Cloud Computing Reflection
Cloud computing is a computing service via the Internet to facilitate faster innovation, better adaptable
resources, and cost savings. A 16-bit undefined number called the port number is used to identify each
transport layer protocol and address combinations. The User Datagram Protocol and Transmission
Control Protocol are the two most used network protocols that use port numbers. With the accelerating
increase in data, companies are finding it hard to keep their critical information and technologies up and
running on in-house data centers.
The cloud computing course is among several emerging technologies that have enabled individuals and
businesses to access and share resources worldwide over the internet (Linthicum, 2018). As a computer
scientist, I have been made to interact with and learn about various cloud computing platforms both at my
future places of work and at my current learning institution. This has enabled me to learn that cloud
service providers are used to store vital information for various users, individuals, and businesses at a fee
depending on the Infrastructure used and the amount of information stored on the cloud computing
storage infrastructures. This course has also been vital in my learning because I have been able to learn
various types of cloud infrastructures and models through it. Also, I have learned about the various types
of cloud storage deployment models such as community, hybrid, and private cloud. Some of the cloud
infrastructures that I have been able to learn to include Infrastructure as a service (IA as), Platform as a
service (PaaS), and Software as a service (SaaS). I have some the cloud storage services such as
Microsoft, Google, and Amazon (Bauer, 2018).
This computer science course has offered a broad base of information that has greatly benefited me,
especially concerning cloud computing and its various benefits to businesses (Yousif, 2016). My future
wish is to work as a software developer where I will be concerned with deploying and building custom
applications for desktops, web, and mobile phones based on clients' various needs. Recently, I managed to
work for an e-commerce firm that deals with an online business. The firm had its website hosted at the
Amazon cloud computing service provider. This cloud computing service provider is responsible for
offering both Platforms (PaaS) and Infrastructure as a service (IA as), which are relevant for this task
because of the amount of data and users (Alsadah & Alhajjaj, 2019).
I learned various concepts, skills, and ideas through cloud computing course studies, and such concepts
and skills can be applied practically in our workstations. Through my course studies, the concept of
developing a security level to secure sensitive information was thought. Data privacy plays a significant
role in cloud computing since it promotes trust among employees and customers. Therefore, as a
security analyst, it is important to ensure security is at the top since it determines the level of integrity.
Based on the same topic of implementing security levels in cloud computing, an organization should be
better positioned to analyze the type of cloud-based service providers since they can determine the
level of information security (Jamsa, 2012). Cloud-based service providers are responsible for
implementing security mechanisms. Therefore, failure to choose or select the appropriate cloud-based
service providers can subject an organization to a high risk of threats and vulnerabilities. Through the
course text, the topic of outlining the basic elements of service level agreement was demonstrated.