Misplaced Pages

Software as a service

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
#838161

114-422: Software as a service ( SaaS / s æ s / ) is a cloud computing service model where the provider offers use of application software to a client and manages all needed physical and software resources. Unlike other software delivery models, it separates "the possession and ownership of software from its use". SaaS use began around 2000, and by 2023 was the main form of software application deployment. SaaS

228-892: A dialogic transmission system (many sources to many receivers) while traditional media operate under a monologic transmission model (one source to many receivers). For instance, a newspaper is delivered to many subscribers, and a radio station broadcasts the same programs to a city. Social media has been criticized for a range of negative impacts on children and teenagers, including exposure to inappropriate content, exploitation by adults, sleep problems, attention problems, feelings of exclusion, and various mental health maladies. Social media has also received criticism as worsening political polarization and undermining democracy . Major news outlets often have strong controls in place to avoid and fix false claims, but social media's unique qualities bring viral content with little to no oversight. "Algorithms that track user engagement to prioritize what

342-465: A business the potential to reduce IT operational costs by outsourcing hardware and software maintenance and support to the cloud provider. This enables the business to reallocate IT operations costs away from hardware/software spending and from personnel expenses, towards meeting other goals. In addition, with applications hosted centrally, updates can be released without the need for users to install new software. One drawback of SaaS comes with storing

456-534: A capital expenditure to an operating expenditure . The process of migration to SaaS and supporting it can also be a significant cost that must be accounted for. A challenge for SaaS providers is that demand is not known in advance. Their system must have enough slack to be able to handle all users without turning any away, but without paying for too many resources that will be unnecessary. If resources are static, they are guaranteed to be wasted during non-peak time. Sometimes cheaper off-peak rates are offered to balance

570-917: A pay-as-you-go basis. Penguin Computing launched its HPC cloud in 2016 as an alternative to Amazon's EC2 Elastic Compute Cloud, which uses virtualized computing nodes. Social media Social media are interactive technologies that facilitate the creation , sharing and aggregation of content (such as ideas, interests, and other forms of expression) amongst virtual communities and networks . Common features include: The term social in regard to media suggests platforms enable communal activity. Social media can enhance and extend human networks. Users access social media through web-based apps or custom apps on mobile devices. These interactive platforms allow individuals, communities, and organizations to share, co-create, discuss, participate in, and modify user-generated or self-curated content. Social media

684-436: A web browser as a publicly available web application . This means that customers can access the application anywhere from any device without needing to install or update it. SaaS providers often try to minimize the difficulty of signing up for the product. Many capitalize on the service-oriented structure to respond to customer feedback and evolve their product quickly to meet demands. This can enable customers to believe in

798-493: A wide area network . SaaS architecture varies significantly from product to product. Nevertheless, most SaaS providers offer a multi-tenant architecture. With this model, a single version of the application, with a single configuration ( hardware , network , operating system ), is used for all customers ("tenants"). This means that the company does not need to support multiple versions and configurations. The architectural shift from each customer running their own version of

912-456: A Service" , "Communications as a Service", "Compute as a Service", and " Data Storage as a Service" . Infrastructure as a service (IaaS) refers to online services that provide high-level APIs used to abstract various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup, etc. A hypervisor runs the virtual machines as guests. Pools of hypervisors within

1026-468: A Service) and dPaaS (Data Platform as a Service) . iPaaS enables customers to develop, execute and govern integration flows. Under the iPaaS integration model, customers drive the development and deployment of integrations without installing or managing any hardware or middleware. dPaaS delivers integration—and data-management—products as a fully managed service. Under the dPaaS model, the PaaS provider, not

1140-451: A cloud platform instead of directly buying and managing the underlying hardware and software layers. With some PaaS, the underlying computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually. Some integration and data management providers also use specialized applications of PaaS as delivery models for data. Examples include iPaaS (Integration Platform as

1254-469: A considerable amount of computing power and memory and are traditionally executed on clusters of computers. In 2016 a handful of companies, including R-HPC, Amazon Web Services , Univa , Silicon Graphics International , Sabalcore, Gomput, and Penguin Computing offered a high-performance computing cloud. The Penguin On Demand (POD) cloud was one of the first non-virtualized remote HPC services offered on

SECTION 10

#1732773021839

1368-405: A development environment to application developers. The provider typically develops toolkit and standards for development and channels for distribution and payment. In the PaaS models, cloud providers deliver a computing platform , typically including an operating system, programming-language execution environment, database, and the web server. Application developers develop and run their software on

1482-591: A distributed set of machines in different locations, connected to a single network or hub service. It is possible to distinguish between two types of distributed clouds: public-resource computing and volunteer cloud. Multicloud is the use of multiple cloud computing services in a single heterogeneous architecture to reduce reliance on single vendors, increase flexibility through choice, mitigate against disasters, etc. It differs from hybrid cloud in that it refers to multiple cloud services, rather than multiple deployment modes (public, private, legacy). Poly cloud refers to

1596-560: A form of virtualized computing." according to ISO . Function as a service is a form of serverless computing. The deployment of services to the cloud is referred to as cloud migration. Reverse cloud migration, also known as cloud repatriation, refers to moving cloud-based workloads back to on-premises infrastructures including enterprise data centers, colocation providers, and managed service providers. Cloud repatriation occurs due to security concerns, costs, performance issues, compatibility problems, and uptime concerns. Private cloud

1710-644: A fraction of the cost of traditional marketing campaigns. Nonprofit organizations and activists may also attempt to spread content virally. Social media sites provide specific functionality to help users re-share content, such as X 's and Facebook 's "like" option. Bots are automated programs that operate on the internet . They automate many communication tasks. This has led to the creation of an industry of bot providers. Chatbots and social bots are programmed to mimic human interactions such as liking, commenting, and following. Bots have also been developed to facilitate social media marketing . Bots have led

1824-464: A greater extent. Many systems use a combination of both approaches, pooling some resources and siloing others. Other companies group multiple tenants into pods and share resources between them. In the United States, constitutional search warrant laws do not protect all forms of SaaS dynamically stored data. The result is that governments may be able to request data from SaaS providers without

1938-472: A media studio for business users, after YouTube's Creator Studio. The discussion platform Reddit added an integrated image hoster replacing the external image sharing platform Imgur , and then an internal video hosting service, followed by image galleries (multiple images in a single post), known from Imgur. Imgur implemented video sharing. YouTube rolled out a Community feature, for sharing text-only posts and polls . According to Statista , it

2052-564: A per-tenant basis, rather than shared between all tenants. Routing functionality is necessary to direct tenant requests to the appropriate services. Some SaaS products do not share any resources between tenants—called siloing. Although this negates many of the efficiency benefits of SaaS, it makes it easier to migrate legacy software to SaaS and is sometimes offered as a premium offering at a higher price. Pooling all resources might make it possible to achieve higher efficiency, but an outage affects all customers so availability must be prioritized to

2166-400: A perpetual license for a certain version of the software. There are no specific software development practices that distinguish SaaS from other application development, although there is often a focus on frequent testing and releases. Infrastructure as a service (IaaS) is the most basic form of cloud computing , where infrastructure resources—such as physical computers—are not owned by

2280-488: A positive relationship with social media, while emotional stability has a negative sloping relationship with social media. A 2015 study reported that people with a higher social comparison orientation appear to use social media more heavily than people with low social comparison orientation. Common Sense Media reported that children under age 13 in the United States use social networking services although many social media sites require users to be 13 or older. In 2017,

2394-717: A report by Gartner , a survey of 200 IT leaders revealed that 69% experienced budget overruns in their organizations' cloud expenditures during 2023. Conversely, 31% of IT leaders whose organizations stayed within budget attributed their success to accurate forecasting and budgeting, proactive monitoring of spending, and effective optimization. Typically, cloud providers' Service Level Agreements (SLAs) do not encompass all forms of service interruptions. Exclusions typically include planned maintenance, downtime resulting from external factors such as network issues, human errors , like misconfigurations, natural disasters , force majeure events, or security breaches . Typically, customers bear

SECTION 20

#1732773021839

2508-515: A result, Compaq decided to sell server hardware to internet service providers . In the 2000s, the application of cloud computing began to take shape with the establishment of Amazon Web Services (AWS) in 2002, which allowed developers to build applications independently. In 2006 Amazon Simple Storage Service, known as Amazon S3 , and the Amazon Elastic Compute Cloud (EC2) were released. In 2008 NASA 's development of

2622-728: A service that extends AWS infrastructure, services, APIs , and tools to customer data centers, co-location spaces, or on-premises facilities. Advocates of public and hybrid clouds claim that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand, providing burst computing capability: high computing power at certain periods of peak demand. Additional value propositions of cloud computing include: One of

2736-511: A significant physical footprint, requiring allocations of space, hardware, and environmental controls. These assets have to be refreshed periodically, resulting in additional capital expenditures. They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept". Cloud services are considered "public" when they are delivered over

2850-542: A single attack—a process he called "hyperjacking". Some examples of this include the Dropbox security breach, and iCloud 2014 leak. Dropbox had been breached in October 2014, having over seven million of its users passwords stolen by hackers in an effort to get monetary value from it by Bitcoins (BTC). By having these passwords, they are able to read private data as well as have this data be indexed by search engines (making

2964-421: A specific community with common concerns (security, compliance, jurisdiction, etc.), whether it is managed internally or by a third-party, and hosted internally or externally, the costs are distributed among fewer users compared to a public cloud (but more than a private cloud). As a result, only a portion of the potential cost savings of cloud computing is achieved. A cloud computing platform can be assembled from

3078-440: A specific time. A human writes a post content and the bot posts it a specific time. In other cases, cyborgs spread fake news . Cyborgs may work as sock puppets , where one human pretends to be someone else, or operates multiple accounts, each pretending to be a person. A multitude of United States patents are related to social media, growing rapidly. As of 2020 , over 5000 social media patent applications had been published in

3192-487: A thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. In the software as a service (SaaS) model, users gain access to application software and databases . Cloud providers manage

3306-496: A variable number of users while providing the instant and continual availability that customers expect. Most end users consume only the SaaS product and do not have to worry about the technical complexity of the physical hardware and operating system. Because cloud resources can be accessed without any human interactions, SaaS customers are provided with the abstraction of limitless computing resources, while economy of scale drives down

3420-539: Is a need for understanding complex technologies and their interconnections to have power and agency within them. The metaphor of the cloud can be seen as problematic as cloud computing retains the aura of something noumenal and numinous ; it is something experienced without precisely understanding what it is or how it works. Additionally, cloud migration is a significant challenge. This process involves transferring data, applications, or workloads from one cloud environment to another, or from on-premises infrastructure to

3534-539: Is a relatively recent model in cloud computing, with most BaaS startups dating from 2011 or later but trends indicate that these services are gaining significant mainstream traction with enterprise consumers. "Serverless computing is a cloud service category in which the customer can use different cloud capabilities types without the customer having to provision, deploy and manage either hardware or software resources, other than providing customer application code or providing customer data. Serverless computing represents

Software as a service - Misplaced Pages Continue

3648-552: Is cloud infrastructure operated solely for a single organization, whether managed internally or by a third party, and hosted either internally or externally. Undertaking a private cloud project requires significant engagement to virtualize the business environment, and requires the organization to reevaluate decisions about existing resources. It can improve business, but every step in the project raises security issues that must be addressed to prevent serious vulnerabilities. Self-run data centers are generally capital intensive. They have

3762-472: Is commonly used to support this release schedule. Many SaaS developers use test-driven development , or otherwise emphasize frequent software testing , because of the need to ensure availability of their service and rapid deployment. Domain-driven design , in which business goals drive development, is popular because SaaS products must sell themselves to the customer by being useful. SaaS developers do not know in advance which devices customers will try to access

3876-409: Is estimated that, in 2022, around 3.96 billion people were using social media globally. This number is up from 3.6 billion in 2020. The following is a list of the most popular social networking services based on the number of active users as of January 2024 per Statista . A 2009 study suggested that individual differences may help explain who uses social media: extraversion and openness have

3990-422: Is in charge of directing the system and covers functionality such as tenant onboarding, billing, and metrics, as well as the system used by the SaaS provider to configure, manage, and operate the service. Many SaaS products are offered at different levels of service for different prices, called tiering . This can also affect the architecture for both planes, although it is commonly placed in the control plane. Unlike

4104-427: Is in the cloud at any time. It could accidentally or deliberately alter or delete information. Many cloud providers can share information with third parties if necessary for purposes of law and order without a warrant. That is permitted in their privacy policies, which users must agree to before they start using cloud services. Solutions to privacy include policy and legislation as well as end-users' choices for how data

4218-489: Is more secure for them to use a public cloud. There is the risk that end users do not understand the issues involved when signing on to a cloud service (persons sometimes do not read the many pages of the terms of service agreement, and just click "Accept" without reading). This is important now that cloud computing is common and required for some services to work, for example for an intelligent personal assistant (Apple's Siri or Google Assistant ). Fundamentally, private cloud

4332-496: Is no hypervisor overhead. IaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage , file or object storage , firewalls, load balancers , IP addresses , virtual local area networks (VLANs), and software bundles. The NIST 's definition of cloud computing describes IaaS as "where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control

4446-454: Is reduced visibility and control. Cloud users may not have full insight into how their cloud resources are managed, configured, or optimized by their providers. They may also have limited ability to customize or modify their cloud services according to their specific needs or preferences. Complete understanding of all technology may be impossible, especially given the scale, complexity, and deliberate opacity of contemporary systems; however, there

4560-463: Is responsible for software updates , including security patches , and for protecting the customers' data. SaaS systems inherently have a greater latency than software run on-premises due to the time for network packets to be delivered to the cloud facility. This can be prohibitive for some uses, such as time-sensitive industrial processes or warehousing. The rise of SaaS products is one factor leading many companies switched from budgeting for IT as

4674-479: Is seen as more secure with higher levels of control for the owner, however public cloud is seen to be more flexible and requires less time and money investment from the user. The attacks that can be made on cloud computing systems include man-in-the middle attacks, phishing attacks, authentication attacks, and malware attacks. One of the largest threats is considered to be malware attacks, such as Trojan horses . Recent research conducted in 2022 has revealed that

Software as a service - Misplaced Pages Continue

4788-610: Is shown tend to favor content that spurs negative emotions like anger and outrage. Overall, most online misinformation originates from a small minority of “superspreaders,” but social media amplifies their reach and influence." The PLATO system was launched in 1960 at the University of Illinois and subsequently commercially marketed by Control Data Corporation . It offered early forms of social media features with innovations such as Notes, PLATO's message-forum application; TERM-talk, its instant-messaging feature; Talkomatic , perhaps

4902-487: Is stored. Users can encrypt data that is processed or stored within the cloud to prevent unauthorized access. Identity management systems can also provide practical solutions to privacy concerns in cloud computing. These systems distinguish between authorized and unauthorized users and determine the amount of data that is accessible to each entity. The systems work by creating and describing identities, recording activities, and getting rid of unused identities. According to

5016-468: Is transparent to the cloud user, who sees only a single access-point. To accommodate a large number of cloud users, cloud applications can be multitenant , meaning that any machine may serve more than one cloud-user organization. The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so prices become scalable and adjustable if users are added or removed at any point. It may also be free. Proponents claim that SaaS gives

5130-956: Is used to document memories, learn, and form friendships. They may be used to promote people, companies, products, and ideas. Social media can be used to consume, publish, or share news . Popular social media platforms with over 100 million registered users include Twitter , Facebook , WeChat , ShareChat , Instagram , Pinterest , QZone , Weibo , VK , Tumblr , Baidu Tieba , Threads and LinkedIn . Depending on interpretation, other popular platforms that are sometimes referred to as social media services include YouTube , Letterboxd , QQ , Quora , Telegram , WhatsApp , Signal , LINE , Snapchat , Viber , Reddit , Discord , and TikTok . Wikis are examples of collaborative content creation. Social media outlets differ from old media (e.g. newspapers , TV , and radio broadcasting ) in many ways, including quality, reach , frequency , usability, relevancy, and permanence. Social media outlets operate in

5244-507: Is usually accessed via a web application . Unlike most self-hosted software products, only one version of the software exists and only one operating system and configuration is supported. SaaS products typically run on rented infrastructure as a service (IaaS) or platform as a service (PaaS) systems including hardware and sometimes operating systems and middleware , to accommodate rapid increases in usage while providing instant and continuous availability to customers. SaaS customers have

5358-670: The National Institute of Standards and Technology (NIST) identified five "essential characteristics" for cloud systems. Below are the exact definitions according to NIST: By 2023, the International Organization for Standardization (ISO) had expanded and refined the list. The history of cloud computing extends back to the 1960s, with the initial concepts of time-sharing becoming popularized via remote job entry (RJE). The "data center" model, where users submitted jobs to operators to run on mainframes,

5472-665: The Telescript environment could "go". The metaphor is credited to David Hoffman, a General Magic communications specialist, based on its long-standing use in networking and telecom. The expression cloud computing became more widely known in 1996 when Compaq Computer Corporation drew up a business plan for future computing and the Internet . The company's ambition was to supercharge sales with "cloud computing-enabled applications". The business plan foresaw that online consumer file storage would likely be commercially successful. As

5586-493: The United States Department of Homeland Security use social media data as influencing factors during the visa process, and monitor individuals after they have entered the country. CPB officers have also been documented performing searches of electronics and social media behavior at the border, searching both citizens and non-citizens without first obtaining a warrant. As social media gained momentum among

5700-559: The marketing industry into an analytical crisis, as bots make it difficult to differentiate between human interactions and bot interactions. Some bots violate platforms' terms of use , which can result in bans and campaigns to eliminate bots categorically. Bots may even pose as real people to avoid prohibitions. ' Cyborgs '—either bot-assisted humans or human-assisted bots —are used for both legitimate and illegitimate purposes, from spreading fake news to creating marketing buzz . A common use claimed to be legitimate includes posting at

5814-399: The network etiquette (or " netiquette ") described in a 1982 handbook on computing at MIT 's Artificial Intelligence Laboratory . ARPANET evolved into the Internet in the 1990s. Usenet , conceived by Tom Truscott and Jim Ellis in 1979 at the University of North Carolina at Chapel Hill and Duke University , was the first open social media app, established in 1980. A precursor of

SECTION 50

#1732773021839

5928-473: The "backend" as a service (m) model, also known as "mobile backend as a service" (MBaaS), web app and mobile app developers are provided with a way to link their applications to cloud storage and cloud computing services with application programming interfaces (APIs) exposed to their applications and custom software development kits (SDKs). Services include user management, push notifications , integration with social networking services and more. This

6042-512: The Cloud Security Alliance, the top three threats in the cloud are Insecure Interfaces and APIs , Data Loss & Leakage , and Hardware Failure —which accounted for 29%, 25% and 10% of all cloud security outages respectively. Together, these form shared technology vulnerabilities. In a cloud provider platform being shared by different users, there may be a possibility that information belonging to different customers resides on

6156-491: The Trojan horse injection method is a serious problem with harmful impacts on cloud computing systems. The National Institute of Standards and Technology recognized three cloud service models in 2011: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The International Organization for Standardization (ISO) later identified additional models in 2023, including "Network as

6270-478: The United States. Only slightly over 100 patents had been issued. As an instance of technological convergence , various social media platforms adapted functionality beyond their original scope, increasingly overlapping with each other. Examples are the social hub site Facebook launching an integrated video platform in May 2007, and Instagram , whose original scope was low-resolution photo sharing, introducing

6384-435: The ability to share quarter-minute 640×640 pixel videos (later extended to a minute with increased resolution). Instagram later implemented stories (short videos self-destructing after 24 hours), a concept popularized by Snapchat , as well as IGTV , for seekable videos. Stories were then adopted by YouTube . X , whose original scope was text-based microblogging, later adopted photo sharing, then video sharing, then

6498-418: The abstraction of limitless computing resources, while economy of scale drives down the cost. SaaS architectures are typically multi-tenant ; usually they share resources between clients for efficiency, but sometimes they offer a siloed environment for an additional fee. Common SaaS revenue models include freemium , subscription , and usage-based fees. Unlike traditional software, it is rarely possible to buy

6612-556: The advantages include reduced upfront cost, increased flexibility, and lower overall cost compared to traditional software with perpetual software licenses . In some cases, the steep one-time cost demanded by sellers of traditional software were out of the reach of smaller businesses , but pay-per-use SaaS models makes the software affordable. Usage may be charged based on the number of users, transactions, amount of storage spaced used, or other metrics. Many buyers prefer pay-per-usage because they believe that they are relatively light users of

6726-503: The advent of Web 2.0 . Social media started in the mid-1990s with the invention of platforms like GeoCities , Classmates.com , and SixDegrees.com . While instant messaging and chat clients existed at the time, SixDegrees was unique as it was the first online service designed for people to connect using their actual names instead of anonymously. It boasted features like profiles, friends lists, and school affiliations, making it "the very first social networking site". The platform's name

6840-456: The application plane, the services in the control plane are not designed for multitenancy. The application plane—which varies a great deal depending on the nature of the product—implements the core functionality of the SaaS product. Key design issues include separating different tenants so they cannot view or change other tenants' data or resources. Except for the simplest SaaS applications, some microservices and other resources are allocated on

6954-426: The application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support. Cloud applications differ from other applications in their scalability—which can be achieved by cloning tasks onto multiple virtual machines at run-time to meet changing work demand. Load balancers distribute the work over the set of virtual machines. This process

SECTION 60

#1732773021839

7068-632: The availability of smartphones. As of 2023 as many as 4.76 billion people used social media some 59% of the global population. A 2015 review identified four features unique to social media services: In 2019, Merriam-Webster defined social media as "forms of electronic communication (such as websites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (such as videos)." Social media encompasses an expanding suite of services: Some services offer more than one type of service. Mobile social media refers to

7182-546: The benefits of multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed and/or dedicated services with cloud resources. Gartner defines a hybrid cloud service as a cloud computing service that is composed of some combination of private, public and community cloud services, from different service providers. A hybrid cloud service crosses isolation and provider boundaries so that it cannot be simply put in one category of private, public, or community cloud service. It allows one to extend either

7296-466: The business can be placed in jeopardy. The ease of canceling a subscription and switching to a competitor leave customers with the leverage to get concessions from the seller. While recurring revenues can help the business and attract investors, the need for customer service skills in convincing the customer to renew their subscription is a challenge for providers switching to subscription from other revenue models. SaaS products are typically accessed via

7410-483: The capabilities of the enterprise to deliver a specific business service through the addition of externally available public cloud services. Hybrid cloud adoption depends on a number of factors such as data security and compliance requirements, level of control needed over data, and the applications an organization uses. Another example of hybrid cloud is one where IT organizations use public cloud computing resources to meet temporary capacity needs that can not be met by

7524-441: The capacity or the capability of a cloud service, by aggregation, integration or customization with another cloud service. Varied use cases for hybrid cloud composition exist. For example, an organization may store sensitive client data in house on a private cloud application, but interconnect that application to a business intelligence application provided on a public cloud as a software service. This example of hybrid cloud extends

7638-440: The cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. PaaS vendors offer

7752-407: The cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the number of resources allocated and consumed. The NIST 's definition of cloud computing defines Platform as a Service as: The capability provided to the consumer is to deploy onto

7866-495: The cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements. Linux containers run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. The use of containers offers higher performance than virtualization because there

7980-452: The cloud provider, the company typically does not offer monetary compensation. Instead, eligible users may receive credits as outlined in the corresponding SLA. Cloud computing abstractions aim to simplify resource management, but leaky abstractions can expose underlying complexities. These variations in abstraction quality depend on the cloud vendor, service and architecture . Mitigating leaky abstractions requires users to understand

8094-502: The cloud. Cloud migration can be complicated, time-consuming, and expensive, particularly when there are compatibility issues between different cloud platforms or architectures. If not carefully planned and executed, cloud migration can lead to downtime, reduced performance, or even data loss. Applications hosted in the cloud are susceptible to the fallacies of distributed computing , a series of misconceptions that can lead to significant issues in software development and deployment. In

8208-700: The continued improvement of the product and help the SaaS provider get customers from an established traditional software company that likely can offer a deeper feature set. Although on-premises software is often less secure than SaaS alternatives, security and privacy are among the main reasons cited by companies that do not adopt SaaS products. SaaS companies have to protect their publicly available offerings from abuse, including denial-of-service attacks and hacking. They often use technologies such as access control , authentication , and encryption to protect data confidentiality . Nevertheless, not all companies trust SaaS providers to keep sensitive data secured. The vendor

8322-602: The coronavirus disease 2019 pandemic and pediatric critical care." However others in the medical community were concerned about social media addiction, as it became an increasingly important context and therefore "source of social validation and reinforcement" and were unsure whether increased social media use was harmful. Governments may use social media to (for example): Social media has been used extensively in civil and criminal investigations . It has also been used to search for missing persons. Police departments often make use of official social media accounts to engage with

8436-436: The cost. Another key feature of cloud computing is that software updates can be rolled out and made available to all customers nearly instantaneously. In 2019, SaaS was estimated to make up the plurality, 43 percent, of the cloud computing market while IaaS and PaaS combined account for approximately 25 percent. In the 1960s, multitasking was invented, enabling mainframe computers to serve multiple users simultaneously. Over

8550-444: The customer, manages the development and execution of programs by building data applications for the customer. dPaaS users access data through data-visualization tools. The NIST 's definition of cloud computing defines Software as a Service as: The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure . The applications are accessible from various client devices through either

8664-440: The data is in the cloud initially hampered adoption of cloud for big data , but now that much data originates in the cloud and with the advent of bare-metal servers , the cloud has become a solution for use cases including business analytics and geospatial analysis . HPC cloud refers to the use of cloud computing services and infrastructure to execute high-performance computing (HPC) applications. These applications consume

8778-559: The electronic bulletin board system (BBS), known as Community Memory , appeared by 1973. Mainstream BBSs arrived with the Computer Bulletin Board System in Chicago, which launched on February 16, 1978. Before long, most major US cities had more than one BBS, running on TRS-80 , Apple II , Atari 8-bit computers , IBM PC , Commodore 64 , Sinclair , and others. CompuServe , Prodigy , and AOL were three of

8892-425: The firm conducted a survey of parents of children from birth to age 8 and reported that 4% of children at this age used social media sites such as Instagram , Snapchat , or (now-defunct) Musical.ly "often" or "sometimes". Their 2019 survey surveyed Americans ages 8–16 and reported that about 31% of children ages 8–12 use social media. In that survey, teens aged 16–18 were asked when they started using social media.

9006-403: The first online chat room ; News Report, a crowdsourced online newspaper, and blog and Access Lists, enabling the owner of a note file or other application to limit access to a certain set of users, for example, only friends, classmates, or co-workers. ARPANET , which came online in 1969, had by the late 1970s enabled exchange of non-government/business ideas and communication, as evidenced by

9120-565: The first open-source software for deploying private and hybrid clouds. The following decade saw the launch of various cloud services. In 2010, Microsoft launched Microsoft Azure , and Rackspace Hosting and NASA initiated an open-source cloud-software project, OpenStack . IBM introduced the IBM SmartCloud framework in 2011, and Oracle announced the Oracle Cloud in 2012. In December 2019, Amazon launched AWS Outposts,

9234-864: The first SaaS products to be mass-marketed to consumers. The market for SaaS grew rapidly throughout the early twenty-first century. Initially viewed as a technological innovation, SaaS has come to be perceived more as a business model. By 2023, SaaS had become the primary method that companies deliver applications. Popular consumer SaaS products include all social media websites, email services like Gmail and its associated Google Docs Editors , Skype , Dropbox , and entertainment products like Netflix and Spotify . Enterprise SaaS products include Salesforce 's customer relationship management (CRM) software, SAP Cloud Platform , and Oracle Cloud Enterprise Resource Planning . Some SaaS providers offer free services to consumers that are funded by means such as advertising , affiliate marketing , or selling consumer data. One of

9348-430: The functionality of the solutions, cost , integrational and organizational aspects as well as safety & security are influencing the decision of enterprises and organizations to choose a public cloud or on-premises solution. Hybrid cloud is a composition of a public cloud and a private environment, such as a private cloud or on-premises resources, that remain distinct entities but are bound together, offering

9462-479: The general public to collect information regarding corona virus pandemics in various perspectives. During these days, people are forced to stay at home and the social media have connected and supported awareness and pandemic updates." Healthcare workers and systems became more aware of social media as a place people were getting health information: "During the COVID-19 pandemic, social media use has accelerated to

9576-410: The implementation details and limitations of the cloud services they utilize. Service lock-in within the same vendor occurs when a customer becomes dependent on specific services within a cloud vendor, making it challenging to switch to alternative services within the same vendor when their needs change. Cloud computing poses privacy concerns because the service provider can access the data that

9690-679: The information public). There is the problem of legal ownership of the data (If a user stores some data in the cloud, can the cloud provider profit from it?). Many Terms of Service agreements are silent on the question of ownership. Physical control of the computer equipment (private cloud) is more secure than having the equipment off-site and under someone else's control (public cloud). This delivers great incentive to public cloud computing service providers to prioritize building and maintaining strong management of secure services. Some small businesses that do not have expertise in IT security could find that it

9804-403: The infrastructure and platforms that run the applications. SaaS is sometimes referred to as "on-demand software" and is usually priced on a pay-per-use basis or using a subscription fee. In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where

9918-693: The largest BBS companies and were the first to migrate to the Internet in the 1990s. Between the mid-1980s and the mid-1990s, BBSes numbered in the tens of thousands in North America alone. Message forums were the signature BBS phenomenon throughout the 1980s and early 1990s. In 1991, Tim Berners-Lee integrated HTML hypertext software with the Internet, creating the World Wide Web . This breakthrough led to an explosion of blogs , list servers , and email services. Message forums migrated to

10032-399: The load and reduce waste. The expectation for continuous service is so high that outages in SaaS software are often reported in the news. There are not specific software development practices that differentiate SaaS from other application development. SaaS products are often released early and often to take advantage of the flexibility of the SaaS delivery model. Agile software development

10146-480: The main challenges of cloud computing, in comparison to more traditional on-premises computing, is data security and privacy. Cloud users entrust their sensitive data to third-party providers, who may not have adequate measures to protect it from unauthorized access, breaches, or leaks. Cloud users also face compliance risks if they have to adhere to certain regulations or standards regarding data protection, such as GDPR or HIPAA . Another challenge of cloud computing

10260-669: The median age was 14, although 28% said they started to use it before reaching 13. Social media played a role in communication during the COVID-19 pandemic . In June 2020, a survey by Cartoon Network and the Cyberbullying Research Center surveyed Americans tweens (ages 9–12) and reported that the most popular application was YouTube (67%). (as age increased, tweens were more likely to have used social media apps and games.) Similarly, Common Sense Media's 2020 survey of Americans ages 13–18 reported that YouTube

10374-427: The most popular models for Internet start-ups and mobile apps is freemium , where the company charges for continued use or a higher level of service. Even if the user never upgrades to the paid version, it helps the company capture a higher market share and displace customers from a rival. However, the company's hosting cost increases with the number of users, regardless of whether it is successful at enticing them to use

10488-461: The next decade, timesharing became the main business model for computing, and cluster computing enabled multiple computers to work together. Cloud computing emerged in the late 1990s with companies like Amazon (1994), Salesforce (1999), and Concur (1993) offering Internet -based applications on a pay-per-use basis. All of these focused on a single product to seize a high market share . Beginning with Gmail in 2004, email services were some of

10602-470: The owner's consent. Certain open-source licenses such as GPL-2.0 do not explicitly grant rights permitting distribution as a SaaS product in Germany. Cloud computing "Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand." according to ISO . In 2011,

10716-599: The paid version. Another common model is where the free version only provides demonstration ( crippleware ). Online marketplaces may charge a fee on transactions to cover the SaaS provider costs. It used to be more common for SaaS products to be offered for a one-time cost, but this model is declining in popularity. A few SaaS products have open source code, called open SaaS. This model can provide advantages such as reduced deployment cost, less vendor commitment, and more portable applications. The most common SaaS revenue models involve subscription and pay for usage. For customers,

10830-564: The point of becoming a ubiquitous part of modern healthcare systems." This also led to the spread of disinformation . On December 11, 2020, the CDC put out a "Call to Action: Managing the Infodemic ". Some healthcare organizations used hashtags as interventions and published articles on their Twitter data: "Promotion of the joint usage of #PedsICU and #COVID19 throughout the international pediatric critical care community in tweets relevant to

10944-491: The potential to spread virally , an analogy for the way viral infections spread contagiously from individual to individual. One user spreads a post across their network, which leads those users to follow suit. A post from a relatively unknown user can reach vast numbers of people within hours. Virality is not guaranteed; few posts make the transition. Viral marketing campaigns are particularly attractive to businesses because they can achieve widespread advertising coverage at

11058-733: The private cloud. This capability enables hybrid clouds to employ cloud bursting for scaling across clouds. Cloud bursting is an application deployment model in which an application runs in a private cloud or data center and "bursts" to a public cloud when the demand for computing capacity increases. A primary advantage of cloud bursting and a hybrid cloud model is that an organization pays for extra compute resources only when they are needed. Cloud bursting enables data centers to create an in-house IT infrastructure that supports average workloads, and use cloud resources from public or private clouds, during spikes in processing demands. Community cloud shares infrastructure between several organizations from

11172-404: The product from—such as a desktop computer, tablet, or smartphone—and supporting a wide range of devices is often an important concern for the front-end development team. Progressive web applications allow some functionality to be available even if the device is offline. SaaS applications predominantly offer integration protocols and application programming interfaces (APIs) that operate over

11286-501: The public Internet, and they may be offered as a paid subscription, or free of charge. Architecturally, there are few differences between public- and private-cloud services, but security concerns increase substantially when services (applications, storage, and other resources) are shared by multiple customers. Most public-cloud providers offer direct-connection services that allow customers to securely link their legacy data centers to their cloud-resident applications. Several factors like

11400-464: The public, publicize police activity, and burnish law enforcement's image; conversely, video footage of citizen-documented police brutality and other misconduct has sometimes been posted to social media. In the United States, U.S. Immigration and Customs Enforcement identifies and track individuals via social media, and has apprehended some people via social media-based sting operations. U.S. Customs and Border Protection (also known as CPB) and

11514-509: The responsibility of monitoring SLA compliance and must file claims for any unmet SLAs within a designated timeframe. Customers should be aware of how deviations from SLAs are calculated, as these parameters may vary by service. These requirements can place a considerable burden on customers. Additionally, SLA percentages and conditions can differ across various services within the same provider, with some services lacking any SLA altogether. In cases of service interruptions due to hardware failures in

11628-490: The same data server. Additionally, Eugene Schultz , chief technology officer at Emagined Security, said that hackers are spending substantial time and effort looking for ways to penetrate the cloud. "There are some real Achilles' heels in the cloud infrastructure that are making big holes for the bad guys to get into". Because data from hundreds or thousands of companies can be stored on large cloud servers, hackers can theoretically gain control of huge stores of information through

11742-492: The software on their own hardware affects many aspects of the application's design and security features. In a multi-tenant architecture, many resources can be used by different tenants or shared between multiple tenants. The structure of a typical SaaS application can be separated into application and control planes. SaaS products differ in how these planes are separated, which might be closely integrated or loosely coupled in an event- or message-driven model. The control plane

11856-399: The software, and the seller benefits by reaching occasional users who would otherwise not buy the software. However, it can cause revenue uncertainty for the seller and increases the overhead for billing . The subscription model of SaaS offers a continuing and renewable revenue stream to the provider, although vulnerable to cancellation. If a significant number are cancelled, the viability of

11970-555: The underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls)." IaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers . For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks ). To deploy their applications, cloud users install operating-system images and their application software on

12084-414: The use of multiple public clouds for the purpose of leveraging specific services that each provider offers. It differs from Multi cloud in that it is not designed to increase flexibility or mitigate against failures but is rather used to allow an organization to achieve more than could be done with a single provider. The issues of transferring large amounts of data to the cloud as well as data security once

12198-457: The use of social media on mobile devices such as smartphones and tablets . It is distinguished by its ubiquity, since users no longer have to be at a desk in order to participate on a computer . Mobile services can further make use of the user's immediate location to offer information, connections, or services relevant to that location. According to Andreas Kaplan , mobile social media activities fall among four types: Certain content has

12312-563: The user but instead leased from a cloud provider. As a result, infrastructure resources can be increased rapidly, instead of waiting weeks for computers to ship and set up. IaaS requires time and expertise to make use of the infrastructure in the form of operating systems and applications . Platform as a service (PaaS) includes the operating system and middleware , but not the applications. SaaS providers typically use PaaS or IaaS services to run their applications. Without IaaS, it would be extremely difficult to make an SaaS product scalable for

12426-445: The users' data on the cloud provider's server. As a result, there could be unauthorized access to the data. Examples of applications offered as SaaS are games and productivity software like Google Docs and Office Online. SaaS applications may be integrated with cloud storage or File hosting services , which is the case with Google Docs being integrated with Google Drive , and Office Online being integrated with OneDrive . In

12540-448: The web, and evolved into Internet forums , supported by cheaper access as well as the ability to handle far more people simultaneously. These early text-based systems expanded to include images and video in the 21st century, aided by digital cameras and camera phones . The evolution of online services progressed from serving as channels for networked communication to becoming interactive platforms for networked social interaction with

12654-697: The younger generations, governments began using it to improve their image, especially among the youth. In January 2021, Egyptian authorities were reported to be using Instagram influencers as part of its media ambassadors program. The program was designed to revamp Egypt 's image and to counter the bad press Egypt had received because of the country's human rights record. Saudi Arabia and the United Arab Emirates participated in similar programs. Similarly, Dubai has extensively relied on social media and influencers to promote tourism. However, Dubai laws have kept these influencers within limits to not offend

12768-446: Was inspired by the " six degrees of separation " concept, which suggests that every person on the planet is just six connections away from everyone else. In the early 2000s, social media platforms gained widespread popularity with the likes of Friendster and Myspace , followed by Facebook , YouTube , and Twitter . Research from 2015 reported that globally, users spent 22% of their online time on social networks, likely fueled by

12882-435: Was predominantly used during this era. This was a time of exploration and experimentation with ways to make large-scale computing power available to more users through time-sharing , optimizing the infrastructure, platform, and applications, and increasing efficiency for end users. The "cloud" metaphor for virtualized services dates to 1994, when it was used by General Magic for the universe of "places" that mobile agents in

12996-414: Was the most popular (used by 86% of 13- to 18-year-olds). As children aged, they increasingly utilized social media services and often used YouTube to consume content. While adults were using social media before the COVID-19 pandemic , more started using it to stay socially connected and to get pandemic updates. "Social media have become popularly use to seek for medical information and have fascinated

#838161