Date Posted : 6 months ago


Cloud Technology  The basic technological concept of Cloud Computing is virtualization (see Figure 4).
Thus the abstract summary and joint management of physical resources. See  for more information.
count e.g. computing power, storage space and networks.

From this ressources pool can be individually and dynamically assigned to specific resources compositions are generated and used as virtual machines (Baun, et al., 2010). The virtualization concept is used to improve the efficiency and availability of resources of a company. The pooling of physical resources, combined with management tools, e.g.
for load distribution, ensures a considerably higher outlet tion of resources. Virtualization is also used at server level in the form of abstraction layer above the hardware, so that different operating systems can run simultaneously. Virtual computers are created, which operated separately from fixed physical resources.


Figure 4: Virtualization concept (based on (ITwissen.info, 2011)) Virtual IT resources are managed dynamically, i.e.
according to demand, via a Network provided and billed when they are actually needed 7 (ondemand).

Instead of a real server, a so-called virtual machine can be rented, whose equipment in terms of memory and pro- The processor performance scales dynamically with the requirements, so it increases and decreases. This means that resources are immediately available at peak loads and are available at low of their needs do not have to be paid.
The actual work is done takes place on the servers on the Internet.

End devices can also be smartphones or netbooks, which themselves only have comparatively low processor and memory capacities.
storage facilities (Dörner, 2011). For example, with additional storage capacity of processing power on an older generation computer HD videos or equip mobile phones with 500 GB of rented storage space. The so-called multi-client capability enables a physical server to or a cloud-hosted application from multiple customers at the same time can be used, whereby the access is limited to their own data remains (Anderson, 2010).