Sie sind auf Seite 1von 9

Name: Susana Alejandra Muñoz Torres

Date: 04/04/2019
_________________________________________________

ELABORACION DE RESUMENES PARA


COMPRENDER TEXTOS BASICOS
EN INGLES

AUTOR:

SUSANA ALEJANDRA MUÑOZ TORRES

SERVICIO NACIONAL DE APRENDIZAJE SENA

TECNOLOGO EN ANALISIS Y DESARROLLO DE SISTEMAS DE


INFORMACION
2019
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________

ELABORACION DE RESUMENES PARA


COMPRENDER TEXTOS BASICOS
EN INGLES

AUTOR:
SUSANA ALEJANDRA MUÑOZ TORRES
TRABAJO PRESENTADO PARA LA ACTIVIDAD DEL PROYECTO 3

INSTRUCTORES:

LUIS CARLOS OSSA GOMEZ

DIANA MARIA DE JESUS RICO MESA

JABER ALEJANDRO NARANJO PANIAGUA

MARIA GISELA JIMENEZ VALENCIA

ANA MARIA RUEDA SUAREZ

MARTA LIA MARQUEZ SILVA

NATALY BUENDIA SAMPAYO

SERVICIO NACIONAL DE APRENDIZAJE SENA


TECNOLOGO EN ANALISIS Y DESARROLLO DE SISTEMAS DE
INFORMACION
2019
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________

Taller
Elaboración de resúmenes para la comprensión de textos en inglés

Reading for main ideas


Read the text Cloud Computing, available at SENA Library’s databases by
following the link below. To access the library, just login with your ID
number.

Dziak, M. (2016). Cloud Computing. Cloud Computing


(ELL), 1.

http://search.ebscohost.com.bdigital.sena.edu.co/login.as
px?direct=true&db=elr&AN=114488477&site=ell-live

Cloud computing are servers from the Internet responsible for attending to
requests at any time. You can access your information or service, through an
internet connection from any mobile device or landline located anywhere. They
serve their users from several hosting providers frequently distributed around the
world. This measure reduces costs, ensures a better uptime and that websites are
invulnerable to computer criminals, local governments and their police raids.
The change offered by computing from the cloud is that it allows increasing the
number of services based on the network. This generates benefits both for
suppliers, who can offer, more quickly and efficiently, a greater number of services,
as well as for users who have the possibility of accessing them, enjoying the
'transparency' and immediacy of the system and a model of payment for
consumption. Likewise, the consumer saves the salary costs or the costs in
economic investment (premises, specialized material, etc.).
Cloud Computing manages to provide these advantages, relying on a dynamic
technological infrastructure that is characterized, among other factors, by a high
degree of automation, a rapid mobilization of resources, a high capacity to adapt to
meet a variable demand, as well as advanced virtualization and a flexible price
depending on the consumption made, avoiding also the fraudulent use of software
and piracy.
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________

Based on the previous reading, write the required information on the chart
below.

Topic: Cloud Computing


Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________
Writing a summary
Now, use the information related to the main idea you already identified and
the supporting details you extracted from the passage, to write a summary of
the text Cloud Computing. Use the following template to guide your writing
process. Remember that supporting details can be used to make key points
in your summary.
RTA: In other words, the definition of cloud computing is to offer services through
the connectivity and large scale of the Internet. Cloud computing democratizes
access to software resources at an international level, as it is a software
application that serves various clients. Multilocation is what differentiates cloud
computing from simple outsourcing and from older application service provider
models. Now, small businesses have the ability to master the power of advanced
technology in a scalable way.
Cloud computing offers individuals and businesses of all sizes the capacity of a
pool of computing resources with good maintenance, secure, easily accessible and
on demand, such as servers, data storage and application solution. This gives
companies more flexibility in relation to their data and information, which can be
accessed at any place and time, being essential for companies with headquarters
around the world or in different work environments. With a minimum of
management, all the software elements of cloud computing can be dimensioned on
demand, you only need an Internet connection.
In a simple way, cloud computing is a technology that allows remote access to
softwares, file storage and data processing through the Internet, being an
alternative to running on a personal computer or server local. In the cloud model,
there is no need to install applications locally on computers. Cloud computing
offers individuals and businesses the capacity of a pool of computing resources
with good maintenance, insurance, easy access and on demand.
Cloud computing uses a network layer to connect users' peripheral point devices,
such as computers, smartphones and portable accessories, to resources
centralized in the data center. Before cloud computing, reliable software execution
by companies offering services was only possible if they could also pay for the
maintenance of the necessary server infrastructure. In addition, traditional software
required, in general, a full team of IT professionals, internal or external, to deal with
the inevitable set of errors, service challenges and upgrades. The concept of cloud
computing is free of all those problems and outdated requirements.
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________

Bibliographic Information

Author(s) of article: Salesforce


Title of article: cloud computing
Name of magazine, newspaper, website, etc. containing the article:
https://www.salesforce.com/mx/cloud-computing/
Date article was published and page number: Salesforce was created in 1999

Summary Information

Briefly state the main idea or thesis presented in this article:


When Salesforce was created in 1999, it was the first business service to offer
business applications on a website, which eventually came to be called by the
cloud computing market. Since then, Salesforce has been the pioneer in this type
of service for small, medium and large companies.
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________

Summarize the most important information, ideas, facts, etc. presented in


this article:
The change offered by computing from the cloud is that it allows increasing the
number of services based on the network. This generates benefits both for
suppliers, who can offer, more quickly and efficiently, a greater number of services,
as well as for users who have the possibility of accessing them, enjoying the
'transparency' and immediacy of the system and a model of payment for
consumption. Likewise, the consumer saves the salary costs or the costs in
economic investment (premises, specialized material, etc.).
Cloud Computing manages to provide these advantages, relying on a dynamic
technological infrastructure that is characterized, among other factors, by a high
degree of automation, a rapid mobilization of resources, a high capacity to adapt to
meet a variable demand, as well as advanced virtualization and a flexible price
depending on the consumption made, avoiding also the fraudulent use of software
and piracy.
The concept of "cloud computing" is very broad, and covers almost all possible
types of online service, but when companies preach offering a utility hosted in the
cloud, they usually refer to any of these three modalities: software as a service (for
its acronym in English SaaS -Software as a Service-), Platform as a Service
(PaaS) and Infrastructure as a Service (IaaS).
Another of the key factors that have allowed to evolve to cloud computing have
been, according to the pioneer in British cloud computing Jamie Turner,
virtualization technologies, the development of the universal high-speed bandwidth
and universal standards of software interoperability Turner added: "As cloud
computing expands, its reach goes beyond a handful of Google Docs users - we
can only begin to imagine its scope and scope - almost anything can be used in the
cloud." .
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________

Summary

Write the final version of your summary here.


Rta: Security in cloud computing can be as good or better than what existed in
traditional systems, because providers are able to provide resources that solve
security problems that many customers can not afford. However, security still
remains an important issue, when the data has a confidential nuance. This delays
the adoption of cloud computing to a certain extent.
Security as a service: In the cloud environment, security is provided by providers.
Two methods can be distinguished: The first method is that anyone can change
their delivery methods included in cloud services. The second method is that cloud
service providers provide security only as a cloud service, with company security
information.
Browser security: In the cloud environment, remote servers are used for
computing. The client nodes are used only for the entry / exit of operations, and for
the authorization and authentication of information in the cloud. A standard web
browser is a platform normally used for all the users of the world. This can be
cataloged in two different types: Software as a service (SaaS), Web Applications,
or Web 2.0. Transport Layer Security (TLS), is usually used for data encryption and
host authentication.
Authentication or identification: In the cloud environment, the basis for access
control is authentication, access control is more important than ever since the
cloud and all its data are accessible to everyone through the internet. The Trusted
Platform Module (TPM) is widely used and an authentication system stronger than
the username and password. Trusted Computing Groups (TCG's) is a standard on
user authorization and other real-time communication security tools between the
provider and the client.
Loss of governance: In cloud infrastructures, the client necessarily cedes control
to the provider (cloud provider) in several matters, which negatively affect security.
At the same time, the service level agreement does not usually have the task of
providing this type of services on the part of the cloud provider, which leaves a
breach in the security defenses.
Name: Susana Alejandra Muñoz Torres
Date: 04/04/2019
_________________________________________________
Lock-In: This is a small offer in this type of tools, the procedures or standards of
data formats or service interfaces that could guarantee the data, the applications
and the portability service. This can make it difficult for the client to migrate from
one provider to another, or migrate the data and services back to another
computing environment. This introduces a particular dependence on the cloud
provider for the provision of the service, especially the portability of the data, the
most fundamental aspect.
Protection of data: Cloud computing puts data protection at risk for cloud users
and their providers. In many cases, it causes difficulties for the provider (in the role
of the information controller) to ensure the practical effectiveness of managing the
data of the cloud provider and to ensure that the data is on the right track. This
problem is usually aggravated in cases of multiple data transfers, for example
between federated systems. On the other hand, some cloud providers provide
information on their data-shelling practices. There are also some offers of
certifications in data processing, security activities, and data controls that take
place; example, the SAS70 certification. Internet data streams are linked to
malware and decoy packages to get the user into an unknown participation in
criminal activities.
Limitations: Some limitations that are delaying a bit to cloud computing are some
of the following:
Data loss / leakage: Having data in the Cloud has many advantages but can be
compromised in different ways. They can be modified or deleted without a backup,
they can be disconnected from their context or accessed by unauthorized people.
Difficulty assessing the reliability of suppliers: If Cloud providers are part of our
society, viewed in a statistical way, someone from your staff or some subcontractor
may not be reliable. This is why good human resources background research
procedures, policies, and information security procedures should be taken.
Strength of authentication mechanisms: In the cloud, there are a lot of data,
applications and stored resources. Cloud computing is very weak in authentication
mechanisms, so the attacker can easily obtain the client user account and access
the virtual machine.

Das könnte Ihnen auch gefallen