keys in the background.<\/p>\n<p>However, <em>public-key encryption<\/em> comes with a downside.<\/p>\n<p>It&#8217;s far more complex and resource intensive than <a href=\"#private-key-encryption\">private-key encryption<\/a>. So it&#8217;s only used at the beginning of the session to exchange a unique one-time symmetric key between the two parties. This is then used for faster private-key encryption throughout the remainder of the message sequence.<\/p>\n<p><em>Public-key encryption<\/em> is also known as <strong>asymmetric encryption<\/strong>.<\/p>\n<h5 id=\"digital-signature\" class=\"cloud-heading-5\">Digital Signature<\/h5>\n<p>A <em>digital signature <\/em>is a cryptographic technique used to verify a digital document, message or piece of software belongs to the person or organisation that created it.<\/p>\n<p>It can also confirm the integrity of content by proving it couldn&#8217;t have been altered since it was originally created.<\/p>\n<p><em>Digital signatures <\/em>use the other important property of <a href=\"#public-key-cryptography\">public-key cryptography<\/a> \u2013 the fact that, when you encrypt a message using your private key, anyone with your public key can decrypt it.<\/p>\n<p>The signing process works by:<\/p>\n<ul class=\"blog\">\n<li>Converting the content into a <a href=\"#password-hashing\">hash<\/a><\/li>\n<li>Encrypting the hash using the owner&#8217;s private key to create the <em>digital signature<\/em><\/li>\n<li>Appending the signature to the plain-text version of the content<\/li>\n<\/ul>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Digital-Signing.webp\" alt=\"Diagram Showing How the Digital Signing Process Works\" width=\"665\" height=\"270\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Digital-Signing-Mobile.webp\" alt=\"Diagram Showing How the Digital Signing Process Works\" width=\"414\" height=\"2076\" class=\"auto-scale-center\"><\/p>\n<p>The verification process works by:<\/p>\n<ul class=\"blog\">\n<li>Converting the plain-text version of the signed content into a hash<\/li>\n<li>Obtaining the hash from the <em>digital signature<\/em> appended to the content by decrypting it using the owner&#8217;s public key<\/li>\n<li>Comparing the two hashes<\/li>\n<\/ul>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Digital-Signature-Verification.webp\" alt=\"Diagram Showing How Digital Signature Verification Works\" width=\"665\" height=\"384\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width80\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Digital-Signature-Verification-Mobile.webp\" alt=\"Diagram Showing How Digital Signature Verification Works\" width=\"414\" height=\"1448\" class=\"auto-scale-center\"><\/p>\n<p>If the two hashes are the same then the signature is valid. This match shows the signature was generated using the private key that corresponds to owner&#8217;s public key. Otherwise you&#8217;d end up with a different hash value when you decrypt it.<\/p>\n<p style=\"margin-bottom: 0.8em;\">If the hashes <em>don&#8217;t<\/em> match then either:<\/p>\n<table style=\"font-size: 120%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0.6em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"arrow-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"arrow-text-right\">\n<strong>The owner isn&#8217;t who they claim to be:<\/strong> Because the private key they used isn&#8217;t linked to the public key they presented.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin-bottom: 0.6em;\"><u>OR<\/u><\/p>\n<table style=\"font-size: 120%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0.4em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"arrow-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"arrow-text-right\">\n<strong>The content has been tampered with since it was signed:<\/strong> Because the <em>digital signature <\/em>is unique to the original content. If you used it to sign a document with even the slightest alteration, such as a change to a single letter, the two hashes would be totally different.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Finally, remember how we said <a href=\"#public-key-encryption\">public-key encryption<\/a> is far more complex and resource intensive than <a href=\"#private-key-encryption\">private-key encryption<\/a>?<\/p>\n<p>Well, likewise, it&#8217;s much slower and more complex than a one-way hash function.<\/p>\n<p>Moreover, hash functions convert the content into a fixed-length value. This is usually much shorter than the original plain-text version.<\/p>\n<p>That&#8217;s the reason for hashing the content first \u2013 because it reduces the load of encrypting and decrypting a potentially much larger document, message or piece of code.<\/p>\n<h5 class=\"cloud-heading-5\">Digital Certificate<\/h5>\n<p>A <em>digital certificate<\/em> provides a way to check the owner of a public key is, in fact, the person or organisation they claim they are.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Digital-Certificate.png\" alt=\"Physical Representation of a Digital Certificate\" width=\"257\" height=\"161\" id=\"digital-certificate\"><em>Digital certificates <\/em>are used by all HTTPS websites and include the following information:<\/p>\n<ul class=\"blog\">\n<li>Website owner&#8217;s public key<\/li>\n<li>URL of the website<\/li>\n<li><a href=\"#digital-signature\">Digital signature<\/a> of the issuer (the certificate authority)<\/li>\n<li>Details of the <strong>certificate authority <\/strong>that issued it<\/li>\n<li>Date from which it became valid<\/li>\n<li>Date on which it expires<\/li>\n<\/ul>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Query-Callout.png\" class=\"callout-image\" alt=\"Query Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">What Is a Certificate Authority?<\/strong><\/div>\n<p>A certificate authority or certification authority (CA) is a trusted third party that manages and issues <em>digital certificates<\/em> and public keys.<\/p>\n<p>Widely recognised examples of CAs include <a href=\"https:\/\/www.thawte.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Thawte<\/a>, <a href=\"https:\/\/www.geotrust.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">GeoTrust<\/a> and <a href=\"https:\/\/sectigo.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Sectigo<\/a>. Some CAs only provide <em>digital certificates<\/em> and related services while others provide a wide range of security products, such as <a href=\"https:\/\/searchsecurity.techtarget.com\/tip\/How-antivirus-software-works-Virus-detection-techniques\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">antivirus software<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=9GZlVOafYTg\" rel=\"noopener noreferrer\" target=\"_blank\">firewalls<\/a>.<\/p>\n<p>Anyone can effectively become a CA and issue <em>digital certificates<\/em>. So web browsers maintain lists of <em>digital certificates<\/em> belonging to those CAs they trust. These are known as root CAs.<\/p>\n<p>Browsers will only trust HTTPS websites with a <em>digital certificate<\/em> that has either been signed by a root CA or by an <a href=\"https:\/\/www.thesslstore.com\/blog\/root-certificates-intermediate\/\" rel=\"noopener noreferrer\" target=\"_blank\">intermediate CA<\/a> whose own <em>digital certificate<\/em> has been signed by a root CA.<\/p><\/blockquote>\n<p>CAs issue <em>digital certificates<\/em> by creating a plain-text version of the certificate content and signing it with their own private key.<\/p>\n<p>Whenever you visit a HTTPS website, the first thing your browser does is verify the <em>digital certificate<\/em>. In simple terms, it performs the following steps:<\/p>\n<ul class=\"blog\">\n<li>Checks the website address matches the address in the certificate<\/li>\n<li>Checks the period during which the certificate is valid<\/li>\n<li>Checks the issuer of the certificate is in its list of root CAs (or is an intermediate CA whose own <em>digital certificate<\/em> has been signed by a root CA)<\/li>\n<li>Converts the plain-text version of the certificate into a hash<\/li>\n<li>Fetches the public key from the CA&#8217;s own <em>digital certificate<\/em><\/li>\n<li>Obtains the hash from the CA&#8217;s signature in the<em> digital certificate<\/em> for the website by decrypting it using the CA&#8217;s public key<\/li>\n<li>Checks the two hashes for a match<\/li>\n<\/ul>\n<p class=\"p-centre-img desktop-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Digital-Certificate-Verification.webp\" alt=\"Diagram Showing How Browsers Verify Digital Certificates\" width=\"665\" height=\"459\" class=\"auto-scale-center\"><\/p>\n<p class=\"p-centre-img mobile-only\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Digital-Certificate-Verification-Mobile.webp\" alt=\"Diagram Showing How Browsers Verify Digital Certificates\" width=\"414\" height=\"1289\" class=\"auto-scale-center\"><\/p>\n<p>A <em>digital certificate<\/em> helps prevent <strong>man-in-the-middle attacks<\/strong>. This is where an attacker attempts to intercept your secure connection to a web server and impersonate the website by presenting a bogus certificate containing their own public key.<\/p>\n<p>However, your browser would reject it, because it only accepts certificates signed by CAs it trusts.<\/p>\n<p>This process forms part of what&#8217;s known as an <strong>SSL\/TLS handshake<\/strong>, which is performed every time you connect to an HTTPS website. The handshake involves several other initialisation steps, which include exchanging public keys and a shared one-time symmetric key.<\/p>\n<p>A <em>digital certificate<\/em> is also known as a <strong>public-key certificate<\/strong> and&nbsp;<strong>identity certificate<\/strong>.<\/p>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Query-Callout.png\" class=\"callout-image\" alt=\"Query Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">How Do Public-Key Algorithms Work?<\/strong><\/div>\n<p>As a cybersecurity writer, you wouldn&#8217;t be expected to know the inner workings of a cryptographic algorithm.<\/p>\n<p>All the same, it&#8217;s useful to have a basic idea of the underlying principle. In other words, the maths that makes it practically impossible for a hacker to work out the private key from the corresponding public key.<\/p>\n<p>In simple terms, the private key consists of two <strong>prime numbers<\/strong> (numbers that can only be divided by 1 or themselves, such as 3, 5, 7, 11 and 13) while the public key is generated from the result of multiplying these two numbers together. The prime numbers are referred to as <em>factors<\/em> and the result of the multiplication is known as the <em>product<\/em>.<\/p>\n<p>The security of the algorithm relies on the fact that:<\/p>\n<ul class=\"block-quote\">\n<li>The prime numbers used in the private key are very large.<\/li>\n<li>When you multiply two such numbers (to create the public key) you end up with a huge non-prime <em>product<\/em> with only those two possible <em>factors<\/em>.<\/li>\n<li>If you only know the <em>product<\/em>, it takes an incredible amount of computational work to figure out what the two corresponding prime numbers are.<\/li>\n<li>So much so that it can take even the largest of supercomputers years to solve them.<\/li>\n<\/ul>\n<\/blockquote>\n<h4 class=\"cloud-heading-4\">Attack Surface<\/h4>\n<p>The more application code you have running on a system, the more physical hardware you use and the more access points you provide to them, the higher the probability you&#8217;ll have some kind of security vulnerability.<\/p>\n<p>To describe this level of exposure, cybersecurity professionals use the term <em>attack surface<\/em>, which refers to the total number of entry points through which an attacker could potentially exploit a computer system.<\/p>\n<p>The term also takes into account the risk of attack from insiders. For example, rogue employees who could potentially abuse their access to an IT system.<\/p>\n<p><em>Attack surface<\/em> is a particularly important concern in the cloud.<\/p>\n<p>This is because cloud computing environments are dynamic. In other words, they&#8217;re continually changing, making it harder to maintain good cyber hygiene. What&#8217;s more, as users can spin up instances with just a few clicks, they can easily misconfigure them with insecure settings.<\/p>\n<p>As a result, cloud security tools take a different approach from traditional on-premises solutions. Although they still detect signs of an attack, they tend to be far more strongly geared towards reducing the <em>attack surface.<\/em><\/p>\n<p>They typically help you protect your cloud by identifying:<\/p>\n<ul class=\"blog\">\n<li>Unnecessary access points<\/li>\n<li>Unused instances<\/li>\n<li>Redundant storage volumes<\/li>\n<li>Weak password policies<\/li>\n<li>Obsolete user accounts<\/li>\n<li>Key changes to system configurations<\/li>\n<\/ul>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Further-Reading.webp\" class=\"callout-image\" alt=\"Book icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Further Reading<\/strong><\/div>\n<p>The following are resources for more advanced readers with knowledge of coding or database management. They explain how three common types of cyberattack work and how to prevent them.<strong>&nbsp;<\/strong><\/p>\n<ul class=\"block-quote\">\n<li><strong><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/denial-of-service\/\" rel=\"noopener noreferrer\" target=\"_blank\">Distributed Denial of Service (DDoS)<\/a>: <\/strong>This article discusses a type of attack in which hackers flood systems with huge numbers of server requests in a bid to bring them down.<\/li>\n<li><strong><a href=\"https:\/\/www.w3schools.com\/sql\/sql_injection.asp\" rel=\"noopener noreferrer\" target=\"_blank\">SQL Injection<\/a>:<\/strong> Here you&#8217;ll learn how a hacker can potentially submit malicious code in the input field of a web form to delete or access sensitive information in a database.<\/li>\n<li><strong><a href=\"https:\/\/www.rapid7.com\/fundamentals\/cross-site-scripting\/\" rel=\"noopener noreferrer\" target=\"_blank\">Cross-Site Scripting (XSS)<\/a>: <\/strong>This article explains another code injection technique, where an attacker dupes an unsuspecting user into loading a malicious script in their web browser.<\/li>\n<li><strong><a href=\"https:\/\/www.w3schools.com\/php\/php_form_validation.asp\" rel=\"noopener noreferrer\" target=\"_blank\">PHP Form Validation<\/a>:<\/strong> This tutorial shows developers how to prevent code injection attacks on PHP forms.<\/li>\n<\/ul>\n<\/blockquote>\n<p>In the next section, we look at the differences between on-premises and public cloud security in more detail.<\/p>\n<h3 class=\"cloud-heading-3\">On-Premises vs Cloud Security<\/h3>\n<p>In an on-premises data centre all your computing assets remain fixed pretty well most of the time. They only change significantly when you replace, upgrade or purchase new servers once in a while.<\/p>\n<p>Traditional security focuses on protecting these static <em>physical<\/em> environments.<\/p>\n<p>By contrast, your cloud infrastructure is a <em>virtual<\/em> environment, made up of lots of moving parts.<\/p>\n<p>You&#8217;re continually spinning up, closing down, scaling up and scaling down resources as the demand on your applications changes over time. So keeping tabs on your cloud inventory, knowing what you have running at any given time, is essential to cloud security.<\/p>\n<p>Moreover, just like the <a href=\"https:\/\/searchsecurity.techtarget.com\/tip\/How-antivirus-software-works-Virus-detection-techniques\" rel=\"noopener noreferrer\" target=\"_blank\">antivirus software<\/a> we use on our home computers, traditional security uses resource-hungry scanning methods.<\/p>\n<p>This is no big deal in on-premises data centre, which is exclusively for your own use. However, the cloud is shared multi-tenant infrastructure, where resource-intensive solutions can have a negative impact on other customers.<\/p>\n<p>But the multi-tenant model of the cloud has another much more important implication for security.<\/p>\n<p>When you host your applications within your own in-house data centre, you are responsible for all aspects of security. But, when you host them in the cloud, you hand over some of the responsibility to your cloud provider.<\/p>\n<p>So, to help customers understand their security obligations when using their platforms, cloud vendors use a set of guidelines known as a <strong>shared responsibility model<\/strong>.<\/p>\n<h4 class=\"cloud-heading-4\">Shared Responsibility Model<\/h4>\n<p>Cloud vendors go to great lengths to provide a secure platform for their users, maintaining tight controls over the physical security of their data centres and the services they offer.<\/p>\n<p>But they cannot be accountable for those aspects of security that are outside their control. For example, they&#8217;re not responsible for your application code or the access privileges you grant to your systems.<\/p>\n<p>What a shared responsibility model does is set out the obligations of each party, so customers are left in no doubt about their role in protecting their cloud deployments.<\/p>\n<p>Market leader <strong>AWS<\/strong> takes a particularly straightforward approach to differentiating roles of responsibility, as follows:<\/p>\n<ul class=\"blog\">\n<li><strong>Security <em><u>of<\/u><\/em> the cloud:<\/strong> The aspects of security for which AWS assumes responsibility. These include its host operating system and <a href=\"#hypervisor\">hypervisor<\/a>, the physical security of its facilities and the integrity of the tools it provides to customers.<\/li>\n<li><strong>Security <em><u>in<\/u><\/em> the cloud:<\/strong> Your responsibilities as an <a href=\"#iaas\">IaaS<\/a> customer. These include configuration of your network and other AWS services, the security of guest operating systems on your <a href=\"#instance\">virtual machines<\/a> and your own application software.<\/li>\n<\/ul>\n<div id=\"shared-responsibility\">\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/AWS-Shared-Responsibility-Model.png\" alt=\"AWS Shared Responsibility Model Outlining Responsibilities of Cloud Provider and Customer\" width=\"665\" height=\"364\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">AWS Shared Responsibility Model: Source <a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">AWS<\/a><\/p>\n<\/div>\n<\/div>\n<div id=\"shared-responsibility-mobile\">\n<div class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/AWS-Shared-Responsibility-Model-Mobile.png\" alt=\"AWS Shared Responsibility Model Outlining Responsibilities of Cloud Provider and Customer\" width=\"364\" height=\"665\" style=\"max-width: 100%; height: auto;\"><\/p>\n<p class=\"wp-caption-text\">AWS Shared Responsibility Model: Source <a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">AWS<\/a><\/p>\n<\/div>\n<\/div>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2021\/08\/Compliance-Rosette-Callout.png\" class=\"callout-image\" alt=\"Compliance Rosette Icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Regulatory Compliance<\/strong><\/div>\n<p>Many people in the IT industry mistakenly think regulatory compliance and cybersecurity are one and the same.<\/p>\n<p>Although the two disciplines are closely related, compliance is much wider in scope and focuses on meeting the requirements of a specific governmental or industry body.<\/p>\n<p>By contrast, cybersecurity is far less concerned with ticking boxes. Instead it focuses on the technicalities of securing your digital assets \u2013 which tend to be more specific to the individual needs of your organisation.<\/p><\/blockquote>\n<\/section>\n<section id=\"big-data\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">Big Data<\/h2>\n<\/div>\n<p style=\"margin-bottom: 2px;\">Difficulty level<\/p>\n<p><meter class=\"difficulty-level\" title=\"Difficulty Level: Moderate\" min=\"0\" max=\"7\" value=\"3\">3 out of 7<\/meter><br \/>\n<a href=\"#freelance-gigs\">Skip this section<span style=\"margin-right: 4px\"><\/span><svg width=\"14\" height=\"10\" xmlns=\"http:\/\/w3.org\" width=\"14\" height=\"10\" viewBox=\"0 3 25 18\" fill=\"none\" stroke=\"#1982d1\" stroke-width=\"4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\" role=\"img\" aria-labelledby=\"forward-arrow-title\"><title id=\"forward-arrow-title\">Right-pointing arrow<\/title><path d=\"m17 5 7 7-7 7\"><\/path><path d=\"M0 12h24\"><\/path><\/svg><\/a><\/p>\n<p>Data is fast becoming a hot commodity. And we\u2019re generating it at an exponential rate.<\/p>\n<p><strong>Google<\/strong> has indexed more than <a href=\"https:\/\/www.seroundtable.com\/google-130-trillion-pages-22985.html\" rel=\"noopener noreferrer\" target=\"_blank\">100 trillion websites<\/a> and serves more than <a href=\"https:\/\/searchengineland.com\/google-now-handles-2-999-trillion-searches-per-year-250247\" rel=\"noopener noreferrer\" target=\"_blank\">5 billion search queries<\/a> a day. <strong>Facebook<\/strong> currently has more than two billion monthly <a href=\"https:\/\/www.statista.com\/statistics\/264810\/number-of-monthly-active-facebook-users-worldwide\/\" rel=\"noopener noreferrer\" target=\"_blank\">active users<\/a>.<\/p>\n<p><strong>Amazon<\/strong> lists more than 500 million products on its US website alone.<\/p>\n<p>That&#8217;s a serious amount of data.<\/p>\n<p>So how on earth do they store it all? And why don&#8217;t their services grind to a halt under the sheer volume of data?<\/p>\n<p>Well, for starters, they couldn&#8217;t rely on traditional database solutions.<\/p>\n<p>These were designed to run on just a single server. And not even the largest of servers has anywhere near the capacity to host such a colossal amount of data.<\/p>\n<p>And another thing.<\/p>\n<p>The performance of a traditional database system reduces significantly as it increases in size.<\/p>\n<p>Think about it this way.<\/p>\n<p>It takes longer to find a number in a telephone directory than in a short list written on a note pad.<\/p>\n<p>In other words, it&#8217;s very quick to find a number in this:<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Number-List.jpg\" alt=\"List of Handwritten Numbers\" width=\"400\" height=\"216\" class=\"auto-scale-center\"><\/p>\n<p>But much slower in this:<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/Telephone-Book.jpg\" alt=\"Old-Fashioned Telephone Directory\" width=\"400\" height=\"257\" class=\"auto-scale-center\"><\/p>\n<p>Traditional databases work in exactly the same way. So the Internet giants had to come up with new solutions to get at all that data much more quickly.<\/p>\n<p>They developed <a href=\"#distributed-computing\">distributed computing<\/a> systems that could replicate data across a network of servers. This meant they could spread the workload of serving vast numbers of searchers, users or customers.<\/p>\n<p>Then they released their technologies to the wider world, giving other companies a way to manage data at epic scale.<\/p>\n<blockquote><p><strong>Leading Big Data Technologies<\/strong><\/p>\n<p>Once you start writing about big data, you&#8217;ll soon become familiar with many of the open-source projects that were originally developed by the leading Internet players.<\/p>\n<p>Created by Yahoo!, <a href=\"https:\/\/www.wired.com\/2011\/10\/how-yahoo-spawned-hadoop\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Hadoop<\/a> is one of the most widely used big data frameworks. But <strong>Google<\/strong>, <strong>Facebook<\/strong> and<strong> LinkedIn <\/strong>have also made substantial contributions \u2013 with <a href=\"https:\/\/searchcloudcomputing.techtarget.com\/definition\/MapReduce\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">MapReduce<\/a>, <a href=\"https:\/\/whatis.techtarget.com\/definition\/Cassandra-Apache-Cassandra\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Cassandra<\/a> and <a href=\"https:\/\/www.quora.com\/What-is-Apache-Kafka\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Kafka<\/a> respectively.<\/p><\/blockquote>\n<p>As a result, businesses went data crazy.<\/p>\n<p>Finally, they could get deeper insights into consumer behaviour, better target their marketing strategies and exploit new opportunities to improve the customer experience.<\/p>\n<p>At the same time, big data technology paved the way for interconnectivity and synchronization between personal computers and handheld devices. And it&#8217;s also been the driving force behind the <a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/Internet-of-Things-IoT\" target=\"_blank\">Internet of Things<\/a>.<\/p>\n<blockquote><p><strong>The Internet of Things (IoT)<\/strong><\/p>\n<p>The Internet of Things (IoT) is an umbrella term for the interconnected network of smart devices, machinery and appliances that are able to communicate and interact with each other over the Internet.<\/p>\n<p>The technology is set to transform our daily lives and is already making an impact in applications, such as:<\/p>\n<ul class=\"block-quote\">\n<li>Home automation<\/li>\n<li>Energy management<\/li>\n<li>Remote patient health monitoring<\/li>\n<li>Smart traffic management systems<\/li>\n<\/ul>\n<\/blockquote>\n<h3 class=\"cloud-heading-3\">What Is Big Data?<\/h3>\n<p>So what exactly is big data?<\/p>\n<p>Well, there&#8217;s no hard and fast definition.<\/p>\n<p>But, basically, you can distinguish it by the following three key characteristics:<\/p>\n<ul class=\"blog\">\n<li><strong>Volume: <\/strong>The huge scale of data.<\/li>\n<li><strong>Velocity:<\/strong> The sheer speed at which you can generate and process it.<\/li>\n<li><strong>Variety: <\/strong>The wide variety of data \u2013 from text and images to audio and video.<\/li>\n<\/ul>\n<p>What&#8217;s more, we also know that:<\/p>\n<ul class=\"blog\">\n<li>Traditional database solutions aren&#8217;t cut out to handle large volumes of data<\/li>\n<li>The Internet giants came up with <strong>distributed computing<\/strong> systems to overcome the problem<\/li>\n<\/ul>\n<p>But that still doesn&#8217;t tell us a great deal.<\/p>\n<p>So let&#8217;s take a closer look at how this all actually works.<\/p>\n<p>The following key database concepts help to explain just that:<\/p>\n<h3 class=\"cloud-heading-3\">CAP Theorem<\/h3>\n<p>This sounds pretty heavy. So let&#8217;s keep this really simple.<\/p>\n<p><a href=\"https:\/\/dzone.com\/articles\/better-explaining-cap-theorem\" rel=\"noopener noreferrer\" target=\"_blank\">CAP Theorem<\/a> is a principle that describes the behaviour of different types of distributed data store. By the term <em>distributed<\/em>, we mean data that&#8217;s stored across a network (cluster) of separate machines (nodes).<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Distributed-Data-Store.webp\" alt=\"Diagram of a Distributed Data Store\" width=\"400\" height=\"297\" class=\"auto-scale-center\"><\/p>\n<p>CAP stands for <strong>Consistency (C)<\/strong>, <strong>Availability (A)<\/strong> and <strong>Partition Tolerance (P)<\/strong>.<\/p>\n<p>Here&#8217;s what each of these terms mean.<\/p>\n<ul class=\"blog\">\n<li><strong>Consistency<\/strong><strong>:<\/strong> Each time you read data, it&#8217;s the most up-to-date version.<\/li>\n<li><strong>Availability: <\/strong>Data is readily available. In other words, every response to a read request is returned quickly and without an error.<\/li>\n<li><strong>Partition tolerance<\/strong><strong>:<\/strong> The data store will continue to function when there is a communication break (partition) between nodes in the cluster.<\/li>\n<\/ul>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Partition-Tolerance.webp\" alt=\"Distributed Data Store with a Communication Break between Two of the Nodes\" width=\"400\" height=\"310\" class=\"auto-scale-center\"><\/p>\n<p>Now <em>CAP Theorem<\/em> states that a distributed data store can only guarantee <u>two<\/u> of these <u>three<\/u> properties. In other words, if you want a data store that:<\/p>\n<ul class=\"blog\">\n<li><strong>Guarantees consistency:<\/strong> You can also guarantee availability <u>OR<\/u> partition tolerance but <u>NOT<\/u> both.<\/li>\n<li><strong>Guarantees availability:<\/strong> You can also guarantee consistency <u>OR<\/u> partition tolerance but <u>NOT<\/u> both.<\/li>\n<li><strong>Guarantees partition tolerance:<\/strong> You can also guarantee availability <u>OR<\/u> consistency but <u>NOT<\/u> both.<\/li>\n<\/ul>\n<p>So why is this so important in the field of big data?<\/p>\n<p>Because choosing a database solution is a matter of making sacrifices.<\/p>\n<p>In the case of a distributed data store, you have to have partition tolerance. If not, it would mean the whole system breaks if just one of the connections breaks.<\/p>\n<p>That&#8217;s not good.<\/p>\n<p>It would be like the entire rail network coming to a halt because of one failed signal.<\/p>\n<p>So what&#8217;s the bottom line?<\/p>\n<p><em>Because a big data database must be partition tolerant, it can guarantee either consistency <u>OR<\/u> availability. But <u>NOT<\/u> both.<\/em><\/p>\n<p><strong>Think about it:<\/strong><\/p>\n<ul class=\"blog\">\n<li>When data is updated at any one node, it must be rolled out to all the others before you can be sure it&#8217;s consistent. This introduces a delay, which means you can&#8217;t guarantee availability.<\/li>\n<li>When you make data instantly available at any one node, there could always be a more up-to-date version (on one or more other nodes) that hasn&#8217;t reached it yet. So you can&#8217;t guarantee consistency.<\/li>\n<\/ul>\n<p>On the other hand, a traditional database system only has one node. If that goes down, it means the whole lot has gone down. So it isn&#8217;t partition tolerant. But data is always available and always consistent.<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/CAP-Triangle.webp\" alt=\"Triangle Representing CAP Theorem with C, A and P at corners\" width=\"575\" height=\"413\" class=\"auto-scale-center\"><\/p>\n<h3 id=\"acid-transactions\" class=\"cloud-heading-3\">ACID Transactions<\/h3>\n<p>The best way to understand <em>ACID transactions<\/em> is to think about the potential pitfalls of an online banking system.<\/p>\n<p>So imagine, for example, you&#8217;re just transferring some money from your current account into your savings.<\/p>\n<p>A whole number of things could potentially go wrong:<\/p>\n<h4 class=\"cloud-heading-4\" style=\"margin-bottom: 1.2em;\">Scenario 1<\/h4>\n<ul class=\"blog\">\n<li>Your current account gets debited.<\/li>\n<li>But then, just as it does so, the server goes down and your savings account doesn&#8217;t get credited.<\/li>\n<\/ul>\n<p>As a result, you end up out of pocket.<\/p>\n<h4 class=\"cloud-heading-4\" style=\"margin-bottom: 1.2em;\">Scenario 2<\/h4>\n<ul class=\"blog\">\n<li>You make the above transfer into your savings. But this time, a friend pays money into your current account at the same time.<\/li>\n<li>Their transaction starts first.<\/li>\n<li>It reads your initial balance figure and calculates the new balance after payment.<\/li>\n<li>Meanwhile, the online banking system starts to process your own transfer. Your friend&#8217;s payment hasn&#8217;t yet completed. So it reads the same initial balance figure as above.<\/li>\n<li>While your transfer is processing, your friend&#8217;s payment completes and writes a new higher balance to your account.<\/li>\n<li>Your transfer completes and writes the new lower balance to your account.<\/li>\n<\/ul>\n<p><strong>But here&#8217;s the problem:<\/strong> Your transaction used the balance figure before your friend&#8217;s payment was written to your account. While it was processing, that balance figure had changed.<\/p>\n<p>So when it writes a new balance figure to your account, it is inaccurate. It hasn&#8217;t taken into account your friend&#8217;s payment that took place in the meantime.<\/p>\n<p>As a result, you end up out of pocket.<\/p>\n<h4 class=\"cloud-heading-4\" style=\"margin-bottom: 1.2em;\">Scenario 3<\/h4>\n<ul class=\"blog\">\n<li>Your current account gets debited and your savings account gets credited. In other words, your transfer is successful.<\/li>\n<li>A few minutes later, the online banking system crashes.<\/li>\n<li>The bank needs to rebuild its database from a backup.<\/li>\n<li>It uses a backup it took earlier in the day \u2013 before you made the transfer.<\/li>\n<\/ul>\n<p>As a result, the transaction doesn&#8217;t show up in your accounts. The transfer has vanished.<\/p>\n<h4 class=\"cloud-heading-4\">ACID Properties<\/h4>\n<p>Of course, in reality, banking systems have safeguards in place to prevent these things from happening. They use an ACID model of&nbsp;database design, which maintains the integrity of all transactions.<\/p>\n<p>ACID stands for:<\/p>\n<ul class=\"blog\">\n<li><strong>Atomicity:<\/strong> All changes in the transaction are performed OR none of them are.<\/li>\n<li><strong>Consistency:<\/strong> The data remains valid after the transaction. For example, in the above scenarios, the combined total balance of your current and savings accounts should be the same before and after the transaction. Otherwise the database reverts to its previous state.<\/li>\n<li><strong>Isolation:<\/strong> Simultaneous transactions do not interfere with each other and behave as if they&#8217;re processed one after another (in serial).<\/li>\n<li><strong>Durability:<\/strong> Each transaction must be logged in some way before new data is committed. This ensures all database changes can be recovered in the event of a system failure.<\/li>\n<\/ul>\n<p><em>ACID transactions<\/em> are one of the key features of traditional database systems. However, all the additional controls come with a performance overhead. So some new-generation databases designed for big data do not support them.<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/ACID-Transactions.png\" alt=\"Summary Table of ACID Properties\" width=\"400\" height=\"215\" class=\"auto-scale-center\"><\/p>\n<h3 class=\"cloud-heading-3\">Relational Databases<\/h3>\n<p>The relational database model has been the mainstay of traditional IT since it was first conceived in 1970 by British&nbsp;computer scientist&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Edgar_F._Codd\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Edgar F. Codd<\/a>.<\/p>\n<p>At its most basic level, a <em>relational database<\/em> is a collection of one or more tables, where:<\/p>\n<ul class=\"blog\">\n<li>A table contains data organised into a series of rows and columns.<\/li>\n<li>A row represents a set of related data, such as information about a customer, known as a record.<\/li>\n<li>A record consists of fields \u2013 one for each column of the table. Each item of data is stored in a field.<\/li>\n<li>A column represents data of the same type, such as <em>Customer ID<\/em>, <em>Name<\/em> and <em>Date of Birth<\/em>, and contains one value for each&nbsp;row&nbsp;of the table.<\/li>\n<\/ul>\n<p>Here&#8217;s what a very simple table might look like:<\/p>\n<p class=\"p-centre-img\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Relational-Database1.webp\" alt=\"A Database Table of Products\" class=\"aligncenter relational-databases\">\n<\/p>\n<p>However, in many cases, a database contains more than just a single table.<\/p>\n<p>For example, notice how vendor #25 appears more than once in the <em>vendor_id<\/em> column of the above table. It would be very inefficient to duplicate the full details about each vendor \u2013 especially in a large data set where they may be repeated many times over.<\/p>\n<p>So a database designer would typically create a separate table as follows:<\/p>\n<p class=\"p-centre-img\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Relational-Database2.webp\" alt=\"A Database Table of Vendors\" class=\"aligncenter relational-databases\">\n<\/p>\n<p>So why do we call these types of database <em>relational<\/em>?<\/p>\n<p>Because a database management system would arrange the above data in storage like this:<\/p>\n<div class=\"dbms-storage-method\">\n<p>001: 25, Premier Pharmacy Supplies, Falkirk;<\/p>\n<p>002: 30, Remington UK, Manchester;<\/p>\n<p>003: 31, DA Distributors, Halesowen;<\/p>\n<p>004: 36, Tena, Dunstable<\/p>\n<\/div>\n<p>Mathematicians call this method of organising data a <em>relation<\/em>.<\/p>\n<p>Hence the term <a href=\"https:\/\/www.youtube.com\/watch?v=zhu6jtlghIs\" rel=\"noopener noreferrer\" target=\"_blank\">relational database<\/a>.<\/p>\n<p>But, as humans, we find it much easier to visualise the same set of information in an abstracted two-dimensional form.<\/p>\n<p>Hence the term <em>table<\/em>.<\/p>\n<p>We&#8217;ll look at new big data alternatives to <em>relational databases<\/em> later. But, for now, here are some of the key characteristics of the traditional relational database model:<\/p>\n<ul class=\"blog\">\n<li><strong>Highly structured data:<\/strong> All records in any specific table contain the same clearly defined fields. At the same time, data in each field must be of the format specified for the column in which it belongs.<\/li>\n<li><strong>ACID support:<\/strong> Most relational database systems come with an implementation of <a href=\"#SQL\">SQL<\/a> that supports ACID transactions. So they&#8217;re primarily designed with data integrity in mind.<\/li>\n<li><strong>Data consistency:<\/strong> What you read is always the most up-to-date version.<\/li>\n<li><strong>Scaling<\/strong>: Deployments are limited to just a single server. So you can only scale your database <em>vertically<\/em> by upgrading your hardware. With larger databases, this can be particularly costly as you&#8217;ll need to rely on expensive high-end servers.<\/li>\n<\/ul>\n<p>Although new distributed databases have evolved to handle data at massive scale, <em>relational databases<\/em> remain the best choice for many everyday applications.<\/p>\n<p>They&#8217;re also still highly relevant to the big data discussion. All the more so, as new solutions are emerging that combine the data integrity of <em>relational databases<\/em> with the huge scaling capability of distributed systems.<\/p>\n<blockquote><p><strong>Advanced tip:<\/strong> One way to improve the performance of a large <em>relational database<\/em> is to split it up into smaller, faster and more manageable parts. This Quora <a href=\"https:\/\/www.quora.com\/What-is-the-difference-between-replication-partitioning-clustering-and-sharding\" rel=\"noopener noreferrer\" target=\"_blank\">discussion<\/a> covers the four different options.<\/p><\/blockquote>\n<h3 id=\"SQL\" class=\"cloud-heading-3\">Structured Query Language (SQL)<\/h3>\n<p><em>Structured Query Language (SQL)<\/em> is the standard computer language used to communicate with virtually all relational databases.<\/p>\n<p>Here&#8217;s what a very simple SQL query might look like:<\/p>\n<blockquote><p>SELECT * FROM product_catalog WHERE vendor_id = 25;<\/p><\/blockquote>\n<p>And here&#8217;s the result you&#8217;d get if you performed that query on our table <em>product_catalog<\/em> above:<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2019\/06\/SQL-Query.png\" alt=\"All Products in a Database Table with Vendor ID = 25\" width=\"575\" height=\"180\" class=\"auto-scale-center\"><\/p>\n<p><em>SQL<\/em> (pronounced either <em>SEQUEL <\/em>or <em>S-Q-L<\/em> as you prefer) has become synonymous with relational databases. So people often use the names <em>relational database<\/em> and <em>SQL database<\/em> interchangeably.<\/p>\n<p>If you want to learn more about <em>SQL<\/em>,&nbsp;or just get a better feel for how it works, then check out this <a href=\"https:\/\/www.w3schools.com\/sql\/\" rel=\"noopener noreferrer\" target=\"_blank\">tutorial<\/a> at w3schools.com. You can also experiment with <a href=\"https:\/\/support.office.com\/en-us\/article\/access-sql-basic-concepts-vocabulary-and-syntax-444d0303-cde1-424e-9a74-e8dc3e460671\" rel=\"noopener noreferrer\" target=\"_blank\">SQL queries<\/a> if you have <a href=\"https:\/\/products.office.com\/en-gb\/access\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Microsoft Access<\/a>, which comes with the desktop version of Microsoft Office for Windows and a number of Office 365 subscriptions.<\/p>\n<h3 class=\"cloud-heading-3\">Row-Based Storage<\/h3>\n<p>By and large, relational databases use <em>row-based storage<\/em>.<\/p>\n<p>What does this mean?<\/p>\n<p>If we return to the <em>vendor_details<\/em> table above, you&#8217;ll recall how we said a database system stores the data in serial like this:<\/p>\n<div class=\"dbms-storage-method\">\n<p>001: 25, Premier Pharmacy Supplies, Falkirk;<\/p>\n<p>002: 30, Remington UK, Manchester;<\/p>\n<p>003: 31, DA Distributors, Halesowen;<\/p>\n<p>004: 36, Tena, Dunstable<\/p>\n<\/div>\n<p>This arrangement is known as <em>row-based storage<\/em> because the information is organised on disk row by row.<\/p>\n<p>Look at the first line. You&#8217;ll see that the details about Premier Pharmacy Supplies are located next to each other. The same goes for the other three vendors.<\/p>\n<p>So when a database system retrieves or updates the data in a record of a row-based table, it accesses the same physically contiguous section of disk. This means row-based systems are quick and efficient at reading and writing records.<\/p>\n<p>By contrast, they&#8217;re not so well geared towards querying large volumes of data.<\/p>\n<p>Take our table of products we used earlier:<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Relational-Database3.webp\" alt=\"Database Table of Products with Arrows Pointing to Those Supplied by Vendor #25\" width=\"550\" height=\"308\" class=\"aligncenter relational-databases\"><\/p>\n<p>Imagine it were much larger and we still wanted to find all products supplied by vendor #25.<\/p>\n<p>The database system would have to scan through the entire table for matching records.<\/p>\n<p>That could be a seriously big workload.<\/p>\n<p>And that&#8217;s why not all databases, relational or non-relational, store data this way.<\/p>\n<h3 id=\"column-based-storage\" class=\"cloud-heading-3\">Column-Based Storage<\/h3>\n<p>Tables in column-based systems look just like their row-based counterparts. But behind the scenes they store the data differently, grouping values by column rather than by row.<\/p>\n<p>So the data in our <em>vendor_details<\/em> table would be stored like this:<\/p>\n<div class=\"dbms-storage-method\">\n<p>25:001, 30:002, 31:003, 36:004;<\/p>\n<p>Premier Pharmacy Supplies: 001, Remington UK: 002, DA Distributors: 003, Tena: 004;<\/p>\n<p>Falkirk: 001, Manchester: 002, Halesowen: 003, Dunstable: 004;<\/p>\n<\/div>\n<p>Now let&#8217;s say you want to search your table for vendors in a specific location.<\/p>\n<p>Look how the values for the location column are now grouped together. Your query doesn&#8217;t need to scan the entire table, but only one section of it.<\/p>\n<p>This helps speed up queries and can make a huge difference as your data scales.<\/p>\n<p>On the flip side, notice how the values in each record are now distributed across storage. This means that, by comparison with row-based systems, reading and writing records is much slower.<\/p>\n<p>A number of different relational databases use <em>column-based storage<\/em>. But so do several types of non-relational database.<\/p>\n<p>So let&#8217;s look at these in the next section.<\/p>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Further-Reading.webp\" class=\"callout-image\" alt=\"Book icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Further Reading<\/strong><\/div>\n<p>Want to learn more about <em>column-based storage<\/em>? This <a href=\"https:\/\/en.wikipedia.org\/wiki\/Column-oriented_DBMS\" rel=\"noopener noreferrer\" target=\"_blank\">Wikipedia entry<\/a> covers it in more detail.<\/p><\/blockquote>\n<h3 class=\"cloud-heading-3\">Non-Relational Databases<\/h3>\n<p><em>Non-relational database<\/em> is just a general term to describe any type of database that doesn&#8217;t follow the traditional relational model.<\/p>\n<p>The concept of the <em>non-relational database<\/em> is nothing new. In fact, alternative methods of structuring data were around long before the relational database existed.<\/p>\n<p>But <em>non-relational databases<\/em> have seen a rapid resurgence in recent years \u2013 in response to the challenges the leading online players faced as they sought to overcome the scaling limitations of relational databases.<\/p>\n<p><em>Non-relational databases<\/em> are also known as <strong>NoSQL databases<\/strong>. <em>NoSQL<\/em> originally stood for <em>non-SQL<\/em>. But the term has now come to mean <em>Not only SQL<\/em>. This new meaning highlights the fact some non-relational systems are able to support SQL-like queries.<\/p>\n<p>There are different types of <em>non-relational database<\/em>, which are grouped into a variety of categories and subcategories \u2013 one of which is the <a href=\"#column-based-storage\">column-based model<\/a>. The other three main classes are as follows:<\/p>\n<h4 id=\"key-value-store\" class=\"cloud-heading-4\">Key-Value Store<\/h4>\n<p>The concept of the <em>key-value store<\/em> couldn&#8217;t be simpler.<\/p>\n<p>Each record is made up of a unique key and a value, known as a <strong>key-value pair<\/strong>.<\/p>\n<p style=\"margin-bottom: 1.1em;\">Like this:<\/p>\n<table class=\"key-value-store\">\n<tbody>\n<tr>\n<th><strong>Key<\/strong><\/th>\n<th><strong>Value<\/strong><\/th>\n<\/tr>\n<tr>\n<td>01213896326<\/td>\n<td>Peter Green<\/td>\n<\/tr>\n<tr>\n<td>02074317412<\/td>\n<td>Jimmy Hendrix<\/td>\n<\/tr>\n<tr>\n<td>01213492123<\/td>\n<td>Eddie Hazel<\/td>\n<\/tr>\n<tr>\n<td>02080825113<\/td>\n<td>Jimmy Page<\/td>\n<\/tr>\n<tr>\n<td>01353281114<\/td>\n<td>Dave Gilmour<\/td>\n<\/tr>\n<tr>\n<td>01223623011<\/td>\n<td>Nile Rodgers<\/td>\n<\/tr>\n<tr>\n<td>01702359249<\/td>\n<td>Bootsy Collins<\/td>\n<\/tr>\n<tr>\n<td>01497428328<\/td>\n<td>Chris Shiflett<\/td>\n<\/tr>\n<tr>\n<td>01512234596<\/td>\n<td>George Harrison<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The <u>key<\/u> can be pretty well any kind of number, text string or binary sequence. However, some database systems may apply rules and restrictions.<\/p>\n<p>The <u>value<\/u> can contain anything from a simple text string or number to a list, computer code or even another key-value pair. With some database management systems you also have the option to specify the data type for the value.<\/p>\n<p>Unlike the relational database model, which is highly structured, a key-value database gives you the freedom to store your data any way you like.<\/p>\n<p style=\"margin-bottom: 1.1em;\">For example, in the following data set, the value contains either a vendor name or vendor location:<\/p>\n<table class=\"key-value-store\">\n<tbody>\n<tr>\n<th><strong>Key<\/strong><\/th>\n<th><strong>Value<\/strong><\/th>\n<\/tr>\n<tr>\n<td>vendor_name:25<\/td>\n<td>Premier Pharmacy Supplies<\/td>\n<\/tr>\n<tr>\n<td>vendor_location:25<\/td>\n<td>Falkirk<\/td>\n<\/tr>\n<tr>\n<td>vendor_name:30<\/td>\n<td>Remington UK<\/td>\n<\/tr>\n<tr>\n<td>vendor_location:30<\/td>\n<td>Manchester<\/td>\n<\/tr>\n<tr>\n<td>vendor_name:31<\/td>\n<td>DA Distributors<\/td>\n<\/tr>\n<tr>\n<td>vendor_location:31<\/td>\n<td>Halesowen<\/td>\n<\/tr>\n<tr>\n<td>vendor_name:36<\/td>\n<td>Tena<\/td>\n<\/tr>\n<tr>\n<td>vendor_location:36<\/td>\n<td>Dunstable<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Key-value stores<\/em> scale well because:<\/p>\n<ul class=\"blog\">\n<li><strong>They take up less storage:<\/strong> Relational databases need to reserve space for optional data \u2013 whether they store a value or not. A key-value database doesn&#8217;t need to store anything if an optional value doesn&#8217;t exist.<\/li>\n<li><strong>Data retrieval is very simple:<\/strong> Most <em>key-value stores<\/em> are designed for quick and simple lookups via the key. By contrast, relational databases are tailored to making slower, more complex queries across one or more table columns.<\/li>\n<li><strong>They&#8217;re well suited to distributed systems:<\/strong> The simplicity of the <em>key-value store<\/em> makes it much easier to both distribute and access data across a network of nodes.<\/li>\n<\/ul>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Relational-Database4.webp\" alt=\"Database Table of Vendors with Arrows Pointing to Optional Values (VAT Codes)\" width=\"550\" height=\"282\" class=\"aligncenter relational-databases\"><\/p>\n<p>Key-value databases are a good choice for storing <strong>user profiles<\/strong> and <strong>website session information<\/strong>, such as the contents of an online shopping basket.<\/p>\n<p>As <em>key-value stores<\/em> work much like a dictionary or simple two-column lookup table they&#8217;re often referred to as a&nbsp;<strong>dictionary<\/strong>&nbsp;or&nbsp;<strong>hash<\/strong>.<\/p>\n<h4 class=\"cloud-heading-4\">Document Store<\/h4>\n<p>A document-oriented database is a more sophisticated class of key-value store, taking the concept a step further by introducing the notion of a&nbsp;<strong>document<\/strong>.<\/p>\n<p>In essence, a document performs much the same role as a row in a relational database table. But instead of using columns to store data about each record, it uses a set of key-value pairs.<\/p>\n<p>Here&#8217;s what our vendor data might look like if it were stored in a set of documents:<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store.webp\" class=\"document-store aligncenter\" alt=\"Document Store Containing a Collection of Four Documents\">\n<\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store-Mobile.webp\" alt=\"Document Store Containing a Collection of Four Documents\" width=\"414\" height=\"1717\" class=\"auto-scale-center\"><\/p>\n<p>As with key-value stores, documents don&#8217;t have to have the same fixed structure:<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store-Semi-Structured.webp\" class=\"document-store aligncenter\" alt=\"Collection of Documents Where Each Document Has a Slightly Different Set of Key-Value Pairs\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store-Semi-Structured-Mobile.webp\" alt=\"Collection of Documents Where Each Document Has a Slightly Different Set of Key-Value Pairs\" width=\"414\" height=\"1668\" class=\"auto-scale-center\"><\/p>\n<p>They can also store nested sets of values or nested sets of key-value pairs.<\/p>\n<p>Like so:<\/p>\n<p class=\"p-centre-img desktop-only\">\n<img decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store-Nested-Key-Value-Pairs.webp\" class=\"document-store aligncenter\" alt=\"Collection of Documents with Examples of Nested Sets of Values and Nested Sets of Key-Value Pairs\"><\/p>\n<p class=\"p-centre-img mobile-only mobile-width60\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store-Nested-Key-Value-Pairs-Mobile.webp\" alt=\"Collection of Documents with Examples of Nested Sets of Values and Nested Sets of Key-Value Pairs\" width=\"414\" height=\"1677\" class=\"auto-scale-center\">\n<\/p>\n<p>Logical groupings of documents are organised into <strong>collections<\/strong>, which are the document store equivalent of a relational database table:<\/p>\n<p class=\"p-centre-img\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Document-Store-Anatomy.webp\" alt=\"Diagram of a Document-Oriented Database with Documents Organised into Collections\" width=\"375\" height=\"358\" class=\"auto-scale-center\"><\/p>\n<p>As with key-value stores, <em>document stores<\/em> are more scalable than their relational counterparts.<\/p>\n<p>What&#8217;s more, because you can structure them how you want, it&#8217;s much easier to design a database that fits around your data.<\/p>\n<p>This often means you can store all the component values of a specific data entity in a single document \u2013 rather than spreading the same information across several relational database tables.<\/p>\n<p>Document-oriented databases share similar use cases to their more basic key-value counterparts and are typically used for storing <strong>product catalogues<\/strong>, <strong>web analytics<\/strong> and <strong>blog comments<\/strong>.<\/p>\n<p><strong>Graph Database<\/strong><\/p>\n<p>So far, all the databases we&#8217;ve previously seen only store data. They store what the data is (a value) and what the data represents (through its label, column name or key).<\/p>\n<p>If you want to know the relationship between any of that data, you need to run a query \u2013 just like the SQL query we showed you earlier:<\/p>\n<blockquote><p>SELECT * FROM product_catalog WHERE vendor_id = 25;<\/p><\/blockquote>\n<p>In the above example, the <u>relationship<\/u> between the products we wanted was vendor #25 (Premier Pharmacy Supplies).<\/p>\n<p>But this was a very straightforward query on a very simple data set.<\/p>\n<p>So what about more complex data sets, such as a social network?<\/p>\n<p>You&#8217;d have to map data to a large, highly rigid and cumbersome set of tables in order to represent the interconnections between people, likes, mentions, updates and so on.<\/p>\n<p>And querying that data would be a logistical nightmare, involving time-consuming scans across a multitude of tables.<\/p>\n<p>So what&#8217;s the solution?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2024\/07\/Graph-Database.webp\" alt=\"Visual Model of a Graph Database\" width=\"325\" height=\"286\" id=\"graph-database\">Well, this is where <em>graph databases<\/em> come in.<\/p>\n<p><em>Graph databases<\/em> are a completely different database concept.<\/p>\n<p>They don&#8217;t just store data but also the connections between data.<\/p>\n<p>They&#8217;re designed with relationships in mind.<\/p>\n<p>And, whereas a relational database performs complex calculations and matching operations to map a relationship, a <em>graph database<\/em> simply retrieves the relationship from storage.<\/p>\n<p>This makes them perfectly adapted to use cases, such as personalised <strong>product recommendations<\/strong> on online retail sites, <strong>fraud detection <\/strong>and, of course, <strong>social media<\/strong>.<\/p>\n<p><em>Graph databases<\/em> are based on graph theory used in mathematics \u2013 with pretty much the same concepts and terminology.<\/p>\n<blockquote>\n<div class=\"heading-wrapper\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/04\/Further-Reading.webp\" class=\"callout-image\" alt=\"Book icon\" width=\"30\" height=\"30\"><strong class=\"callout-heading\">Further Reading<\/strong><\/div>\n<p>If you want to learn more about how <em>graph databases<\/em> work then check out this introduction to the <a href=\"https:\/\/neo4j.com\/developer\/graph-database\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">graph data model<\/a> by graph database management system Neo4j.<\/p><\/blockquote>\n<p>Now let&#8217;s finish this section by looking at the common features and characteristics of all <em>non-relational<\/em> databases:<\/p>\n<ul class=\"blog\">\n<li><strong>Flexible data structure:<\/strong> Data can be highly structured, semi-structured or unstructured. This flexibility reduces the operational overhead of enforcing data formats, streamlining database management.<\/li>\n<li><strong>Superfast queries:<\/strong> By and large, <em>non-relational databases<\/em> sacrifice many traditional database features in favour of faster query performance.<\/li>\n<li><strong>Horizontal scaling:<\/strong> <em>Non-relational databases<\/em> are generally suited to storing large sets of distributed data \u2013 which you can scale <em>horizontally<\/em> simply by adding more nodes. This makes them perfectly adapted to the cloud, as you can automatically add more virtual servers as your data grows.<\/li>\n<li><strong>Query language support: <\/strong>There is no standard query language for <em>non-relational databases<\/em>. Instead, each type of database provides its own query mechanism through a custom <a href=\"#api\">API<\/a>. However, many now support SQL-like queries to help encourage migration from relational databases.<\/li>\n<\/ul>\n<p><strong>And don&#8217;t forget:<\/strong> Your particular choice of <em>non-relational database<\/em> will come down to a trade-off between availability and consistency.<\/p>\n<p style=\"margin-bottom: 0.8em;\">In other words, you can <u>EITHER<\/u> choose a database that guarantees:<\/p>\n<table style=\"font-size: 120%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0.6em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"arrow-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"arrow-text-right\">\n<strong>Consistency:<\/strong> Each time you read data, it is the most up-to-date version.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin-bottom: 0.6em;\"><u>OR<\/u><\/p>\n<table style=\"font-size: 120%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0.4em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"arrow-left\" height=\"45\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"arrow-text-right\">\n<strong>Availability:<\/strong> Data is readily available. In other words, every response to a read request is returned quickly and without an error.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>But you cannot have <u>BOTH<\/u>.<\/p>\n<blockquote><p><strong>Database as a Service (DBaaS)<\/strong><\/p>\n<p>Database as a Service (DBaaS) is currently one of fastest-growing trends in cloud computing.<\/p>\n<p>DBaaS offerings are fully managed services, which automatically take care of the time-consuming tasks involved in running a database, such as:<\/p>\n<ul class=\"block-quote\">\n<li>Infrastructure provisioning<\/li>\n<li>Scaling<\/li>\n<li>Server updates<\/li>\n<li>Backups<\/li>\n<\/ul>\n<p>They help speed up application development by making it quicker and easier to set up and maintain a database in the cloud.<\/p>\n<p>The leading cloud vendors offer DBaaS solutions for both relational and <em>non-relational databases<\/em>.<\/p><\/blockquote>\n<p>Right, we&#8217;re done.<\/p>\n<p>But, before we wrap things up, let&#8217;s explore the opportunities for writers in this lucrative writing sector.<br \/>\n<\/section>\n<section id=\"freelance-gigs\">\n<div class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\" id=\"freelance-heading\">How to Find Freelance Writing Gigs<\/h2>\n<\/div>\n<p>Cloud computing is a global business.<\/p>\n<p>So your first cloud writing gig can come from practically anywhere in the world.<\/p>\n<p>Because, in an industry where demand is high and supply is low, clients don&#8217;t care where you live \u2013 just as long as you can do the job.<\/p>\n<p>But where do you begin?<\/p>\n<p>The following are a few starting points to get your work search moving:<\/p>\n<div class=\"freelance-marketing-section\">\n<table style=\"font-size: 110%; margin-top: 0.3em; padding-top: 0em; margin-bottom: 0em; padding-bottom: 0em;\">\n<tbody>\n<tr>\n<td class=\"arrow-bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Update Your Website<\/h3>\n<p>Just telling the world you&#8217;re a cloud computing writer may be all you need to land your first content assignment. So update your website to include your cloud expertise and make it easy for prospects to find you.<\/td>\n<\/tr>\n<tr>\n<td class=\"arrow-bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Revise Your Social Profiles<\/h3>\n<p>Many professionals in the cloud computing industry look for expert writers on social media platforms. So, likewise, make sure your profiles include information to help you show up in their searches.<\/p>\n<p>You should also connect with cloud professionals, such as <strong>content managers<\/strong> and <strong>marketing directors<\/strong>. Nobody wants the hard sell. So focus on building relationships and getting yourself hardwired into your new niche sector.<\/td>\n<\/tr>\n<tr>\n<td class=\"arrow-bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Check Out Vendor Marketplaces<\/h3>\n<p>You can find potential clients by checking out the online marketplaces of each of the leading cloud platforms. These are catalogues of third-party cloud applications and solutions, which have been approved by the cloud vendor.<\/p>\n<p>You can use them to find companies that are a good match for your expertise. Once you&#8217;ve drawn up a list of targets, you can then move onto tracking down the content or marketing manager \u2013 either on LinkedIn or the company&#8217;s website.<\/p>\n<p>But do your research before you make any kind of approach. You should have a good understanding of what your prospects do and how you could potentially help them. Otherwise you&#8217;ll just waste their valuable time. And yours.<\/p>\n<p><strong>Quick Links:<\/strong><br \/>\n<a href=\"https:\/\/aws.amazon.com\/marketplace\" rel=\"noopener noreferrer\" target=\"_blank\">AWS Marketplace<\/a><br \/>\n<a href=\"https:\/\/azuremarketplace.microsoft.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">Azure Marketplace<\/a><br \/>\n<a href=\"https:\/\/cloud.google.com\/marketplace\/\" rel=\"noopener noreferrer\" target=\"_blank\">Google Cloud Platform Marketplace<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"arrow-bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Connect with Vendor Partners<\/h3>\n<p>Each cloud provider has its own network of independent accredited partners, who are able to support customers with expertise in areas such as digital transformation, <a href=\"#hybrid-cloud\">hybrid cloud<\/a> and application development.<\/p>\n<p>Just as with third-party marketplace vendors, they all need content. In particular, long-form<strong> blog posts<\/strong>, <strong>case studies<\/strong> and <strong>white papers<\/strong>.<\/p>\n<p><strong>Quick Links:<\/strong><br \/>\n<a href=\"https:\/\/aws.amazon.com\/partners\/find\/\" rel=\"noopener noreferrer\" target=\"_blank\">AWS Partner Network<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-gb\/solution-providers\/home\" rel=\"noopener noreferrer\" target=\"_blank\">Azure Partners<\/a><br \/>\n<a href=\"https:\/\/cloud.google.com\/partners\/\" rel=\"noopener noreferrer\" target=\"_blank\">Google Cloud Partners<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"arrow-bullet-left\">\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/03\/circled-arrow-cloud-computing.webp\" alt=\"\" width=\"25\" height=\"25\" class=\"circled-arrow\"><\/td>\n<td class=\"bullet-text-right\">\n<h3 class=\"bullet-heading-3\">Reach Out to Event Sponsors<\/h3>\n<p>You can find leads by checking the list of sponsors or exhibitors at major cloud <a href=\"#cloud-summits\">trade shows<\/a> and conferences.<\/p>\n<p>If you can attend in person, you&#8217;ll also get the opportunity to meet prospects face-to-face.<\/p>\n<p>But remember sponsors will be busy talking to their own prospects and customers. So respect their time.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/section>\n<section>\n<div style=\"margin-top: 0.85em;\" class=\"heading2-wrapper\">\n<h2 class=\"cloud-heading-2\">Summing Up<\/h2>\n<\/div>\n<p>Cloud computing isn&#8217;t hard to learn. Although, with so much to take in, it may seem overwhelming at first.<\/p>\n<p>But here&#8217;s the good news.<\/p>\n<p>A general copywriter has to familiarise themselves with a new industry practically every time they start a new project. But, as a cloud specialist, you only have to learn one.<\/p>\n<p>Sure, the learning curve is steep.<\/p>\n<p>Your first writing assignments will take you longer.<\/p>\n<p>But, little by little, your work gets easier as you develop your knowledge.<\/p>\n<p>Before you know it, you&#8217;ll become a cloud computing expert \u2013 with the technical and writing skills clients are so desperately looking for.<\/p>\n<p>And, once you\u2019ve cracked it, you\u2019ll be in the money.<br \/>\n<\/section>\n<footer>\n<p class=\"display-profile-header\" style=\"font-size: 155%;\">Have Your Say<\/p>\n<p class=\"calltoaction\" style=\"margin-bottom: 2em;\"><strong>Are you a freelance copywriter in a specialist content niche? What are the biggest pros and cons?<\/strong> Share your thoughts in the comment section below.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2014\/04\/Blog-Writer.png\" alt=\"Blogger Profile\" width=\"15\" height=\"17\" \/><span style=\"position: relative; top: -1px; left: 8px;\">About the Author<\/span><\/h2>\n<p style=\"margin-bottom: 1.2em;\"><img loading=\"lazy\" decoding=\"async\" style=\"float: left; vertical-align: top; padding-right: 1.4em;\" title=\"Kevin Carlton is a cloud computing copywriter based in the UK\" src=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2014\/09\/Kevin-Carlton-Website-Copywriter.png\" alt=\"Kevin Carlton of Write Online\" width=\"55\" height=\"55\" \/><span itemprop=\"author\" itemscope itemtype=\"https:\/\/schema.org\/Person\"><a itemprop=\"name\" href=\"\/about-write-online.php#tabs-2\">Kevin Carlton<\/a><\/span> is a freelance IT copywriter, who specialises in cloud computing, big data and cybersecurity content. He ghostwrites for technology companies across the globe and is the voice behind many widely acknowledged cloud experts.<\/p>\n<p style=\"margin-bottom: 1.2em;\"><span itemprop=\"publisher\" itemscope itemtype=\"https:\/\/schema.org\/Organization\"><meta itemprop=\"url\" content=\"https:\/\/writeonline.io\">Kevin previously worked as a development engineer and an analyst programmer before setting up UK-based copywriting service <span itemprop=\"name\">Write Online<\/span>.<span itemprop=\"logo\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\"><meta itemprop=\"url\" content=\"https:\/\/writeonline.io\/layout\/Write-Online-Schema-Logo.png\"><\/span><\/span><\/p>\n<p class=\"aboutauthor\">You can follow him on <a href=\"https:\/\/twitter.com\/Write_Online\" target=\"_blank\">X<\/a> or connect with him on <a href=\"https:\/\/www.linkedin.com\/in\/kevincarlton\" target=\"_blank\">LinkedIn<\/a>.<\/p>\n<div class=\"mc_embed_signup\" style=\"font-size:1.1em;\">\n<form action=\"https:\/\/writeonline.us6.list-manage.com\/subscribe\/post?u=2810e38b5ef4a49df44f0ffb3&#038;id=8718c12404\" method=\"post\" name=\"mc-embedded-subscribe-form\" class=\"validate\" target=\"_blank\" novalidate>\n<p style=\"font-size: 1em; margin-top:0; margin-bottom: 10px;\">\n<b>Liked this post?<\/b> Sign up to our blog to get FREE updates\u00a0*\n\t\t<\/p>\n<div class=\"mc-field-entry\">\n\t\t \t<input type=\"email\" value=\"\" name=\"EMAIL\" placeholder=\"Enter email address\" class=\"required email\" id=\"mce-EMAIL\" style=\"width:250px; display:inline;\"><span id=\"mcButtonSpacing\"><\/span><input type=\"submit\" value=\"Sign me up\" name=\"subscribe\" class=\"mc-embed-signup\" style=\"display:inline\">\n\t\t<\/div>\n<div class=\"clear\">\n\t\t<\/div>\n<div style=\"position: absolute; left: -5000px;\"><input type=\"text\" name=\"b_2810e38b5ef4a49df44f0ffb3_8718c12404\" value=\"\">\n\t\t<\/div>\n<div class=\"clear\">\n\t\t<\/div>\n<\/p><\/form>\n<p style=\"margin-left: 0.7em; text-indent: -0.7em; max-width: 475px;\">* We&#8217;ll only send you updates from our blog and relevant information about our services. You can unsubscribe at any time. <a href=\"\/privacy-notice.php#GDPR-signups\" rel=\"noopener\" target=\"_blank\">Read more \u00bb<\/a><\/p>\n<\/div>\n<\/footer>\n","protected":false},"excerpt":{"rendered":"<p>QUICK LINKS What\u2019s in This Post?Who Should Read This?What Is Cloud Computing?Key Cloud ConceptsWhere to Learn MoreCybersecurityBig Data How to Find Freelance Writing Gigs Fact: Niche copywriters are in big demand. And they get paid more. Why? Because most clients &hellip; <a href=\"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":9518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[46,65],"tags":[62,61,66,63,64,17],"class_list":["post-6496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-marketing","category-niche-writing","tag-big-data","tag-cloud-computing","tag-cloud-training","tag-cybersecurity","tag-devops","tag-niche-content"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Plain-English Guide to Cloud Computing for Content Writers<\/title>\n<meta name=\"description\" content=\"A clear and comprehensive guide to cloud computing, cybersecurity and big data for writers, marketers and IT professionals who are new to the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Plain-English Guide to Cloud Computing: Must-Know Info to Crack This Content-Hungry Writing Niche\" \/>\n<meta property=\"og:description\" content=\"Cloud #writers and #bloggers are in BIG demand. But what exactly is the #cloud? And how do you break into this sizzling-hot #writing niche?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"SEO Copywriting Blog, Write Online\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-24T15:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:10:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-pinterest.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"735\" \/>\n\t<meta property=\"og:image:height\" content=\"1101\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Kevin Carlton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Plain-English Guide to #Cloud Computing: Must-Know Info to Crack This Content-Hungry #Writing Niche\" \/>\n<meta name=\"twitter:description\" content=\"Cloud #writers and #bloggers are in BIG demand. But what exactly is the cloud? And how do you break into this sizzling-hot writing niche?\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-x.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@Write_Online\" \/>\n<meta name=\"twitter:site\" content=\"@Write_Online\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Carlton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"83 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/\"},\"author\":{\"name\":\"Kevin Carlton\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#\\\/schema\\\/person\\\/30111be964011536d65385a877143a24\"},\"headline\":\"The Plain-English Guide to Cloud Computing: A One-Stop Resource for Tech Content Writers\",\"datePublished\":\"2019-06-24T15:00:55+00:00\",\"dateModified\":\"2026-04-13T09:10:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/\"},\"wordCount\":3715,\"commentCount\":27,\"publisher\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/plain-english-guide-to-cloud-computing-featured.webp\",\"keywords\":[\"#big-data\",\"#cloud-computing\",\"#cloud-training\",\"#cybersecurity\",\"#DevOps\",\"#niche-content\"],\"articleSection\":[\"#marketing\",\"#niche-writing\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/\",\"url\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/\",\"name\":\"Plain-English Guide to Cloud Computing for Content Writers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/plain-english-guide-to-cloud-computing-featured.webp\",\"datePublished\":\"2019-06-24T15:00:55+00:00\",\"dateModified\":\"2026-04-13T09:10:54+00:00\",\"description\":\"A clear and comprehensive guide to cloud computing, cybersecurity and big data for writers, marketers and IT professionals who are new to the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/plain-english-guide-to-cloud-computing-featured.webp\",\"contentUrl\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/plain-english-guide-to-cloud-computing-featured.webp\",\"width\":1200,\"height\":628,\"caption\":\"A Writer's Guide to Cloud Computing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/cloud-computing-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Plain-English Guide to Cloud Computing: A One-Stop Resource for Tech Content Writers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/\",\"name\":\"SEO Copywriting Blog, Write Online\",\"description\":\"Make Every Word Work for You\",\"publisher\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#organization\",\"name\":\"Write Online\",\"url\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/wp-content\\\/uploads\\\/2012\\\/11\\\/Write-Online-Logo.png\",\"contentUrl\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/wp-content\\\/uploads\\\/2012\\\/11\\\/Write-Online-Logo.png\",\"width\":982,\"height\":982,\"caption\":\"Write Online\"},\"image\":{\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Write_Online\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/kevincarlton\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/#\\\/schema\\\/person\\\/30111be964011536d65385a877143a24\",\"name\":\"Kevin Carlton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7b44e2d13deba9ec30f6789ee9307e5b916f19bac0173e68745ccb4b0032e148?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7b44e2d13deba9ec30f6789ee9307e5b916f19bac0173e68745ccb4b0032e148?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7b44e2d13deba9ec30f6789ee9307e5b916f19bac0173e68745ccb4b0032e148?s=96&d=mm&r=g\",\"caption\":\"Kevin Carlton\"},\"sameAs\":[\"https:\\\/\\\/writeonline.io\\\/blog\",\"http:\\\/\\\/www.linkedin.com\\\/in\\\/kevincarlton\",\"https:\\\/\\\/x.com\\\/Write_Online\"],\"url\":\"https:\\\/\\\/writeonline.io\\\/blog\\\/author\\\/kevin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Plain-English Guide to Cloud Computing for Content Writers","description":"A clear and comprehensive guide to cloud computing, cybersecurity and big data for writers, marketers and IT professionals who are new to the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/","og_locale":"en_GB","og_type":"article","og_title":"The Plain-English Guide to Cloud Computing: Must-Know Info to Crack This Content-Hungry Writing Niche","og_description":"Cloud #writers and #bloggers are in BIG demand. But what exactly is the #cloud? And how do you break into this sizzling-hot #writing niche?","og_url":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/","og_site_name":"SEO Copywriting Blog, Write Online","article_published_time":"2019-06-24T15:00:55+00:00","article_modified_time":"2026-04-13T09:10:54+00:00","og_image":[{"width":735,"height":1101,"url":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-pinterest.webp","type":"image\/webp"}],"author":"Kevin Carlton","twitter_card":"summary_large_image","twitter_title":"The Plain-English Guide to #Cloud Computing: Must-Know Info to Crack This Content-Hungry #Writing Niche","twitter_description":"Cloud #writers and #bloggers are in BIG demand. But what exactly is the cloud? And how do you break into this sizzling-hot writing niche?","twitter_image":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-x.webp","twitter_creator":"@Write_Online","twitter_site":"@Write_Online","twitter_misc":{"Written by":"Kevin Carlton","Estimated reading time":"83 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#article","isPartOf":{"@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/"},"author":{"name":"Kevin Carlton","@id":"https:\/\/writeonline.io\/blog\/#\/schema\/person\/30111be964011536d65385a877143a24"},"headline":"The Plain-English Guide to Cloud Computing: A One-Stop Resource for Tech Content Writers","datePublished":"2019-06-24T15:00:55+00:00","dateModified":"2026-04-13T09:10:54+00:00","mainEntityOfPage":{"@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/"},"wordCount":3715,"commentCount":27,"publisher":{"@id":"https:\/\/writeonline.io\/blog\/#organization"},"image":{"@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-featured.webp","keywords":["#big-data","#cloud-computing","#cloud-training","#cybersecurity","#DevOps","#niche-content"],"articleSection":["#marketing","#niche-writing"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/","url":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/","name":"Plain-English Guide to Cloud Computing for Content Writers","isPartOf":{"@id":"https:\/\/writeonline.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#primaryimage"},"image":{"@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-featured.webp","datePublished":"2019-06-24T15:00:55+00:00","dateModified":"2026-04-13T09:10:54+00:00","description":"A clear and comprehensive guide to cloud computing, cybersecurity and big data for writers, marketers and IT professionals who are new to the cloud.","breadcrumb":{"@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/writeonline.io\/blog\/cloud-computing-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#primaryimage","url":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-featured.webp","contentUrl":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-featured.webp","width":1200,"height":628,"caption":"A Writer's Guide to Cloud Computing"},{"@type":"BreadcrumbList","@id":"https:\/\/writeonline.io\/blog\/cloud-computing-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/writeonline.io\/blog\/"},{"@type":"ListItem","position":2,"name":"The Plain-English Guide to Cloud Computing: A One-Stop Resource for Tech Content Writers"}]},{"@type":"WebSite","@id":"https:\/\/writeonline.io\/blog\/#website","url":"https:\/\/writeonline.io\/blog\/","name":"SEO Copywriting Blog, Write Online","description":"Make Every Word Work for You","publisher":{"@id":"https:\/\/writeonline.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/writeonline.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/writeonline.io\/blog\/#organization","name":"Write Online","url":"https:\/\/writeonline.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/writeonline.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2012\/11\/Write-Online-Logo.png","contentUrl":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2012\/11\/Write-Online-Logo.png","width":982,"height":982,"caption":"Write Online"},"image":{"@id":"https:\/\/writeonline.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Write_Online","https:\/\/www.linkedin.com\/in\/kevincarlton"]},{"@type":"Person","@id":"https:\/\/writeonline.io\/blog\/#\/schema\/person\/30111be964011536d65385a877143a24","name":"Kevin Carlton","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/7b44e2d13deba9ec30f6789ee9307e5b916f19bac0173e68745ccb4b0032e148?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7b44e2d13deba9ec30f6789ee9307e5b916f19bac0173e68745ccb4b0032e148?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7b44e2d13deba9ec30f6789ee9307e5b916f19bac0173e68745ccb4b0032e148?s=96&d=mm&r=g","caption":"Kevin Carlton"},"sameAs":["https:\/\/writeonline.io\/blog","http:\/\/www.linkedin.com\/in\/kevincarlton","https:\/\/x.com\/Write_Online"],"url":"https:\/\/writeonline.io\/blog\/author\/kevin\/"}]}},"jetpack_featured_media_url":"https:\/\/writeonline.io\/blog\/wp-content\/uploads\/2026\/02\/plain-english-guide-to-cloud-computing-featured.webp","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2YEqx-1GM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/posts\/6496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/comments?post=6496"}],"version-history":[{"count":154,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/posts\/6496\/revisions"}],"predecessor-version":[{"id":9882,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/posts\/6496\/revisions\/9882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/media\/9518"}],"wp:attachment":[{"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/media?parent=6496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/categories?post=6496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/writeonline.io\/blog\/wp-json\/wp\/v2\/tags?post=6496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}