<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Kingsley Atanang</title>
    <description>The latest articles on DEV Community by Kingsley Atanang (@kingo4luv).</description>
    <link>https://dev.to/kingo4luv</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F143946%2F2407c051-84ab-4618-9c62-75dff893214c.jpg</url>
      <title>DEV Community: Kingsley Atanang</title>
      <link>https://dev.to/kingo4luv</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kingo4luv"/>
    <language>en</language>
    <item>
      <title>CLOUD COMPUTING TERMINOLOGIES YOU SHOULD KNOW</title>
      <dc:creator>Kingsley Atanang</dc:creator>
      <pubDate>Sat, 14 Nov 2020 21:23:17 +0000</pubDate>
      <link>https://dev.to/kingo4luv/cloud-computing-terminologies-you-should-know-naa</link>
      <guid>https://dev.to/kingo4luv/cloud-computing-terminologies-you-should-know-naa</guid>
      <description>&lt;p&gt;If you are starting out in cloud computing, you will be overwhelmed with tons of cloud computing terminologies. This might affect your quick understanding of some of the cloud computing concept because you will always have to look up some of the terminologies before you proceed.&lt;/p&gt;

&lt;p&gt;Let's take a look at some of these terminologies and their definitions.&lt;/p&gt;

&lt;h3&gt;
  
  
  ACCESS CONTROL LIST
&lt;/h3&gt;

&lt;p&gt;An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list.&lt;/p&gt;

&lt;h3&gt;
  
  
  CONTAINER
&lt;/h3&gt;

&lt;p&gt;A container is a standard unit of software that packages up code and all its dependencies so that the application runs quickly and reliably from one computing environment to another.  Available for both Linux and Windows-based applications, containerized software will always run the same, regardless of the infrastructure.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD INSTANCE
&lt;/h3&gt;

&lt;p&gt;A cloud instance refers to a virtual server instance from a public or private cloud network. In cloud instance computing, single hardware is implemented into software and run on top of multiple computers. A server in the cloud can be easily moved from one physical machine to another without going down.&lt;/p&gt;

&lt;p&gt;In simple words, a server running our application is called an instance. Think of one server as one instance.&lt;br&gt;
An Instance is a virtual machine that runs our workloads in the cloud. Often the term VM Virtual Machine &amp;amp; Instance is used interchangeably.&lt;/p&gt;

&lt;p&gt;The term server and instance can also be used interchangeably but in the cloud computing world, the term instance is always preferred over the server.&lt;/p&gt;

&lt;h3&gt;
  
  
  PLATFORM AS A SERVICE
&lt;/h3&gt;

&lt;p&gt;Platform as a service (PaaS) or application platform as a service (PaaS) or platform-based service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app&lt;/p&gt;

&lt;h3&gt;
  
  
  INFRASTRUCTURE AS A SERVICE
&lt;/h3&gt;

&lt;p&gt;Infrastructure-as-a-Service commonly referred to as simply  IaaS is a form of cloud computing that delivers fundamental compute, network, and storage resources to consumers on-demand, over the internet, and on a pay-as-you-go basis. IaaS enables end-users to scale and shrink resources on an as-needed basis, reducing the need for high, up-front capital expenditures or unnecessary owned infrastructure, especially in the case of spiky workloads. In contrast to PaaS and SaaS (even newer computing models like containers and serverless), IaaS provides the lowest-level control of resources in the cloud.&lt;/p&gt;

&lt;h3&gt;
  
  
  ARTIFICIAL INTELLIGENCE AS A SERVICE
&lt;/h3&gt;

&lt;p&gt;A third-party offering of Artificial Intelligence (AI) outsourcing enables organizations and individuals to experiment with language, vision, and speech understanding capabilities without a huge initial investment and with lower risk. AI typically involves a vast range of algorithms that allow computers to solve complex tasks by generalizing over data. AI as a service allows users to upload data, run complex models in the cloud, and receive results via a cloud platform or API, significantly reducing development time while improving the time-to-value.&lt;/p&gt;

&lt;h3&gt;
  
  
  AUTO SCALING
&lt;/h3&gt;

&lt;p&gt;Autoscaling also referred to as autoscaling, auto-scaling, and sometimes automatic scaling is a cloud computing technique for dynamically allocating computational resources. Depending on the load to a server farm or pool, the number of active servers will typically vary automatically as user needs fluctuate.&lt;/p&gt;

&lt;h3&gt;
  
  
  APPLICATION PROGRAMMING INTERFACE (API)
&lt;/h3&gt;

&lt;p&gt;An API is a set of definitions and protocols for building and integrating application software. API stands for application programming interface.&lt;br&gt;
APIs let your product or service communicate with other products and services without having to know how they’re implemented. This can simplify app development, saving time, and money. When you’re designing new tools and products—or managing existing ones—APIs give you flexibility; simplify design, administration, and use; and provide opportunities for innovation.&lt;/p&gt;

&lt;h3&gt;
  
  
  AVAILABILITY ZONE
&lt;/h3&gt;

&lt;p&gt;Availability zones are data center locations isolated from each other as a safeguard against unexpected outages leading to downtime. The zones are typically geographically distinct. Businesses can opt to have one or multiple availability zones globally depending on their specific needs.&lt;/p&gt;

&lt;h3&gt;
  
  
  BACKEND AS A SERVICE (BaaS/mobile backend/mBaaS)
&lt;/h3&gt;

&lt;p&gt;Backend as a service is a model for providing web app and mobile app developers with a way to link their applications to backend cloud storage and APIs exposed by back end applications while also providing features such as user management, push notifications, and integration with social networking services. &lt;/p&gt;

&lt;p&gt;These services are provided via the use of custom software development kits (SDKs) and application programming interfaces (APIs). BaaS is a relatively recent development in cloud computing, with most BaaS startups dating from 2011 or later. Although a fairly nascent industry, trends indicate that these services are gaining mainstream traction with enterprise consumers.&lt;/p&gt;

&lt;h3&gt;
  
  
  BYOD (BRING YOUR OWN DEVICE)
&lt;/h3&gt;

&lt;p&gt;A growing trend towards the use of employee-owned to connect to organizational networks and access work-related systems and potentially confidential or sensitive data. It is part of a larger IT consumerization trend in which consumer hardware and software are being brought in the enterprise. BYOD can occur under the radar in the form of shadow IT; however, more and more organizations are leaning towards the implementation of BYOD policies. More specific variations of the term include bring your own apps (BYOA), bring your own laptop (BYOL), and bring your own apps (BYOA).&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD ARCHITECT
&lt;/h3&gt;

&lt;p&gt;A Cloud Architect is an IT specialist who develops a company’s computing strategy. This strategy incorporates cloud adoption plans, cloud application design as well as cloud management and monitoring. Additional responsibilities include support for application architecture and deployment in cloud environments.&lt;br&gt;
The Architect also assists with cloud environments such as the public cloud, private cloud, and hybrid cloud. This professional draws on solid knowledge of the company’s cloud architecture and platform when designing and developing dynamic cloud solutions.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD ENGINEER
&lt;/h3&gt;

&lt;p&gt;An IT professional responsible for any duties related to cloud computing, including planning, design, management, and maintenance. They may also be tasked with assessing an organization’s infrastructure and migrating different functions to a stable and reliable cloud-based system. The demand for cloud engineers is on the rise, as more companies move crucial business applications and processes to private, public, and hybrid cloud infrastructures.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD LOAD BALANCING
&lt;/h3&gt;

&lt;p&gt;The process of distributing computing resources and workloads across several application servers that are running in a cloud environment. Like other forms of load balancing, cloud load balancing allows you to maximize application reliability and performance; but at a lower cost and easier scaling to match demand, without loss of service. This helps ensure users have access to the applications they need, when they need them, without any problems.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD MIGRATION
&lt;/h3&gt;

&lt;p&gt;Cloud migration is the process of moving data, applications, or other business elements to a cloud computing environment. There are various types of cloud migrations an enterprise can perform. One common model is the transfer of data and applications from a local, on-premises data center to the public cloud.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD NATIVE
&lt;/h3&gt;

&lt;p&gt;Cloud-native is a term used to describe container-based environments. Cloud-native technologies are used to develop applications built with services packaged in containers, deployed as microservices, and managed on elastic infrastructure through agile DevOps processes and continuous delivery workflows.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD PROVIDER (CSP)
&lt;/h3&gt;

&lt;p&gt;A cloud provider is a company that delivers cloud computing-based services and solutions to businesses and/or individuals. This service organization may provide rented and provider-managed virtual hardware, software, infrastructure, and other related services.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLOUD PROVISIONING
&lt;/h3&gt;

&lt;p&gt;Cloud provisioning refers to the deployment and integration of an organization’s cloud computing services within its infrastructure. The cloud services in question can be hybrid, public, or private solutions. An organization may choose to host some services and applications within the public cloud while others remain on site behind the firewall.&lt;/p&gt;

&lt;h3&gt;
  
  
  CLUSTER
&lt;/h3&gt;

&lt;p&gt;refers to a group of linked servers and other resources that work together as if they were a single system. Clustering is a popular strategy for implementing parallel processing and high availability through fault tolerance and load balancing.&lt;/p&gt;

&lt;h3&gt;
  
  
  CONTAINER REGISTRY
&lt;/h3&gt;

&lt;p&gt;A central place for your team to manage container images, perform vulnerability analysis, and decide on who has access to what with fine-tuned access controls. During the CI/CD process, developers should have access to all the container images required for an application. Hosting all the container images in a single instance enables users to identify, commit, and pull images when they need to.&lt;/p&gt;

&lt;h3&gt;
  
  
  Content Delivery Network: ( Content Distribution Network/CDN )
&lt;/h3&gt;

&lt;p&gt;A content delivery network (CDN) refers to a geographically distributed group of servers that work together to provide fast delivery of Internet content. A CDN allows for the quick transfer of assets needed for loading Internet content including HTML pages, javascript files, stylesheets, images, and videos.&lt;/p&gt;

&lt;h3&gt;
  
  
  CUSTOMER RELATIONSHIP MANAGEMENT (CRM)
&lt;/h3&gt;

&lt;p&gt;Customer relationship management (CRM) is one of many different approaches that allow a company to manage and analyze its interactions with its past, current, and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.&lt;/p&gt;

&lt;h3&gt;
  
  
  DATA CENTER
&lt;/h3&gt;

&lt;p&gt;Data centers are simply centralized locations where computing and networking equipment is concentrated for the purpose of collecting, storing, processing, distributing, or allowing access to large amounts of data. They have existed in one form or another since the advent of computers.&lt;/p&gt;

&lt;h3&gt;
  
  
  DATA LOSS PREVENTION
&lt;/h3&gt;

&lt;p&gt;Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP software classifies regulated, confidential, and business-critical data and identifies violations of policies defined by organizations or within a predefined policy pack, typically driven by regulatory compliance such as HIPAA, PCI-DSS, or GDPR.&lt;/p&gt;

&lt;h3&gt;
  
  
  DATA MIGRATION
&lt;/h3&gt;

&lt;p&gt;Data migration is the process of selecting, preparing, extracting, and transforming data and permanently transferring it from one computer storage system to another. Additionally, the validation of migrated data for completeness and the decommissioning of legacy data storage are considered part of the entire data migration process.&lt;/p&gt;

&lt;h3&gt;
  
  
  DISASTER RECOVERY PLAN (DRP)
&lt;/h3&gt;

&lt;p&gt;Is the area of security planning that deals with protecting an organization from the effects of major disasters that destroys part or all of its resources; including data records, IT equipment, and the organization’s physical space. A data recovery plan maps the quickest and most effective way work can be resumed after a disaster.&lt;/p&gt;

&lt;h3&gt;
  
  
  DESKTOP AS A SERVICE
&lt;/h3&gt;

&lt;p&gt;Desktops-as-a-Service or simply DaaS securely delivers virtual apps and desktops from the cloud to any device or location. This desktop virtualization solution provisions secure saas and legacy applications as well as full Windows-based virtual desktops and deliver them to your workforce. DaaS offers a simple and predictable pay-as-a-go subscription model, making it easy to scale up or down on-demand. This turnkey service is easy to manage, simplifying many of the IT admin tasks of desktop solutions&lt;/p&gt;

&lt;h3&gt;
  
  
  DevOps
&lt;/h3&gt;

&lt;p&gt;DevOps is a set of practices that works to automate and integrate the processes between software development and IT teams, so they can build, test, and release software faster and more reliably. The term DevOps was formed by combining the words “development” and “operations” and signifies a cultural shift that bridges the gap between development and operation teams, which historically functioned in siloes. &lt;/p&gt;

&lt;h3&gt;
  
  
  DISTRIBUTED COMPUTING
&lt;/h3&gt;

&lt;p&gt;Distributed Computing is a computing concept in which the components of a software system, such as applications and data are distributed among multiple computers to improve performance and efficiency. Distributed computing relies on network services and interoperability standards that specify how they communicate with each other.&lt;/p&gt;

&lt;h3&gt;
  
  
  DATA INTEGRITY
&lt;/h3&gt;

&lt;p&gt;Data integrity is the overall accuracy, completeness, and consistency of data. Data integrity also refers to the safety of data in regards to regulatory compliance — such as GDPR compliance — and security. It is maintained by a collection of processes, rules, and standards implemented during the design phase. When the integrity of data is secure, the information stored in a database will remain complete, accurate, and reliable no matter how long it’s stored or how often it’s accessed. Data integrity also ensures that your data is safe from any outside forces.&lt;/p&gt;

&lt;h3&gt;
  
  
  DNS MANAGER
&lt;/h3&gt;

&lt;p&gt;Is an application that controls the Domain Name System (DNS) records and server clusters enabling domain name owners to control them easily. DNS management software greatly reduces human error when editing repetitive and complex DNS data. Using DNS management, one website can command the services of multiple servers.&lt;/p&gt;

&lt;h3&gt;
  
  
  ELASTICITY
&lt;/h3&gt;

&lt;p&gt;In cloud computing, elasticity is defined as "the degree to which a system can adapt to workload changes by provisioning and de-provisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible”.&lt;/p&gt;

&lt;h3&gt;
  
  
  ELASTIC COMPUTING
&lt;/h3&gt;

&lt;p&gt;ELASTIC COMPUTING is a cloud computing concept where a cloud service provider distributes flexible resources that can either be scaled up or down according to user preferences and needs. It may also refer to the ability to provide flexible resources that can be expanded or resized when needed. Some of the affected resources include bandwidth, storage, and processing power.&lt;/p&gt;

&lt;h3&gt;
  
  
  ENCRYPTION
&lt;/h3&gt;

&lt;p&gt;Encryption is the method by which information is converted into a secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext&lt;/p&gt;

&lt;h3&gt;
  
  
  FAULT TOLERANCE
&lt;/h3&gt;

&lt;p&gt;This refers to the ability of a computer system or component to continue working without loss of service in the event of an unexpected error or problem. Fault tolerance can be achieved with embedded hardware, or software, or a combination of both.&lt;/p&gt;

&lt;h3&gt;
  
  
  FEDERATED DATABASE
&lt;/h3&gt;

&lt;p&gt;This is a system in which multiple databases seemingly function as one entity; however, each component database in the system exists independently of the others and is completely functional and self-sustained. When the federated database receives an application query, the system figures out which of its component databases contain that data being requested and passes the request to it. A federated database is a viable solution to database search issues.&lt;/p&gt;

&lt;h3&gt;
  
  
  FILE SERVER
&lt;/h3&gt;

&lt;p&gt;This is the computer exclusively responsible for the central storage and management of files generated or required by other computers in a client/server model. In an enterprise setting, a file server enables end-users to share information over the network without having to physically transfer files using external storage such as flash disks.&lt;/p&gt;

&lt;h3&gt;
  
  
  FIREWALLS
&lt;/h3&gt;

&lt;p&gt;Cloud Firewalls are software-based, cloud-deployed network devices, built to stop or mitigate unwanted access to private networks. As a new technology, they are designed for modern business needs and sit within online application environments.&lt;/p&gt;

&lt;h3&gt;
  
  
  HIGH AVAILABILITY
&lt;/h3&gt;

&lt;p&gt;High availability is a quality of computing infrastructure that is important for mission-critical systems. High availability permits the computing infrastructure to continue functioning, even when certain components fail.&lt;/p&gt;

&lt;h3&gt;
  
  
  HYBRID CLOUD
&lt;/h3&gt;

&lt;p&gt;A hybrid cloud is a computing environment that combines a public cloud and a private cloud by allowing data and applications to be shared between them. When computing and processing demand fluctuates, hybrid cloud computing gives businesses the ability to seamlessly scale their on-premises infrastructure up to the public cloud to handle any overflow—without giving third-party datacenters access to the entirety of their data.&lt;/p&gt;

&lt;h3&gt;
  
  
  HYPERVISOR
&lt;/h3&gt;

&lt;p&gt;A hypervisor (or virtual machine monitor, VMM, virtualizer) is computer software, firmware, or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine.&lt;/p&gt;

&lt;h3&gt;
  
  
  INFRASTRUCTURE
&lt;/h3&gt;

&lt;p&gt;Infrastructure is a fundamental cloud service alongside Software as a Service and Platform as a Service, which encompasses the provision of virtualized computing resources that are remotely accessed through the internet. The resources are deployed and managed by cloud service providers.&lt;/p&gt;

&lt;h3&gt;
  
  
  INTERNET OF THINGS
&lt;/h3&gt;

&lt;p&gt;IoT refers to an ever-growing network of physical objects provided with unique identifiers (IP address) and the ability to transfer data over a network without any human interference. IoT extends beyond computers, smartphones, and tablets to a diverse range of devices that utilize technology to interact and communicate with the environment in an intelligent fashion, via the internet.&lt;/p&gt;

&lt;h3&gt;
  
  
  INTEGRATED DEVELOPMENT ENVIRONMENT
&lt;/h3&gt;

&lt;p&gt;An integrated development environment (IDE) is a software application that provides comprehensive facilities to computer programmers for software development. An IDE normally consists of at least a source code editor, build automation tools, and a debugger.&lt;/p&gt;

&lt;h3&gt;
  
  
  IMAGES
&lt;/h3&gt;

&lt;p&gt;An image is a complete backup of your server including all volumes. Images are primarily meant for boot disk creation. They optimized for multiple downloads of the same data over and over. If the same image is downloaded many times, after the first download the following downloads are going to be very fast (even for large images).&lt;/p&gt;

&lt;h3&gt;
  
  
  INPUT/OUTPUT OPERATIONS PER SECOND (IOPS)
&lt;/h3&gt;

&lt;p&gt;Input/output operations per second (IOPS, pronounced eye-ops) is an input/output performance measurement used to characterize computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area networks (SAN).&lt;/p&gt;

&lt;h3&gt;
  
  
  LOAD BALANCING
&lt;/h3&gt;

&lt;p&gt;This is a networking solution for distributing computing workloads across multiple resources, like servers. By distributing the workload, a load balance ensures no server will become the single point of failure. When a single server goes offline, the load balancer simply redirects all incoming traffic to the other available servers. Load balancing can be implemented with software, hardware, or a combination of both.&lt;/p&gt;

&lt;h3&gt;
  
  
  LATENCY
&lt;/h3&gt;

&lt;p&gt;Cloud service latency is the delay between a client request and a cloud service provider's response. Latency greatly affects how usable and enjoyable devices and communications are. Those problems can be magnified for cloud service communications, which can be especially prone to latency for several reasons.&lt;/p&gt;

&lt;h3&gt;
  
  
  MULTI-TENANCY
&lt;/h3&gt;

&lt;p&gt;This refers to a software architecture in which a single instance of the software runs on a server and serves multiple tenants. Systems designed in such a manner are often called shared (in contrast to dedicated or isolated). A tenant is a group of users who share common access with specific privileges to the software instance. With a multitenant architecture, a software application is designed to provide every tenant a dedicated share of the instance - including its data, configuration, user management, tenant individual functionality, and non-functional properties.&lt;/p&gt;

&lt;h3&gt;
  
  
  ON DEMAND COMPUTING
&lt;/h3&gt;

&lt;p&gt;On-demand computing is a business computing model in which computing resources are made available to the user on an “as needed” basis. Rather than all at once, on-demand computing allows cloud hosting companies to provide their clients with access to computing resources as they become necessary.&lt;/p&gt;

&lt;h3&gt;
  
  
  ROUTES
&lt;/h3&gt;

&lt;p&gt;Cloud routes define the paths that network traffic takes from a virtual machine (VM) instance to other destinations. These destinations can be inside your Google Cloud Virtual Private Cloud (VPC) network (for example, in another VM) or outside it&lt;/p&gt;

&lt;h3&gt;
  
  
  REDUNDANCY
&lt;/h3&gt;

&lt;p&gt;Data redundancy is a condition created within a database or data storage technology in which the same piece of data is held in two separate places.&lt;br&gt;
This can mean two different fields within a single database or two different spots in multiple software environments or platforms. Whenever data is repeated, it constitutes data redundancy.&lt;/p&gt;

&lt;h3&gt;
  
  
  SCALABILITY
&lt;/h3&gt;

&lt;p&gt;Scalability refers to a system’s ability to maintain full functionality despite a change in size or volume. Unlike elasticity that meets short-term, tactical needs, cloud scalability supports long-term, strategic needs. A scalable application should be able to efficiently function when expanded or shifted to a bigger operating system. Cloud scalability enables businesses to meet the expected demand for services without the need for large up-front infrastructure investments.&lt;/p&gt;

&lt;h3&gt;
  
  
  SERVICE LEVEL AGREEMENT
&lt;/h3&gt;

&lt;p&gt;A service-level agreement (SLA) is a commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed upon between the service provider and the service user.&lt;/p&gt;

&lt;p&gt;SNAPSHOTS&lt;br&gt;
Snapshots are incremental backups, which means that only the blocks on the device that have changed after your most recent snapshot are saved. Snapshots are primarily targeting backup and disaster recovery scenarios, they are cheaper, easier to create (can often be uploaded without stopping the VM). They are meant for frequent regular upload and rare downloads.&lt;/p&gt;

&lt;h3&gt;
  
  
  THROUGHPUT
&lt;/h3&gt;

&lt;p&gt;Throughput is the measure of how fast a given application can transfer data. While throughput is certainly based in part on, and limited by, bandwidth, the two rates aren't the same, even though both are typically measured using bits per second.&lt;/p&gt;

&lt;h3&gt;
  
  
  VIRTUAL PRIVATE CLOUD
&lt;/h3&gt;

&lt;p&gt;A virtual private cloud (VPC) is a secure, isolated private cloud hosted within a public cloud. VPC customers can run code, store data, host websites, and do anything else they could do in an ordinary private cloud, but the private cloud is hosted remotely by a public cloud provider. (Not all private clouds are hosted in this fashion.) VPCs combines the scalability and convenience of public cloud computing with the data isolation of private cloud computing.&lt;/p&gt;

&lt;h3&gt;
  
  
  VIRTUALIZATION
&lt;/h3&gt;

&lt;p&gt;Virtualization is to create a virtual version of a device or resource like an operating system, network, or storage device. Virtualization is making head road in three major areas of IT, server virtualization, storage virtualization, and server virtualization. The core advantage of virtualization is that it enables the management of workloads by significantly transforming traditional computing to make it more scalable. Virtualization allows CSPs to provide server resources as a utility rather than a single product.&lt;/p&gt;

&lt;h3&gt;
  
  
  VIRTUAL MACHINES
&lt;/h3&gt;

&lt;p&gt;A virtual machine (VM) is an image file managed by the hypervisor that exhibits the behavior of a separate computer, capable of performing tasks such as running applications and programs like a separate computer.&lt;br&gt;
In other words, a VM is a software application that performs most functions of a physical computer, actually behaving like a separate computer system.&lt;/p&gt;

&lt;p&gt;A virtual machine, usually known as a guest, is created within another computing environment referred to as a "host." Multiple virtual machines can exist within a single host at one time.&lt;/p&gt;

</description>
      <category>cloudskills</category>
      <category>aws</category>
      <category>googlecloud</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>GET FAMILIAR WITH THESE IMPORTANT HTTP RESPONSE STATUS CODE</title>
      <dc:creator>Kingsley Atanang</dc:creator>
      <pubDate>Sat, 14 Nov 2020 16:51:44 +0000</pubDate>
      <link>https://dev.to/kingo4luv/get-familiar-with-these-important-http-response-status-code-6ap</link>
      <guid>https://dev.to/kingo4luv/get-familiar-with-these-important-http-response-status-code-6ap</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;What are HTTP status codes?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;HTTP status codes are response codes that are returned by web servers along with responses indicating whether a request sent by the client was processed successfully or not. They are part of the HTTP headers and hence are mostly not visible to the users except when they inspect request response from the browser developer's tools network tab.&lt;/p&gt;

&lt;p&gt;There are five classes of HTTP status codes available, and we will take a look at some of the most prevalent in each of them.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Information responses (1xx)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This class of response codes returned by the server does not indicate any form of problem. They communicate that the request was received and understood by the server, and in most cases, the client should wait while it processes the sent request. &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;100 Continue&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;This response code indicates that the server has not rejected the client's request header or request and that the request body should be sent for processing or ignore the response if the request body was complete.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Use case: *&lt;/em&gt; A good example is when a client wants to send large content to the server, it will, first of all, send an &lt;code&gt;Expect: 100 - continue&lt;/code&gt; in the request header to the server. When the server returns a response with a 100 Continue status code, it will now proceed with sending the request body. &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;102 Processing&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;This status code informs the client that the server has received the request and is currently processing it, but has not yet completed it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Successful responses (2xx)
&lt;/h2&gt;

&lt;p&gt;This class of status codes indicates the action requested by the client was received, understood, accepted, and processed successfully.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;200 Ok&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The server returns this status code when the client's request is successful. The server also sends along with the code the requested content in the response body and the content type.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Use case:  *&lt;/em&gt;&lt;br&gt;
GET and PUT requests that require content in the response body should return status code 200 even if the content is an empty array. &lt;br&gt;
If the response has no body, then the &lt;code&gt;204 No Content&lt;/code&gt; response body should be used instead.&lt;/p&gt;

&lt;h3&gt;
  
  
  201 Created
&lt;/h3&gt;

&lt;p&gt;When the server returns status code 201 to the client, it means that the request sent by the client to the server has succeeded, creating one or more resources as a result.  &lt;code&gt;201 Created&lt;/code&gt; response code always contains the newly created resource in the request body. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use case:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;POST or PUT request after creating a new resource. &lt;/li&gt;
&lt;li&gt;The origin server must create the resource before returning the 201 status code. If the action cannot be carried out immediately, the server should respond with a &lt;code&gt;202 Accepted&lt;/code&gt; status code response instead.&lt;/li&gt;
&lt;li&gt;The response may or may not contain the response body.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  202 ACCEPTED
&lt;/h3&gt;

&lt;p&gt;This status code indicates that the server has received the request but has not yet acted upon it, and the client should not expect any further response concerning it since HTTP has no standard way to communicate back the outcome of the request.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use case:&lt;/strong&gt;&lt;br&gt;
It is intended for cases where another process or server handles the request, or for batch processing. In this case, the entity returned with this response should include an indication of the request's current status and either a pointer to a status monitor or some estimate of when the user can expect the request to be fulfilled.&lt;/p&gt;

&lt;p&gt;204 No Content&lt;br&gt;
This response code means that the server, having completed the request, does not need to return a response body.&lt;/p&gt;

&lt;p&gt;Use case:&lt;br&gt;
Request where there is no need to return contents in the response body.&lt;/p&gt;

&lt;h2&gt;
  
  
  Redirection (3xx)
&lt;/h2&gt;

&lt;p&gt;Redirection is the process used to communicate that a resource is no more available in the requested location. There are several HTTP status codes available for redirections, to provide visitors with information about where to find the content they requested.&lt;/p&gt;

&lt;h3&gt;
  
  
  301 Moved permanently
&lt;/h3&gt;

&lt;p&gt;This tells the client that the requested resource has been moved permanently, and then provides the URL to the new location of the resource.&lt;/p&gt;

&lt;h3&gt;
  
  
  302 Found
&lt;/h3&gt;

&lt;p&gt;This status code informs the client that the resource they tried to access is temporarily hosted somewhere else. Because the change is temporary, the client shouldn’t update its links to the new location but keep hitting the endpoint that sent the 302 in case something changed.&lt;/p&gt;

&lt;h2&gt;
  
  
  Client error responses
&lt;/h2&gt;

&lt;p&gt;The 4xx class of status code is intended for cases in which the client seems to have erred. Except when responding to a HEAD request, the server should include an entity containing an explanation of the error situation, and whether it is a temporary or permanent condition. &lt;br&gt;
These status codes apply to any request method. User agents should display any included entity to the user.&lt;/p&gt;

&lt;p&gt;At the 400 level, HTTP status codes start to become problematic. These are error codes specifying that there’s a fault with your browser and/or request.&lt;/p&gt;

&lt;h3&gt;
  
  
  400 Bad request
&lt;/h3&gt;

&lt;p&gt;The server cannot or will not process the request due to an apparent client error (e.g., malformed request syntax, request size too large, invalid request message framing, or deceptive request routing). The client SHOULD NOT repeat the request without modifications.&lt;/p&gt;

&lt;h3&gt;
  
  
  401 Unauthorized
&lt;/h3&gt;

&lt;p&gt;The request requires user authentication. The response MUST include a WWW-Authenticate header field containing a challenge applicable to the requested resource. The client MAY repeat the request with a suitable Authorization header field. If the request already included Authorization credentials, then the 401 response indicates that the included credentials are invalid.&lt;/p&gt;

&lt;h3&gt;
  
  
  403 Forbidden
&lt;/h3&gt;

&lt;p&gt;The server understood the request but is refusing to fulfill it and authorization will not help, so there is no need to repeat the request. If the request method was not HEAD and the server wishes to make public why it did not process the request, it SHOULD describe the reason for the refusal in the returned response. If the server does not want to make this information available to the client, it is proper to use the status code 404 (Not Found) instead.&lt;/p&gt;

&lt;h3&gt;
  
  
  404 Not found
&lt;/h3&gt;

&lt;p&gt;The requested resource could not be found but may be available again in the future. Subsequent requests by the client are permissible.&lt;/p&gt;

&lt;p&gt;In the browser, this means the URL is not recognized. In an API, this can also mean that the endpoint is valid but the resource itself does not exist. Servers may also send this response instead of 403 to hide the existence of a resource from an unauthorized client. This response code is probably the most famous one due to its frequent occurrence on the web&lt;/p&gt;

&lt;h3&gt;
  
  
  405 Method not allowed
&lt;/h3&gt;

&lt;p&gt;The method specified in the Request-Line is not allowed for the resource identified by the Request-URI. For example, using GET on a form that requires data to be sent via POST or using PUT on a read-only resource.&lt;/p&gt;

&lt;p&gt;The response MUST include an Allow header containing a list of valid methods for the requested resource.&lt;/p&gt;

&lt;h3&gt;
  
  
  413 Request entity/payload too large
&lt;/h3&gt;

&lt;p&gt;The server is refusing to process a request because the request entity is larger than the server is willing or able to process. The server MAY close the connection to prevent the client from continuing the request.&lt;br&gt;
If the condition is temporary, the server SHOULD include a Retry-After header field to indicate that it is temporary the client may try again at a specified time.&lt;/p&gt;

&lt;h3&gt;
  
  
  415 Unsupported media type
&lt;/h3&gt;

&lt;p&gt;The server is refusing to service the request because the entity of the request is in a format not supported by the requested resource for the requested method. For example, the client uploads an image as image/svg+xml, but the server requires that images use a different format.&lt;/p&gt;

&lt;h3&gt;
  
  
  429 Too many requests
&lt;/h3&gt;

&lt;p&gt;The 429 status code indicates that the user has sent too many requests in a given amount of time (rate-limiting).&lt;br&gt;
The response representations SHOULD include details explaining the condition and MAY include a Retry-After header indicating how long to wait before making a new request.&lt;br&gt;
When a server is under attack or just receiving a very large number of requests from a single party, responding to each with a 429 status code will consume resources.&lt;br&gt;
Therefore, servers are not required to use the 429 status code; when limiting resource usage, it may be more appropriate to just drop connections, or take other steps.&lt;/p&gt;

&lt;h2&gt;
  
  
  5XX Server error responses
&lt;/h2&gt;

&lt;p&gt;Response status codes beginning with the digit "5" indicate cases in which the server is aware that it has encountered an error or is otherwise incapable of performing the request. Except when responding to a HEAD request, the server should include an entity containing an explanation of the error situation, and indicate whether it is a temporary or permanent condition. Likewise, user agents should display any included entity to the user. These response codes apply to all request methods.&lt;/p&gt;

&lt;h3&gt;
  
  
  500 Server error
&lt;/h3&gt;

&lt;p&gt;This status code indicates that there was an error on the server could not complete the request. This is a generic code that simply means that there an internal server error and it doesn't know how to handle it.&lt;/p&gt;

&lt;p&gt;This code is typically generated by third-party plugins or even the connection to the database breaking. &lt;/p&gt;

&lt;h3&gt;
  
  
  502 Bad gateway
&lt;/h3&gt;

&lt;p&gt;The server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed in attempting to fulfill the request.&lt;/p&gt;

&lt;h3&gt;
  
  
  503 Service unavailable
&lt;/h3&gt;

&lt;p&gt;The server is currently unable to handle the request due to a temporary overloading or maintenance of the server. The implication is that this is a temporary condition which will be alleviated after some delay. If known, the length of the delay MAY be indicated in a Retry-After header. If no Retry-After is given, the client SHOULD handle the response as it would for a 500 response.&lt;/p&gt;

&lt;p&gt;Note: The existence of the 503 status code does not imply that a server must use it when becoming overloaded. Some servers may wish to simply refuse the connection.&lt;/p&gt;

&lt;h3&gt;
  
  
  504 Gateway timeout
&lt;/h3&gt;

&lt;p&gt;The server, acting as a gateway, timed out waiting for another server to respond.” This is the code returned when there are two servers involved in processing a request, and the first server times out waiting for the second server to respond. &lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
